Solved

Cisco PIX VPN not passing traffic

Posted on 2004-04-09
9
348 Views
Last Modified: 2013-11-16
I have a client VPN setup in a PIX firewall. The VPN connects fine, but it will not pass traffic to the inside network. The config is exactly like the config on Cisco's site, but it will not pass traffic. I am using PIX 6.3(3) and the VPN client is 4.2

Thanks,

Sean
0
Comment
Question by:smathena
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
9 Comments
 
LVL 1

Expert Comment

by:Nomad469
ID: 10793942
can you ping the inside from the pix ??
0
 

Author Comment

by:smathena
ID: 10793987
Yes, the connectivity from the PIX to the inside is fine. The PIX is passing traffic fine. Once I connect with the VPN, I can't ping to the inside interface or beyond from the client
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 10795193
Do your clients get an IP address in a range that is different from your inside LAN?
You'll never be able to ping the inside interface from the VPN...
Is the PIX's inside interface the default gateway for any other systems that you are trying to access?

0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 2

Expert Comment

by:jon47
ID: 10863702
I'm assuming that your client machine is running Windows.  Check on the client machine that you're not sharing any internet connections.  If internet connection sharing is enabled, then the client will connect, but not pass any traffic.

Jon
0
 
LVL 1

Expert Comment

by:briankeegan
ID: 10996781
MAke sure you peers are set correctly. if you have a edge router and a firewalll behind the edge router sometimes you will need to use the outside interface of the pix not the edge router as that is where your crypto statments are set.
0
 

Author Comment

by:smathena
ID: 10997091
I actually have solved this problem on my own, but I am not sure how to close out the question with zero points.  THe solution was to enable NAT Traversal and split-tunneling.
0
 

Expert Comment

by:jungleGeorge
ID: 11225137
Just give the points to those that were helping. Their ideas may have been all you needed to resolve the issue.  
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 15727298
No comment has been added to this question in more than 21 days, so it is now classified as abandoned..
I will leave the following recommendation for this question in the Cleanup topic area:
PAQ - Refund points

Any objections should be posted here in the next 4 days. After that time, the question will be closed.

Tolomir
EE Cleanup Volunteer
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 15760815
PAQed with points refunded (170)

Computer101
EE Admin
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Uncontrolled local administrators groups within any organization pose a huge security risk. Because these groups are locally managed it becomes difficult to audit and maintain them.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question