Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cisco PIX VPN not passing traffic

Posted on 2004-04-09
9
Medium Priority
?
364 Views
Last Modified: 2013-11-16
I have a client VPN setup in a PIX firewall. The VPN connects fine, but it will not pass traffic to the inside network. The config is exactly like the config on Cisco's site, but it will not pass traffic. I am using PIX 6.3(3) and the VPN client is 4.2

Thanks,

Sean
0
Comment
Question by:smathena
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 1

Expert Comment

by:Nomad469
ID: 10793942
can you ping the inside from the pix ??
0
 

Author Comment

by:smathena
ID: 10793987
Yes, the connectivity from the PIX to the inside is fine. The PIX is passing traffic fine. Once I connect with the VPN, I can't ping to the inside interface or beyond from the client
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 10795193
Do your clients get an IP address in a range that is different from your inside LAN?
You'll never be able to ping the inside interface from the VPN...
Is the PIX's inside interface the default gateway for any other systems that you are trying to access?

0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 2

Expert Comment

by:jon47
ID: 10863702
I'm assuming that your client machine is running Windows.  Check on the client machine that you're not sharing any internet connections.  If internet connection sharing is enabled, then the client will connect, but not pass any traffic.

Jon
0
 
LVL 1

Expert Comment

by:briankeegan
ID: 10996781
MAke sure you peers are set correctly. if you have a edge router and a firewalll behind the edge router sometimes you will need to use the outside interface of the pix not the edge router as that is where your crypto statments are set.
0
 

Author Comment

by:smathena
ID: 10997091
I actually have solved this problem on my own, but I am not sure how to close out the question with zero points.  THe solution was to enable NAT Traversal and split-tunneling.
0
 

Expert Comment

by:jungleGeorge
ID: 11225137
Just give the points to those that were helping. Their ideas may have been all you needed to resolve the issue.  
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 15727298
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:
PAQ - Refund points

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

Tolomir
EE Cleanup Volunteer
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 15760815
PAQed with points refunded (170)

Computer101
EE Admin
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How does someone stay on the right and legal side of the hacking world?
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question