We have a remote office with an ADSL connection,
single static public IP address. Users access Internet
and VPN over NAT behind the internet router.
My problem is, only one single user is able to establish
a VPN connection to a Cisco 3005 concentrator over at head
office.
The Cisco 3005 sees the first connected VPN user from the
remote office as coming from 111.222.333.444 (fictitious
IP, which is the public IP on the remote office end)
Cisco 3005 sees subsequent VPN attempt from a different user
at the remote office as coming from the same public IP and
refuses connection (Cisco log shows this) while the first connection is still active even though it is a separate user account on the Cisco 3005.
Is this a security feature on the Cisco 3005 and is there
any way to bypass this to allow concurrent VPN sessions from
the remote office to the Cisco 3005?
Any help is appreciated. Thanks
single static public IP address. Users access Internet
and VPN over NAT behind the internet router.
My problem is, only one single user is able to establish
a VPN connection to a Cisco 3005 concentrator over at head
office.
The Cisco 3005 sees the first connected VPN user from the
remote office as coming from 111.222.333.444 (fictitious
IP, which is the public IP on the remote office end)
Cisco 3005 sees subsequent VPN attempt from a different user
at the remote office as coming from the same public IP and
refuses connection (Cisco log shows this) while the first connection is still active even though it is a separate user account on the Cisco 3005.
Is this a security feature on the Cisco 3005 and is there
any way to bypass this to allow concurrent VPN sessions from
the remote office to the Cisco 3005?
Any help is appreciated. Thanks