What can be the problem? the config seems OK. The site-site tunnel is working and I have successfully configured many vpn clients on the pix. I have tried changing the policy parameters but did not help. I even installed the newest version of VPN client (IOS 14.4(5a). Any ideas? Has anyone had a simmilar problem?
Thank you very much for your response. I mentioned in the post that I provided the relevant part of the configuration but it is not true. I omitted the firewall/access-list configuration which turned out to be a problem.
I enabled esp and isakmp from any to the interface but could not connect. Then I disabled the IPsec over UDP and could connect but not access the lan. I kept getting these wrong encryption messages, which really distracted me.
I then opened UDP 4500 and enabled IPsec over UDP again and it worked!! but I also tested that ESP and ISAKMP ports mut also be opened. At least the ESP as, as far as I know, the UDP encapsulates only isakmp messages.
Join us for a detailed discussion of the integrations between Cisco Secure Email and SecureX. We’ll share the various ways that SecureX provides greater visibility across the Cisco Security landscape and demonstrate how Secure Email is the ...
ISE 2.7 FCS
To display default country code and Place holder customization please follow the below steps.
Upload the attached js file in Custom Portal Files.
Go to portal and add the below script in the Registration Form pag...
Part 1: The Basics
Hard-copy printing may feel very “old school” now, but a recent flurry of activity related to the print spooler service on Windows operating systems has brought one of the oldest IT applications back into the spotlight again. Our...
Python on Cisco Secure Email
The Python package used in our appliances is not a standard deployment --- just like AsyncOS is not your typical FreeBSD (a free and open-source Unix-like operating system descended from the Berkeley Software Distributio...
Wireless Controller WLC integration with Cisco ISE for access control through 802.1X is one of the most popular deployment in the network security field. Now is the employee PC safe after the authentication and authorization?even after the posture o...