CyberJMC66
Technical User
I have the following configuration;
Cisco 3620 running IOS 12.0 with IPSEC/FW
Two ethernet interfaces -
One to public Internet address (NAT outside)
One to internal RFC1918 address (NAT inside, 10.x.x.x)
No access lists (for now while I am troubleshooting this problem).
Most features of the Firewall configuration work. However, I would like to be able to get my Nortel VPN client (port 500, isakmp) to passthru firewall properly. It seems to attempt a connection, establishes it, but its uni-directional.
Most of the examples on Cisco's website are instances where you own both ends and want to make the routers IPSEC endpoints. I have seen the following on Cisco's website to enable this
crypto commands for configuration of IPSEC (not sure if passthru or endpoint)
ip nat command for esp (IOS 12.2+)
My question is; What configuration commands are needed, based on the confuration above, to get IPSEC Passthru (ISAKMP, Port 500) to work properly on my 3620 router/firewall?
Cisco 3620 running IOS 12.0 with IPSEC/FW
Two ethernet interfaces -
One to public Internet address (NAT outside)
One to internal RFC1918 address (NAT inside, 10.x.x.x)
No access lists (for now while I am troubleshooting this problem).
Most features of the Firewall configuration work. However, I would like to be able to get my Nortel VPN client (port 500, isakmp) to passthru firewall properly. It seems to attempt a connection, establishes it, but its uni-directional.
Most of the examples on Cisco's website are instances where you own both ends and want to make the routers IPSEC endpoints. I have seen the following on Cisco's website to enable this
crypto commands for configuration of IPSEC (not sure if passthru or endpoint)
ip nat command for esp (IOS 12.2+)
My question is; What configuration commands are needed, based on the confuration above, to get IPSEC Passthru (ISAKMP, Port 500) to work properly on my 3620 router/firewall?