Setup VPN connection between PIX 506e and Cisco VPN Client

Posted on 2004-09-02
Last Modified: 2010-04-12

I am trying to establish a VPN connection between PIX 506e and Cisco Client 4.01 I have had little luck with various results.   I ocasionally get connected but when I do the PIX stops responding to internet requests.  Other times I simply cannot get connected.

I used the VPN wizard and assigned a group name and password.  I then setup the same info in the CISCO client.  When I hit connect I usually don't get conencted but rather start dropping packets on the PIX side.   Sometimes I can connect and recieve an IP address from the pool but I can not ping anything.   The pool is on the same subnet as the LAN   Basically I am looking for help setting this conenction up the proper way.

Question by:draposo
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
LVL 36

Expert Comment

ID: 11965952
Hi draposo,
Here are a few links:-
PIX configuration examples -
PIX configuration basics -
PIX ssh configuration -
My Pages:-
PIX as multi user VPN server -
PIX as a home DSL firewall -

Firstly the VPN pool should be on a different subnet than your internal IP range. This is probably the cause of your problems.
Also client 4.01 is fairly old and so I would try and get an updated version.

Author Comment

ID: 11968263
It seems like the actual problem that I am having might have ot do with VPN passthrough.  I can connect to the VPN PIX using the VPN client ( I reset the config) to SITE 1.   It looks like services on SITE 1 are OK but I also need to access services at SITE 2 which is connected via a Site-to-Site VPN tunnel but I can't get through.   Both sites are running PIX software.
I can ping site 1 LAN addresses but I can't ping Site 1 VPN router.  I can not ping anything at site 2.  However, if I am connected only through the site-to-site traffic flows between these without a problem.

LVL 36

Expert Comment

ID: 11971433
Can you clarify where exactly you are connecting from in these two cases.

You can VPN from the internet to SITE1 ok?
When you are connected to SITE1 via VPN you cannot talk to the servers at SITE2?

Is the PIX you connect to at SITE1 also the same PIX used for the site-site VPN?
Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features


Author Comment

ID: 11977014

first of all thanks for your patience in getting responses from me and your help. I think I can clarify the situation a bit better today than yesterday.   Forget about the SITE to SITE VPN .. it makes sense that that does not work because a PIX will not allow you to traverse the same interface in two directions.  So here is the long of it.

I have a user who is going to be connecting to our Network (SITE) via a VPN over a wireless ISP (ISP1).   The user is using the Cisco VPN client and the SITE is a Cisco PIX 506e .  They can establish connectivity and can also connect via the VPN tunnel.  However, once they are connected they cannot do anything local at the SITE.
I found out today that this is only when on ISP1.  When I connect to another ISP (ISP2) and open the exact  same VPN tunnel they can do whatever they want.   It seems to have something to do with Ipsec over NAT .. but when I put a router between the client and ISP2 they can still connect.  So .. is the issue on the ISP side or is there something on the PIX or VPN client that I must enable?   Thanks again for any help you can provide.

LVL 36

Accepted Solution

grblades earned 500 total points
ID: 11977448
It looks line there is no NAT involved so it wont be that.

I expect that ISP1 is blocking esp (ip protocol number 50) which is the protocol used to carry the encrypted data. If this is blocked you will be able to authenticate as this uses ISAKMP (UDP port 500) but not transfer any data.

Author Comment

ID: 11996439

Thanks for the help.  We are up and running oven the VPN.

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Site-to-Site VPN Cisco ASA 5505 to Cisco RV320 4 261
Windows 10 VPN? 6 100
ASA Tunnel 18 49
VPN Server setup confirmation - how can you tell internet access is routed there? 3 22
Some of you may have heard that SonicWALL has finally released an app for iOS devices giving us long awaited connectivity for our iPhone's, iPod's, and iPad's. This guide is just a quick rundown on how to get up and running quickly using the app. …
Let’s list some of the technologies that enable smooth teleworking. 
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question