Ryan,
Thanks. Screenshots coming up... I do see this on the client:
The IP address assigned by the DHCP server... of local LAN I am trying to
reach (internal side of concentrator)
Transparent Tunneling: Inactive
Local LAN: Disabled
On the client, Transport Tab, I have:
Enabled Transparent Tunneling:
IPSec over UDP (NAT / PAT)
Allow Local LAN access checked.
Only seeing sent traffic stats increasing... I see the connection on the
concentrator sessions but no traffic stats.
Event log on concentrator:
47380 10/07/2009 13:32:07.340 SEV=7 IKEDBG/27 RPT=57 71.1.1.1
Group [IPSecGroup] User [UserName]
IPSec SA Proposal # 11, Transform # 1 acceptable
Matches global IPSec SA entry # 2 Proposal (ESP-3DES-MD5)
47383 10/07/2009 13:32:07.340 SEV=7 IKEDBG/85 RPT=57 71.1.1.1
Group [IPSecGroup] User [UserName]
IKE: requesting SPI! (Protocol=ESP)
47384 10/07/2009 13:32:07.340 SEV=8 IKEDBG/6 RPT=1619 71.1.1.1
Group [IPSecGroup] User [UserName]
IKE got SPI from key engine: SPI = 0x476c2ccb
47385 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21172 71.1.1.1
Group [IPSecGroup] User [UserName]
oakley constucting quick mode
47386 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21173 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing blank hash
47387 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21174 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing ISA_SA for ipsec
47388 10/07/2009 13:32:07.340 SEV=5 IKE/75 RPT=10 71.1.1.1
Group [IPSecGroup] User [UserName]
Overriding Initiator's IPSec rekeying duration from 2147483 to 28800 seconds
47390 10/07/2009 13:32:07.340 SEV=9 IKEDBG/1 RPT=31905 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing ipsec nonce payload
47391 10/07/2009 13:32:07.340 SEV=9 IKEDBG/1 RPT=31906 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing proxy ID
47392 10/07/2009 13:32:07.340 SEV=7 IKEDBG/91 RPT=1619 71.1.1.1
Group [IPSecGroup] User [UserName]
Transmitting Proxy Id:
Remote host: 192.168.1.160 Protocol 0 Port 0
Local subnet: 0.0.0.0 mask 0.0.0.0 Protocol 0 Port 0
47396 10/07/2009 13:32:07.340 SEV=7 IKEDBG/92 RPT=10 71.1.1.1
Group [IPSecGroup] User [UserName]
Sending RESPONDER LIFETIME notification to Initiator
47398 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21175 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing qm hash
47399 10/07/2009 13:32:07.340 SEV=8 IKEDBG/81 RPT=59724 71.1.1.1
SENDING Message (msgid=b8e14cb1) with payloads :
HDR + HASH (8) + SA (1)
total length : 176
47401 10/07/2009 13:32:07.540 SEV=8 IKEDBG/81 RPT=59725 71.1.1.1
RECEIVED Message (msgid=b8e14cb1) with payloads :
HDR + HASH (8) + NONE (0)
total length : 48
47403 10/07/2009 13:32:07.540 SEV=9 IKEDBG/0 RPT=21176 71.1.1.1
Group [IPSecGroup] User [UserName]
processing hash
47404 10/07/2009 13:32:07.540 SEV=9 IKEDBG/0 RPT=21177 71.1.1.1
Group [IPSecGroup] User [UserName]
loading all IPSEC SAs
47405 10/07/2009 13:32:07.540 SEV=9 IKEDBG/1 RPT=31907 71.1.1.1
Group [IPSecGroup] User [UserName]
Generating Quick Mode Key!
47406 10/07/2009 13:32:07.540 SEV=9 IKEDBG/1 RPT=31908 71.1.1.1
Group [IPSecGroup] User [UserName]
Generating Quick Mode Key!
