I have a client VPN setup on a 2821 router. I can connect to VPN but have no access to internal subnets. Any help would be appreciated I have been struggling with this for days.
Current configuration : 52632 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname EDGE-2821
!
boot-start-marker
boot system flash c2800nm-advsecurityk9-mz.124-3g.bin
boot-end-marker
!
security authenticatio
logging count
logging buffered 4096 debugging
logging console critical
logging monitor critical
enable secret **********
!
aaa new-model
!
!
aaa group server radius RadiusServers
server 172.16.2.11 auth-port 1812 acct-port 1813
!
aaa authentication login default local group RadiusServers
aaa authentication login RadiusServers group RadiusServers
aaa authentication login vty_line local
aaa authentication login console_line line none
aaa authorization network groupauth local
!
aaa session-id common
!
resource policy
!
clock timezone Eastern -5
ip subnet-zero
no ip source-route
ip tcp synwait-time 10
!
!
ip cef
ip inspect max-incomplete high 4100
ip inspect max-incomplete low 4000
ip inspect one-minute high 4100
ip inspect one-minute low 4000
ip inspect tcp max-incomplete host 100 block-time 0
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW dns
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW imap
ip inspect name SDM_LOW pop3
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW esmtp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW vdolive
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW https timeout 1800
ip inspect name DMZ_LOW smtp
ip inspect name DMZ_LOW udp
ip inspect name DMZ_LOW tcp
!
!
ip flow-cache timeout active 1
ip ips sdf location flash://sdmips.sdf
ip ips sdf location flash://256MB.sdf autosave
ip ips notify SDEE
no ip bootp server
no ip domain lookup
ip domain name amerilife.com
ip ssh time-out 60
!
!
!
crypto pki trustpoint TP-self-signed-3553449798
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3553449798
revocation-check none
rsakeypair TP-self-signed-3553449798
!
!
username Administrator privilege 15 secret 5 $1$QbYY$quGRdckuG82DtYCN8IFb61
username Failsafe privilege 15 secret 5 $1$g9ud$PZtfNI0iO8Obfm/..D2oo/
!
!
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 3
encr aes
authentication pre-share
group 2
lifetime 3600
crypto isakmp xauth timeout 60
!
crypto isakmp client configuration group default
key ********
dns 172.16.2.11 172.16.2.2
wins 172.16.2.11 172.16.2.2
domain alg.local
pool VPN_Pool
netmask 255.255.0.0
!
!
crypto ipsec transform-set trnsfrmset esp-aes esp-sha-hmac
crypto ipsec transform-set SDM_TRANSFORMSET_1 esp-3des esp-md5-hmac
crypto ipsec transform-set SDM_TRANSFORMSET_2 esp-3des esp-md5-hmac
!
crypto ipsec profile Profile_1
set security-association lifetime seconds 28800
set security-association idle-time 28800
set transform-set trnsfrmset SDM_TRANSFORMSET_1 SDM_TRANSFORMSET_2
!
!
crypto dynamic-map dynmap 1
set security-association lifetime kilobytes 86400
set security-association lifetime seconds 28800
set security-association idle-time 14400
set transform-set trnsfrmset SDM_TRANSFORMSET_1
reverse-route
!
!
crypto map clientmap client authentication list RadiusServers
crypto map clientmap isakmp authorization list groupauth
crypto map clientmap client configuration address respond
crypto map clientmap 1 ipsec-isakmp dynamic dynmap
!
!
!
interface GigabitEthernet0/0
description Tampa LAN$ETH-LAN$
ip address 172.16.1.2 255.255.0.0
ip access-group sdm_gigabitethernet0/0_in in
no ip redirects
no ip unreachables
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
no mop enabled
!
interface GigabitEthernet0/1
description Edge Link
ip address 63.236.108.70 255.255.255.192
ip access-group 101 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip inspect SDM_LOW out
ip flow ingress
ip flow egress
ip nat outside
ip virtual-reassembly
ip route-cache flow
duplex full
speed 10
no mop enabled
crypto map clientmap
!
interface GigabitEthernet0/3/0
description Tampa DMZ
ip address 172.17.1.1 255.255.0.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
ip route-cache flow
no negotiation auto
!
