Okay, I was able to fix this.
Changed the settings in this screenshot around:
http://www.ccie.pro/cvpn-clientconfig.jpg
thanks,
Haroon
On Wed, Oct 7, 2009 at 1:36 PM, Haroon <itguy.pro_at_gmail.com> wrote:
> Ryan,
>
> Thanks. Screenshots coming up... I do see this on the client:
>
> The IP address assigned by the DHCP server... of local LAN I am trying to
> reach (internal side of concentrator)
>
> Transparent Tunneling: Inactive
> Local LAN: Disabled
>
> On the client, Transport Tab, I have:
> Enabled Transparent Tunneling:
> IPSec over UDP (NAT / PAT)
>
> Allow Local LAN access checked.
>
> Only seeing sent traffic stats increasing... I see the connection on the
> concentrator sessions but no traffic stats.
>
> Event log on concentrator:
> 47380 10/07/2009 13:32:07.340 SEV=7 IKEDBG/27 RPT=57 71.1.1.1
> Group [IPSecGroup] User [UserName]
> IPSec SA Proposal # 11, Transform # 1 acceptable
> Matches global IPSec SA entry # 2 Proposal (ESP-3DES-MD5)
> 47383 10/07/2009 13:32:07.340 SEV=7 IKEDBG/85 RPT=57 71.1.1.1
> Group [IPSecGroup] User [UserName]
> IKE: requesting SPI! (Protocol=ESP)
> 47384 10/07/2009 13:32:07.340 SEV=8 IKEDBG/6 RPT=1619 71.1.1.1
> Group [IPSecGroup] User [UserName]
> IKE got SPI from key engine: SPI = 0x476c2ccb
> 47385 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21172 71.1.1.1
> Group [IPSecGroup] User [UserName]
> oakley constucting quick mode
> 47386 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21173 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing blank hash
> 47387 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21174 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing ISA_SA for ipsec
> 47388 10/07/2009 13:32:07.340 SEV=5 IKE/75 RPT=10 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Overriding Initiator's IPSec rekeying duration from 2147483 to 28800
> seconds
> 47390 10/07/2009 13:32:07.340 SEV=9 IKEDBG/1 RPT=31905 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing ipsec nonce payload
> 47391 10/07/2009 13:32:07.340 SEV=9 IKEDBG/1 RPT=31906 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing proxy ID
> 47392 10/07/2009 13:32:07.340 SEV=7 IKEDBG/91 RPT=1619 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Transmitting Proxy Id:
> Remote host: 192.168.1.160 Protocol 0 Port 0
> Local subnet: 0.0.0.0 mask 0.0.0.0 Protocol 0 Port 0
> 47396 10/07/2009 13:32:07.340 SEV=7 IKEDBG/92 RPT=10 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Sending RESPONDER LIFETIME notification to Initiator
> 47398 10/07/2009 13:32:07.340 SEV=9 IKEDBG/0 RPT=21175 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing qm hash
> 47399 10/07/2009 13:32:07.340 SEV=8 IKEDBG/81 RPT=59724 71.1.1.1
> SENDING Message (msgid=b8e14cb1) with payloads :
> HDR + HASH (8) + SA (1)
> total length : 176
> 47401 10/07/2009 13:32:07.540 SEV=8 IKEDBG/81 RPT=59725 71.1.1.1
> RECEIVED Message (msgid=b8e14cb1) with payloads :
> HDR + HASH (8) + NONE (0)
> total length : 48
> 47403 10/07/2009 13:32:07.540 SEV=9 IKEDBG/0 RPT=21176 71.1.1.1
> Group [IPSecGroup] User [UserName]
> processing hash
> 47404 10/07/2009 13:32:07.540 SEV=9 IKEDBG/0 RPT=21177 71.1.1.1
> Group [IPSecGroup] User [UserName]
> loading all IPSEC SAs
> 47405 10/07/2009 13:32:07.540 SEV=9 IKEDBG/1 RPT=31907 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Generating Quick Mode Key!
> 47406 10/07/2009 13:32:07.540 SEV=9 IKEDBG/1 RPT=31908 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Generating Quick Mode Key!