47407 10/07/2009 13:32:07.540 SEV=7 IKEDBG/93 RPT=1594 71.1.1.1
Group [IPSecGroup] User [UserName]
Loading subnet:
Dst: 0.0.0.0 mask: 0.0.0.0
Src: 192.168.1.160:0
47409 10/07/2009 13:32:07.540 SEV=4 IKE/49 RPT=1594 71.1.1.1
Group [IPSecGroup] User [UserName]
Security negotiation complete for User (UserName)
Responder, Inbound SPI = 0x476c2ccb, Outbound SPI = 0x377e408a
47412 10/07/2009 13:32:07.540 SEV=8 IKEDBG/7 RPT=1594
IKE got a KEY_ADD msg for SA: SPI = 0x377e408a
47413 10/07/2009 13:32:07.540 SEV=8 IKEDBG/86 RPT=1594 71.1.1.1
Group [IPSecGroup] User [UserName]
pitcher: rcv KEY_UPDATE, spi 0x476c2ccb
47414 10/07/2009 13:32:07.540 SEV=4 IKE/120 RPT=1594 71.1.1.1
Group [IPSecGroup] User [UserName]
PHASE 2 COMPLETED (msgid=b8e14cb1)
47415 10/07/2009 13:32:07.540 SEV=4 NAC/27 RPT=10
NAC is disabled for peer - PUB_IP:71.1.1.1, PRV_IP:192.168.1.160
47416 10/07/2009 13:32:31.460 SEV=8 IKEDBG/81 RPT=59726 71.1.1.1
RECEIVED Message (msgid=57cfea03) with payloads :
HDR + HASH (8) + NOTIFY (11) + NONE (0)
total length : 80
47418 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21178 71.1.1.1
Group [IPSecGroup] User [UserName]
processing hash
47419 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21179 71.1.1.1
Group [IPSecGroup] User [UserName]
Processing Notify payload
47420 10/07/2009 13:32:31.460 SEV=9 IKEDBG/36 RPT=18603 71.1.1.1
Group [IPSecGroup] User [UserName]
Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xe4f69d21)
47422 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21180 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing blank hash
47423 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21181 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing qm hash
47424 10/07/2009 13:32:31.460 SEV=8 IKEDBG/81 RPT=59727 71.1.1.1
SENDING Message (msgid=1534da32) with payloads :
HDR + HASH (8) + NOTIFY (11)
total length : 80
47426 10/07/2009 13:32:41.890 SEV=8 IKEDBG/81 RPT=59728 71.1.1.1
RECEIVED Message (msgid=f71b87d3) with payloads :
HDR + HASH (8) + NOTIFY (11) + NONE (0)
total length : 80
47428 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21182 71.1.1.1
Group [IPSecGroup] User [UserName]
processing hash
47429 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21183 71.1.1.1
Group [IPSecGroup] User [UserName]
Processing Notify payload
47430 10/07/2009 13:32:41.890 SEV=9 IKEDBG/36 RPT=18604 71.1.1.1
Group [IPSecGroup] User [UserName]
Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xe4f69d22)
47432 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21184 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing blank hash
47433 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21185 71.1.1.1
Group [IPSecGroup] User [UserName]
constructing qm hash
47434 10/07/2009 13:32:41.890 SEV=8 IKEDBG/81 RPT=59729 71.1.1.1
SENDING Message (msgid=93d2ffe7) with payloads :
HDR + HASH (8) + NOTIFY (11)
total length : 80
thanks,
Haroon
On Wed, Oct 7, 2009 at 12:53 PM, Ryan West <rwest_at_zyedge.com> wrote:
> Haroon,
>
>
>
> I cant comment much on the pptp connection, but with the VPN client, what
> are you seeing in the statistics and secured routes page? How about on the
> concentrator, you should see some client statistics there that would
> indicate if youre seeing two-way traffic. Basically I think you should
> check out the logs some more.
>
>
>
> -ryan
>
>
>
> *From:* Haroon [mailto:itguy.pro_at_gmail.com]
> *Sent:* Wednesday, October 07, 2009 12:23 PM
> *To:* Ryan West
> *Cc:* Cisco certification
> *Subject:* Re: VPN Concentrator with VPN Clients
>
>
>
> Hi Ryan,
>
>
>
> Thanks. The concentrator has one interface in the internal LAN
> (192.168.1.5) and other one is public... I did try different subnet pool on
> the concentrator and statically route from the internal LAN gateway
> (192.168.1.1) to concentrator and back but that didn't work either.
>
>
>
> I even tried adding static routes on windows XP machine that I am using to
> test, still nothing.
>
>
>
> regards,
>
>
>
> haroon
>
> On Wed, Oct 7, 2009 at 12:02 PM, Ryan West <rwest_at_zyedge.com> wrote:
>
> Haroon,
>
> The concentrator usually does RRI. I wasn't really sure, but you did say
> that you tried assigning a local pool and statically routing that network
> from your router to your concentrator? If the concentrator is on a
> logically separate network than what your DHCP is assigning and that
network
> is local to the router or the clients, you can see the routing issue there.
> If you want to use it in that manner, the concentrator would need to sit
on
> your internal network.
>
> -ryan
>
> -----Original Message-----
> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
> Haroon
> Sent: Wednesday, October 07, 2009 11:56 AM
> To: Cisco certification
> Subject: OT: VPN Concentrator with VPN Clients
>
> Hello Experts,
>
> Sorry about back to back OT posts but maybe I am too dumb for this crap and
> someone can help me with this.... I am trying to configure CVPN 3030
> Concentrator to work with either Microsoft vpn client or Cisco VPN client
> 5.0.03.
>
> I have configured two groups: 1) pptp to work with MS and 2) IPSecGroup to
> work with the cisco vpn client. I cannot make any connection with ms vpn
> client, however, I am able to authenticate with active directory and get an
> ip address from our internal dhcp server when I use cisco vpn client(ip sec
> group). After the connection is established, I cannot ping or browse any
> servers behind the concentrator. I even tried different subnet dhcp range
> and adding static routes on the concentrator and router behind it (local
> LAN) but no go.
>
> I have tried following the cisco documents to the last letter, google
> search
> and I tried configuring it using my own understanding of this but no luck.
> Is there some setting that I am missing in the concentrator? I don't care
> which client I use (MS preferred) as long as concentrator can intelligently
> pass traffic through to the other side as it is with the 4 site to site
> VPNs.
>
> regards,
>
> Haroon
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Wed Oct 07 2009 - 13:36:33 ART
This archive was generated by hypermail 2.2.0 : Sun Nov 01 2009 - 07:50:59 ART