ip local pool VPN_Pool 172.16.80.1 172.16.80.254
ip classless
ip route 0.0.0.0 0.0.0.0 63.236.108.65 permanent
ip route 172.17.0.0 255.255.0.0 172.16.1.1 permanent
ip route 172.20.0.0 255.255.0.0 172.16.1.1
ip route 172.25.0.0 255.255.0.0 172.16.1.1 permanent
ip flow-export source GigabitEthernet0/0
ip flow-export version 5
ip flow-export destination 172.16.2.30 2000
ip flow-top-talkers
top 10
sort-by bytes
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/1 overload
ip nat inside source route-map SDM_RMAP_2 interface GigabitEthernet0/1 overload
ip nat inside source route-map SDM_RMAP_3 interface GigabitEthernet0/1 overload
!
ip access-list extended sdm_gigabitethernet0/0_in
remark SDM_ACL Category=17
permit icmp any any log
permit ip any any
!
ip radius source-interface GigabitEthernet0/0
logging history errors
logging trap notifications
logging origin-id hostname
logging source-interface GigabitEthernet0/0
logging server-arp
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 172.16.0.0 0.0.255.255
access-list 2 remark SDM_ACL Category=2
access-list 2 permit 172.20.0.0 0.0.255.255 log
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 100 remark SDM_ACL Category=17
access-list 100 permit icmp any any log
access-list 100 permit ip any any
access-list 101 remark SDM_ACL Category=17
access-list 101 permit ip 192.168.80.0 0.0.0.255 any
access-list 101 permit ahp any host 63.236.108.70
access-list 101 permit esp any host 63.236.108.70
access-list 101 permit ip any 172.16.0.0 0.0.255.255
access-list 101 permit ip any 172.17.0.0 0.0.255.255
access-list 101 permit ip any 172.25.0.0 0.0.255.255
access-list 101 permit ip any 172.20.0.0 0.0.255.255
access-list 101 permit ip 172.16.80.0 0.0.0.255 any
access-list 101 permit icmp host 63.236.108.114 host 63.146.195.90
access-list 101 deny ip any any log
access-list 102 remark SDM_ACL Category=4
access-list 102 permit ip 172.25.0.0 0.0.255.255 any
access-list 102 permit ip 172.20.0.0 0.0.255.255 any
access-list 102 permit ip 172.16.0.0 0.0.255.255 any
access-list 102 permit ip 172.17.0.0 0.0.255.255 any
access-list 102 permit ip 63.236.108.0 0.0.0.255 any
access-list 103 remark SDM_ACL Category=2
access-list 103 permit ip 172.16.0.0 0.0.255.255 any
access-list 104 remark SDM_ACL Category=2
access-list 104 permit ip 172.20.0.0 0.0.255.255 any log
access-list 104 deny ip any 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.25.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.17.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.16.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.25.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 104 deny ip 172.17.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 104 deny ip 172.16.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 105 remark SDM_ACL Category=2
access-list 105 deny ip 172.17.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.16.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.20.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.25.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.20.0.0 0.0.255.255 any
access-list 105 deny ip 172.25.0.0 0.0.255.255 any
access-list 105 deny ip 172.17.0.0 0.0.255.255 any
access-list 105 permit ip 172.16.0.0 0.0.255.255 any
access-list 110 permit udp 172.17.0.0 0.0.255.255 any eq domain
access-list 150 permit udp any host 63.236.108.70 eq isakmp
access-list 150 permit udp any host 63.236.108.70 eq non500-isakmp
no cdp run
route-map SDM_RMAP_1 permit 1
!
route-map SDM_RMAP_2 permit 1
!
route-map SDM_RMAP_3 permit 1
match ip address 105
!
!
radius-server host 172.16.2.11 auth-port 1812 acct-port 1813
!
control-plane
!
!
!
scheduler allocate 20000 1000
!
end
Current configuration : 52632 bytes
!
version 12.4
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname EDGE-2821
!
boot-start-marker
boot system flash c2800nm-advsecurityk9-mz.124-3g.bin
boot-end-marker
!
security authenticatio
logging count
logging buffered 4096 debugging
logging console critical
logging monitor critical
enable secret **********
!
aaa new-model
!
!
aaa group server radius RadiusServers
server 172.16.2.11 auth-port 1812 acct-port 1813
!
aaa authentication login default local group RadiusServers
aaa authentication login RadiusServers group RadiusServers
aaa authentication login vty_line local
aaa authentication login console_line line none
aaa authorization network groupauth local
!
aaa session-id common
!
resource policy
!
clock timezone Eastern -5
ip subnet-zero
no ip source-route
ip tcp synwait-time 10
!
