Microsoft
Software
Hardware
Network
Question : Problem: Config works but will not pass any traffic. I cannot ping even the inside interface of the vpn tunnel or the client ip
!
version 12.2
service timestamps debug uptime
service timestamps log uptime
service password-encryption
!
hostname tsdfw
!
logging queue-limit 100
enable password 7 xxx
!
username userx password 7 xxx
aaa new-model
!
!
aaa authentication login vpnauthen local
aaa authorization network vpnauthor local
aaa session-id common
ip subnet-zero
!
!
!
ip audit notify log
ip audit po max-events 100
!
!
!
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
!
crypto isakmp client configuration group tsdvpn
key pass
dns xx.xx.xx.xx
domain covad.net
pool vpnpool
acl 111
!
!
crypto ipsec transform-set trans2 esp-3des esp-md5-hmac
!
crypto dynamic-map vpndyn 10
set transform-set trans2
!
!
crypto map nemap client authentication list vpnauthen
crypto map nemap isakmp authorization list vpnauthor
crypto map nemap client configuration address initiate
crypto map nemap client configuration address respond
crypto map nemap 10 ipsec-isakmp dynamic vpndyn
!
!
!
!
interface Loopback0
ip address 1.1.1.1 255.255.255.0
!
interface Ethernet0
ip address 69.3.44.104 255.255.255.248
ip access-group 117 in
ip nat outside
no ip route-cache
no ip mroute-cache
half-duplex
crypto map nemap
!
interface FastEthernet0
description "Inside" interface with private IP Address
ip address 10.0.0.253 255.255.255.0
ip nat inside
ip route-cache policy
ip policy route-map nonat
no ip mroute-cache
speed auto
!
ip local pool vpnpool 10.0.0.50
ip nat pool outsidepool 69.3.44.105 69.3.44.105 netmask 255.255.255.248
ip nat inside source route-map nonat pool outsidepool
ip classless
ip route 0.0.0.0 0.0.0.0 Ethernet0
no ip http server
no ip http secure-server
!
!
!
ip access-list extended group-lock
!
access-list 110 deny ip 10.0.0.0 0.0.0.255 host 10.0.0.50
access-list 110 permit ip 10.0.0.0 0.0.0.255 any
access-list 117 permit esp any any
access-list 117 permit udp any any eq isakmp
access-list 120 permit ip 10.0.0.0 0.0.0.255 host 10.0.0.50
dialer-list 1 protocol ip permit
!
route-map rmap permit 10
match ip address 110
!
route-map nonat permit 10
match ip address 120
set ip next-hop 1.1.1.2
!
route-map nonat permit 20
!
radius-server authorization permit missing Service-Type
!
line con 0
line aux 0
line vty 0 4
!
no scheduler allocate
end
It is late but I can't seem to figure out why this configuration does not work correctly?? I connect using the Cisco VPn client, authenticate and terminate the tunnel. However, I cannot get transparent tunneling or split tunneling to work. I also cannot even ping through the tunnel. This is probably something obvious but I cannot seem to find it.
Thanks,
Troy
Answer : Problem: Config works but will not pass any traffic. I cannot ping even the inside interface of the vpn tunnel or the client ip
Just my opinion, but simply adding firewall 'features' to a router does not turn it into a firewall. It is a router with extra features. I would not put my business behind one. My configuration example above is fairly loose, because I have two PIX firewalls behind it..
Random Solutions
Problem: Dos file format 8.3 when bakup to tape by AcrserveIT 6
Problem: Arcserve 11.5 and restoring to a different location
Problem: Emachine won't power up
Problem: "My Documents" transfer using external enclosure.
Problem: Dell, Inspiron 6400, Inspiron 6400, keyboard problem
Problem: Comparing perfomance of AMD Duron XP, 1200 MHz(12x100) to Intel Celeron 4A,2033 MHz(20x102) to AMD Sempron 2200
Problem: Missing Scanner Dll
Problem: GA7N400E-L Cold Boot Fails (Very Important)
Problem: Is a DVI-D cable and a video card with a DVI-I port compatible.
Problem: Using Cisco 3560\3750 SFP port for Tape Library