> 47407 10/07/2009 13:32:07.540 SEV=7 IKEDBG/93 RPT=1594 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Loading subnet:
> Dst: 0.0.0.0 mask: 0.0.0.0
> Src: 192.168.1.160:0
> 47409 10/07/2009 13:32:07.540 SEV=4 IKE/49 RPT=1594 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Security negotiation complete for User (UserName)
> Responder, Inbound SPI = 0x476c2ccb, Outbound SPI = 0x377e408a
> 47412 10/07/2009 13:32:07.540 SEV=8 IKEDBG/7 RPT=1594
> IKE got a KEY_ADD msg for SA: SPI = 0x377e408a
> 47413 10/07/2009 13:32:07.540 SEV=8 IKEDBG/86 RPT=1594 71.1.1.1
> Group [IPSecGroup] User [UserName]
> pitcher: rcv KEY_UPDATE, spi 0x476c2ccb
> 47414 10/07/2009 13:32:07.540 SEV=4 IKE/120 RPT=1594 71.1.1.1
> Group [IPSecGroup] User [UserName]
> PHASE 2 COMPLETED (msgid=b8e14cb1)
> 47415 10/07/2009 13:32:07.540 SEV=4 NAC/27 RPT=10
> NAC is disabled for peer - PUB_IP:71.1.1.1, PRV_IP:192.168.1.160
> 47416 10/07/2009 13:32:31.460 SEV=8 IKEDBG/81 RPT=59726 71.1.1.1
> RECEIVED Message (msgid=57cfea03) with payloads :
> HDR + HASH (8) + NOTIFY (11) + NONE (0)
> total length : 80
> 47418 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21178 71.1.1.1
> Group [IPSecGroup] User [UserName]
> processing hash
> 47419 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21179 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Processing Notify payload
> 47420 10/07/2009 13:32:31.460 SEV=9 IKEDBG/36 RPT=18603 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xe4f69d21)
> 47422 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21180 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing blank hash
> 47423 10/07/2009 13:32:31.460 SEV=9 IKEDBG/0 RPT=21181 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing qm hash
> 47424 10/07/2009 13:32:31.460 SEV=8 IKEDBG/81 RPT=59727 71.1.1.1
> SENDING Message (msgid=1534da32) with payloads :
> HDR + HASH (8) + NOTIFY (11)
> total length : 80
> 47426 10/07/2009 13:32:41.890 SEV=8 IKEDBG/81 RPT=59728 71.1.1.1
> RECEIVED Message (msgid=f71b87d3) with payloads :
> HDR + HASH (8) + NOTIFY (11) + NONE (0)
> total length : 80
> 47428 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21182 71.1.1.1
> Group [IPSecGroup] User [UserName]
> processing hash
> 47429 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21183 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Processing Notify payload
> 47430 10/07/2009 13:32:41.890 SEV=9 IKEDBG/36 RPT=18604 71.1.1.1
> Group [IPSecGroup] User [UserName]
> Sending keep-alive of type DPD R-U-THERE-ACK (seq number 0xe4f69d22)
> 47432 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21184 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing blank hash
> 47433 10/07/2009 13:32:41.890 SEV=9 IKEDBG/0 RPT=21185 71.1.1.1
> Group [IPSecGroup] User [UserName]
> constructing qm hash
> 47434 10/07/2009 13:32:41.890 SEV=8 IKEDBG/81 RPT=59729 71.1.1.1
> SENDING Message (msgid=93d2ffe7) with payloads :
> HDR + HASH (8) + NOTIFY (11)
> total length : 80
>
> thanks,
>
> Haroon
>
> On Wed, Oct 7, 2009 at 12:53 PM, Ryan West <rwest_at_zyedge.com> wrote:
>
>> Haroon,
>>
>>
>>
>> I cant comment much on the pptp connection, but with the VPN client, what
>> are you seeing in the statistics and secured routes page? How about on
the
>> concentrator, you should see some client statistics there that would
>> indicate if youre seeing two-way traffic. Basically I think you should
>> check out the logs some more.
>>
>>
>>
>> -ryan
>>
>>
>>
>> *From:* Haroon [mailto:itguy.pro_at_gmail.com]
>> *Sent:* Wednesday, October 07, 2009 12:23 PM
>> *To:* Ryan West
>> *Cc:* Cisco certification
>> *Subject:* Re: VPN Concentrator with VPN Clients
>>
>>
>>
>> Hi Ryan,
>>
>>
>>
>> Thanks. The concentrator has one interface in the internal LAN
>> (192.168.1.5) and other one is public... I did try different subnet pool
on
>> the concentrator and statically route from the internal LAN gateway
>> (192.168.1.1) to concentrator and back but that didn't work either.
>>
>>
>>
>> I even tried adding static routes on windows XP machine that I am using to
>> test, still nothing.
>>
>>
>>
>> regards,
>>
>>
>>
>> haroon
>>
>> On Wed, Oct 7, 2009 at 12:02 PM, Ryan West <rwest_at_zyedge.com> wrote:
>>
>> Haroon,
>>
>> The concentrator usually does RRI. I wasn't really sure, but you did say
>> that you tried assigning a local pool and statically routing that network
>> from your router to your concentrator? If the concentrator is on a
>> logically separate network than what your DHCP is assigning and that
network
>> is local to the router or the clients, you can see the routing issue
there.
>> If you want to use it in that manner, the concentrator would need to sit
on
>> your internal network.
>>
>> -ryan
>>
>> -----Original Message-----
>> From: nobody_at_groupstudy.com [mailto:nobody_at_groupstudy.com] On Behalf Of
>> Haroon
>> Sent: Wednesday, October 07, 2009 11:56 AM
>> To: Cisco certification
>> Subject: OT: VPN Concentrator with VPN Clients
>>
>> Hello Experts,
>>
>> Sorry about back to back OT posts but maybe I am too dumb for this crap
>> and
>> someone can help me with this.... I am trying to configure CVPN 3030
>> Concentrator to work with either Microsoft vpn client or Cisco VPN client
>> 5.0.03.
>>
>> I have configured two groups: 1) pptp to work with MS and 2) IPSecGroup to
>> work with the cisco vpn client. I cannot make any connection with ms vpn
>> client, however, I am able to authenticate with active directory and get
>> an
>> ip address from our internal dhcp server when I use cisco vpn client(ip
>> sec
>> group). After the connection is established, I cannot ping or browse any
>> servers behind the concentrator. I even tried different subnet dhcp range
>> and adding static routes on the concentrator and router behind it (local
>> LAN) but no go.
>>
>> I have tried following the cisco documents to the last letter, google
>> search
>> and I tried configuring it using my own understanding of this but no luck.
>> Is there some setting that I am missing in the concentrator? I don't care
>> which client I use (MS preferred) as long as concentrator can
>> intelligently
>> pass traffic through to the other side as it is with the 4 site to site
>> VPNs.
>>
>> regards,
>>
>> Haroon
>>
>>
>> Blogs and organic groups at http://www.ccie.net
>>
>> _______________________________________________________________________
>> Subscription information may be found at:
>> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Wed Oct 07 2009 - 14:27:50 ART
This archive was generated by hypermail 2.2.0 : Sun Nov 01 2009 - 07:50:59 ART