Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cisco 831 VPN cant access anything on Lan

Status
Not open for further replies.

Texas12

Technical User
Mar 5, 2006
5
US
This thing is driving me nuts!!!

Set up router and vpn from remote user.

Vpn connects but remote user can not see anything on office lan.

I can ping the router but thats it....

Listed below is the config


Current configuration : 3070 bytes
!
version 12.3
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname XXXX
!
boot-start-marker
boot-end-marker
!
!
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
aaa authorization network sdm_vpn_group_ml_1 local
aaa session-id common
ip subnet-zero
!
!
ip dhcp excluded-address 172.16.0.1 172.16.0.100
ip dhcp excluded-address 172.16.0.151 172.16.255.254
!
ip dhcp pool sdm-pool1
import all
network 172.16.0.0 255.255.0.0
domain-name xxxx.xxx
dns-server 172.16.0.5 24.116.2.50
default-router 172.16.0.1
!
!
ip domain name xxxx.xxx
ip name-server 172.16.0.5
ip name-server 24.116.2.50
ip ids po max-events 100
no ftp-server write-enable
!
!
!
!
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
crypto isakmp xauth timeout 15

!
crypto isakmp client configuration group C1VPN
key xxxxxx
pool SDM_POOL_1
max-users 10
!
!
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
!
crypto dynamic-map SDM_DYNMAP_1 1
set transform-set ESP-3DES-SHA
reverse-route
!
!
crypto map SDM_CMAP_1 client authentication list default
crypto map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1
crypto map SDM_CMAP_1 client configuration address respond
crypto map SDM_CMAP_1 65535 ipsec-isakmp dynamic SDM_DYNMAP_1
!
!
!
interface Ethernet0
description $ETH-LAN$
ip address 172.16.0.1 255.255.0.0
ip nat inside
ip virtual-reassembly
!
interface Ethernet1
description $ES_WAN$
ip address dhcp client-id Ethernet1 hostname CableOne
ip nat outside
ip virtual-reassembly
duplex auto
crypto map SDM_CMAP_1
!
interface Ethernet2
no ip address
shutdown
!
interface FastEthernet1
no ip address
duplex auto
speed auto
!
interface FastEthernet2
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet3
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet4
no ip address
shutdown
duplex auto
speed auto
!
ip local pool SDM_POOL_1 10.10.1.101 10.10.1.105
ip classless
!
ip http server
no ip http secure-server
ip nat inside source route-map SDM_RMAP_1 interface Ethernet1 overload
!
!
access-list 100 remark SDM_ACL Category=2
access-list 100 deny ip any host 10.10.1.101
access-list 100 deny ip any host 10.10.1.102
access-list 100 deny ip any host 10.10.1.103
access-list 100 deny ip any host 10.10.1.104
access-list 100 deny ip any host 10.10.1.105
access-list 100 permit ip 172.16.0.0 0.0.255.255 any
!
route-map SDM_RMAP_1 permit 1
match ip address 100
!
!
control-plane
!
!
line con 0
no modem enable
transport preferred all
transport output all
line aux 0
transport preferred all
transport output all
line vty 0 4
transport preferred all
transport input all
transport output all
!
scheduler max-task-time 5000
end

Thanks,

DJ
 
In a router, I have always put the vpn addresses in the same subnet as the LAN, but excluded them from NAT. Try that...the rest looks good...

Burt
 
Thanks BB

I tried setting the VPN ip to within the dhcp servers range, and deleteing the entrys in access-list 100

still no go

listed below are the changes I made.

ip local pool SDM_POOL_2 172.16.0.50 172.16.0.55
ip classless
!
ip http server
no ip http secure-server
ip nat inside source route-map SDM_RMAP_1 interface Ethernet1 overload
!
!
access-list 100 remark SDM_ACL Category=18
access-list 100 permit ip 172.16.0.0 0.0.255.255 any
!
route-map SDM_RMAP_1 permit 1
match ip address 100


One thing I have noticed is at the remote pc using cisco vpn client the tunnel route shows protected ip as 0.0.0.0 0.0.0.0

the funny thing is I can ping the router address of 172.16.0.1 bu thats it


DJ
 
But you have to deny NAT to the VPN addresses...

no access-list 100
access-list 100 deny ip any host 172.16.0.50
access-list 100 deny ip any host 172.16.0.51
access-list 100 deny ip any 172.16.0.52 0.0.0.3
access-list 100 permit ip 172.16.0.0 0.0.255.255 any

It should work then.

If it still does not, I can show you my working config...I'm not seeing anything other than this. Like I said, I had the same troubles until I did it this way. In a PIX/ASA, you'd want the VPN subnet as a different subnet.

Burt
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top