cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
274
Views
0
Helpful
1
Replies

VPN connection

MCGSmartnet
Level 1
Level 1

hi

Here's the setup:

Location1:Internal Server-->PIX-->ISA(VPN Server)-->PIX-->Internet

Location2:VPN Client-->PIX-->Internet

If the client behind the PIX firewall from location 2 wants to connect to the ISA (VPN Server) in location 1, Is there a known a problem that client behind the firewall cannot connect to the VPN sever? If I have to establish a VPN connection between these two locations, is setting up two ISA sever to form the VPN is the only option?. Any suggestion will be greatly appreciated.

Thanks in advance

Forina

1 Reply 1

Patrick Iseli
Level 7
Level 7

Yes there is, usualy if the remote VPN Peer is a PIX we add this command line.

isakmp nat-traversal 20

Take a look if the ISA VPN Server supports the NAT Traversal and enable that:

Supplemtary information on NAT TRaversal:

Network Address Translation (NAT), including Port Address Translation (PAT), is used in many networks where IPSec is also used, but there are a number of incompatibilities that prevent IPSec packets from successfully traversing NAT devices. NAT traversal enables ESP packets to pass through one or more NAT devices.

The firewall supports NAT traversal as described by Version 2 and Version 3 of the IETF "UDP Encapsulation of IPsec Packets" draft, available at http://www.ietf.org/html.charters/ipsec-charter.html, and NAT traversal is supported for both dynamic and static crypto maps. NAT traversal is disabled by default on the firewall.

To enable NAT traversal, check that ISAKMP is enabled (you can enable it with the isakmp enable if_name command) and then use the isakmp nat-traversal [natkeepalive] command. (This command appears in the configuration if both ISAKMP is enabled and NAT traversal is enabled.) If you have enabled NAT traversal, you can disable it with the no isakmp nat-traversal command. Valid values for natkeepalive are from 10 to 3600 seconds. The default is 20 seconds.

See: http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a9.html#wp1027312

sincerely

Patrick