Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

2800 VPN client will not work

Status
Not open for further replies.

GM2005

ISP
Sep 28, 2005
118
GB
Hi

We are unable to get a client connection to a router. It is the property of a customer who had client VPN's working for some time. He then attempted to configure a L2L VPN and screwed the whole thing up. I am at a loss to see why the client does not work. The debug shows the router attempting every combination of SA available then failing on:

%CRYPTO-6-IKMP_MODE_FAILURE: Processing of Aggressive mode failed with peer > at x.x.x.x

Here is the config:

Building configuration...

Current configuration : 2613 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname 2801
!
boot-start-marker
boot system flash
boot-end-marker
!
enable password
!
aaa new-model
!
!
aaa authentication login telnet local
aaa authorization network Remote local
!
aaa session-id common
!
resource policy
!
mmi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-timeout 180
ip subnet-zero
ip cef
!
!
no ip dhcp use vrf connected
!
!
no ip ips deny-action ips-interface
ip domain name thames.priv
!
!
!
!

archive
log config
hidekeys
!
!
!
crypto isakmp policy 10
encr 3des
authentication pre-share
group 2
hash sha
!
crypto isakmp client configuration group RemoteAccess
key key
domain example.priv
pool vpnusers

!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto dynamic-map Client 20
set transform-set ESP-3DES-SHA
!
!
crypto map Remote client authentication list local
crypto map Remote isakmp authorization list local
crypto map Remote client configuration address initiate
crypto map Remote 20 ipsec-isakmp dynamic Client
!
!
!
interface FastEthernet0/0
ip address 10.10.10.1 255.255.255.0
duplex auto
speed auto
crypto map Remote
!
interface FastEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface ATM0/1/0
no ip address
shutdown
no atm ilmi-keepalive
dsl operating-mode auto
pvc 0/38
encapsulation aal5mux ppp dialer
dialer pool-member 1
!
!
interface Async0/2/0
no ip address
!
interface Async0/2/1
no ip address
!
interface Async0/3/0
no ip address
!
interface Async0/3/1
no ip address
!
interface Dialer0
description $FW_INSIDE$
ip address negotiated
ip nat outside
ip virtual-reassembly
encapsulation ppp
dialer pool 1
dialer-group 1
ppp authentication chap callin
ppp chap hostname
ppp chap password

!
ip local pool vpnusers 10.0.0.1 10.0.0.254
ip classless
ip route 0.0.0.0 0.0.0.0 FastEthernet0/0
!
ip http server
no ip http secure-server
!
!
!
!
control-plane
!
!
line con 0
login authentication local
line aux 0
line 0/2/0 0/2/1
modem Dialin
stopbits 1
speed 115200
flowcontrol hardware
line 0/3/0 0/3/1
stopbits 1
speed 115200
flowcontrol hardware
line vty 0 4
privilege level 15
transport input telnet ssh
line vty 5 15
privilege level 15
transport input telnet ssh
!
scheduler allocate 20000 1000
end
 
Well, what does fa0/0 go to? The crypto map should be applied to the outgoing interface. The default route also needs to be pointing to the outgoing interface. I also don't see any NAT, but that is a different issue...

Burt
 
Apologies for not pointing that out. We had the router shipped to us and sent a temporary replacement without the client VPN configured.

There is a laptop attached to the original router's f0/0 interface with CVPN 5.0 loaded. It still does not work.

The NAT isn't configured because we flattened the config and just applied the bare bones to debug the phases, but this isn't even getting past phase one.

It is a tricky one as we have copied a live working template. I am hoping it is a0 something obvious, even if embarrassing, or b) something obscure someone else has come across.

The IOS was 12.4(1b) - not even available. We have upgraded the IOS to T trains and have settled on 12.6T. it still does not work.
 
I'm not sure you can test it from the inside like that. Can you connect the adsl and test it from the outside, and NAT everything except the vpn pool?

Burt
 
Bizarrely my colleague erase start>reloaded it today and configured more or less what is above and it worked. You can VPN into the ethernet interface, but after reading your last comment I have just noticed there is no nat inside. mmmm
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top