!
ip cef
ip inspect max-incomplete high 4100
ip inspect max-incomplete low 4000
ip inspect one-minute high 4100
ip inspect one-minute low 4000
ip inspect tcp max-incomplete host 100 block-time 0
ip inspect name SDM_LOW cuseeme
ip inspect name SDM_LOW dns
ip inspect name SDM_LOW ftp
ip inspect name SDM_LOW h323
ip inspect name SDM_LOW imap
ip inspect name SDM_LOW pop3
ip inspect name SDM_LOW netshow
ip inspect name SDM_LOW rcmd
ip inspect name SDM_LOW realaudio
ip inspect name SDM_LOW esmtp
ip inspect name SDM_LOW sqlnet
ip inspect name SDM_LOW streamworks
ip inspect name SDM_LOW tftp
ip inspect name SDM_LOW vdolive
ip inspect name SDM_LOW tcp
ip inspect name SDM_LOW udp
ip inspect name SDM_LOW https timeout 1800
ip inspect name DMZ_LOW smtp
ip inspect name DMZ_LOW udp
ip inspect name DMZ_LOW tcp
!
!
ip flow-cache timeout active 1
ip ips sdf location flash://sdmips.sdf
ip ips sdf location flash://256MB.sdf autosave
ip ips notify SDEE
no ip bootp server
no ip domain lookup
ip domain name amerilife.com
ip ssh time-out 60
!
!
!
crypto pki trustpoint TP-self-signed-3553449798
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3553449798
revocation-check none
rsakeypair TP-self-signed-3553449798
!
!
username Administrator privilege 15 secret 5 $1$QbYY$quGRdckuG82DtYCN8IFb61
username Failsafe privilege 15 secret 5 $1$g9ud$PZtfNI0iO8Obfm/..D2oo/
!
!
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
!
crypto isakmp policy 3
encr aes
authentication pre-share
group 2
lifetime 3600
crypto isakmp xauth timeout 60
!
crypto isakmp client configuration group default
key ********
dns 172.16.2.11 172.16.2.2
wins 172.16.2.11 172.16.2.2
domain alg.local
pool VPN_Pool
netmask 255.255.0.0
!
!
crypto ipsec transform-set trnsfrmset esp-aes esp-sha-hmac
crypto ipsec transform-set SDM_TRANSFORMSET_1 esp-3des esp-md5-hmac
crypto ipsec transform-set SDM_TRANSFORMSET_2 esp-3des esp-md5-hmac
!
crypto ipsec profile Profile_1
set security-association lifetime seconds 28800
set security-association idle-time 28800
set transform-set trnsfrmset SDM_TRANSFORMSET_1 SDM_TRANSFORMSET_2
!
!
crypto dynamic-map dynmap 1
set security-association lifetime kilobytes 86400
set security-association lifetime seconds 28800
set security-association idle-time 14400
set transform-set trnsfrmset SDM_TRANSFORMSET_1
reverse-route
!
!
crypto map clientmap client authentication list RadiusServers
crypto map clientmap isakmp authorization list groupauth
crypto map clientmap client configuration address respond
crypto map clientmap 1 ipsec-isakmp dynamic dynmap
!
!
!
interface GigabitEthernet0/0
description Tampa LAN$ETH-LAN$
ip address 172.16.1.2 255.255.0.0
ip access-group sdm_gigabitethernet0/0_in in
no ip redirects
no ip unreachables
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
ip route-cache flow
duplex auto
speed auto
no mop enabled
!
interface GigabitEthernet0/1
description Edge Link
ip address 63.236.108.70 255.255.255.192
ip access-group 101 in
ip verify unicast reverse-path
no ip redirects
no ip unreachables
no ip proxy-arp
ip nbar protocol-discovery
ip inspect SDM_LOW out
ip flow ingress
ip flow egress
ip nat outside
ip virtual-reassembly
ip route-cache flow
duplex full
speed 10
no mop enabled
crypto map clientmap
!
interface GigabitEthernet0/3/0
description Tampa DMZ
ip address 172.17.1.1 255.255.0.0
ip access-group 100 in
no ip redirects
no ip unreachables
no ip proxy-arp
ip accounting output-packets
ip nbar protocol-discovery
ip flow ingress
ip flow egress
ip nat inside
ip virtual-reassembly
ip route-cache flow
no negotiation auto
!
