Solved

Cisco PIX VPN not passing traffic

Posted on 2004-04-09
9
329 Views
Last Modified: 2013-11-16
I have a client VPN setup in a PIX firewall. The VPN connects fine, but it will not pass traffic to the inside network. The config is exactly like the config on Cisco's site, but it will not pass traffic. I am using PIX 6.3(3) and the VPN client is 4.2

Thanks,

Sean
0
Comment
Question by:smathena
9 Comments
 
LVL 1

Expert Comment

by:Nomad469
ID: 10793942
can you ping the inside from the pix ??
0
 

Author Comment

by:smathena
ID: 10793987
Yes, the connectivity from the PIX to the inside is fine. The PIX is passing traffic fine. Once I connect with the VPN, I can't ping to the inside interface or beyond from the client
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 10795193
Do your clients get an IP address in a range that is different from your inside LAN?
You'll never be able to ping the inside interface from the VPN...
Is the PIX's inside interface the default gateway for any other systems that you are trying to access?

0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 2

Expert Comment

by:jon47
ID: 10863702
I'm assuming that your client machine is running Windows.  Check on the client machine that you're not sharing any internet connections.  If internet connection sharing is enabled, then the client will connect, but not pass any traffic.

Jon
0
 
LVL 1

Expert Comment

by:briankeegan
ID: 10996781
MAke sure you peers are set correctly. if you have a edge router and a firewalll behind the edge router sometimes you will need to use the outside interface of the pix not the edge router as that is where your crypto statments are set.
0
 

Author Comment

by:smathena
ID: 10997091
I actually have solved this problem on my own, but I am not sure how to close out the question with zero points.  THe solution was to enable NAT Traversal and split-tunneling.
0
 

Expert Comment

by:jungleGeorge
ID: 11225137
Just give the points to those that were helping. Their ideas may have been all you needed to resolve the issue.  
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 15727298
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:
PAQ - Refund points

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

Tolomir
EE Cleanup Volunteer
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 15760815
PAQed with points refunded (170)

Computer101
EE Admin
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Last week, our Skyport webinar on “How to secure your Active Directory” (https://www.experts-exchange.com/videos/5810/Webinar-Is-Your-Active-Directory-as-Secure-as-You-Think.html) provided 218 attendees with a step-by-step guide for identifying Acti…
One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question