ip local pool VPN_Pool 172.16.80.1 172.16.80.254
ip classless
ip route 0.0.0.0 0.0.0.0 63.236.108.65 permanent
ip route 172.17.0.0 255.255.0.0 172.16.1.1 permanent
ip route 172.20.0.0 255.255.0.0 172.16.1.1
ip route 172.25.0.0 255.255.0.0 172.16.1.1 permanent
ip flow-export source GigabitEthernet0/0
ip flow-export version 5
ip flow-export destination 172.16.2.30 2000
ip flow-top-talkers
top 10
sort-by bytes
!
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/1 overload
ip nat inside source route-map SDM_RMAP_2 interface GigabitEthernet0/1 overload
ip nat inside source route-map SDM_RMAP_3 interface GigabitEthernet0/1 overload
!
ip access-list extended sdm_gigabitethernet0/0_in
remark SDM_ACL Category=17
permit icmp any any log
permit ip any any
!
ip radius source-interface GigabitEthernet0/0
logging history errors
logging trap notifications
logging origin-id hostname
logging source-interface GigabitEthernet0/0
logging server-arp
access-list 1 remark SDM_ACL Category=2
access-list 1 permit 172.16.0.0 0.0.255.255
access-list 2 remark SDM_ACL Category=2
access-list 2 permit 172.20.0.0 0.0.255.255 log
access-list 23 permit 10.10.10.0 0.0.0.7
access-list 100 remark SDM_ACL Category=17
access-list 100 permit icmp any any log
access-list 100 permit ip any any
access-list 101 remark SDM_ACL Category=17
access-list 101 permit ip 192.168.80.0 0.0.0.255 any
access-list 101 permit ahp any host 63.236.108.70
access-list 101 permit esp any host 63.236.108.70
access-list 101 permit ip any 172.16.0.0 0.0.255.255
access-list 101 permit ip any 172.17.0.0 0.0.255.255
access-list 101 permit ip any 172.25.0.0 0.0.255.255
access-list 101 permit ip any 172.20.0.0 0.0.255.255
access-list 101 permit ip 172.16.80.0 0.0.0.255 any
access-list 101 permit icmp host 63.236.108.114 host 63.146.195.90
access-list 101 deny ip any any log
access-list 102 remark SDM_ACL Category=4
access-list 102 permit ip 172.25.0.0 0.0.255.255 any
access-list 102 permit ip 172.20.0.0 0.0.255.255 any
access-list 102 permit ip 172.16.0.0 0.0.255.255 any
access-list 102 permit ip 172.17.0.0 0.0.255.255 any
access-list 102 permit ip 63.236.108.0 0.0.0.255 any
access-list 103 remark SDM_ACL Category=2
access-list 103 permit ip 172.16.0.0 0.0.255.255 any
access-list 104 remark SDM_ACL Category=2
access-list 104 permit ip 172.20.0.0 0.0.255.255 any log
access-list 104 deny ip any 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.25.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.17.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.16.0.0 0.0.255.255 172.16.90.0 0.0.1.255
access-list 104 deny ip 172.25.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 104 deny ip 172.17.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 104 deny ip 172.16.0.0 0.0.255.255 172.16.55.0 0.0.0.255
access-list 105 remark SDM_ACL Category=2
access-list 105 deny ip 172.17.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.16.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.20.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.25.0.0 0.0.255.255 172.16.80.0 0.0.0.255
access-list 105 deny ip 172.20.0.0 0.0.255.255 any
access-list 105 deny ip 172.25.0.0 0.0.255.255 any
access-list 105 deny ip 172.17.0.0 0.0.255.255 any
access-list 105 permit ip 172.16.0.0 0.0.255.255 any
access-list 110 permit udp 172.17.0.0 0.0.255.255 any eq domain
access-list 150 permit udp any host 63.236.108.70 eq isakmp
access-list 150 permit udp any host 63.236.108.70 eq non500-isakmp
no cdp run
route-map SDM_RMAP_1 permit 1
!
route-map SDM_RMAP_2 permit 1
!
route-map SDM_RMAP_3 permit 1
match ip address 105
!
!
radius-server host 172.16.2.11 auth-port 1812 acct-port 1813
!
control-plane
!
!
!
scheduler allocate 20000 1000
!
end