Link to home
Start Free TrialLog in
Avatar of Uber_ms
Uber_msFlag for United States of America

asked on

What's wrong with my VPN config?

I'm trying to setup a VPN to connect to my office LAN when I'm away, but I can't get it to work. Do you see any problems with my config?
c1841#sh ver
Cisco IOS Software, 1841 Software (C1841-ADVENTERPRISEK9-M), Version 12.4(24)T, RELEASE SOFTWARE (fc1)
ROM: System Bootstrap, Version 12.4(13r)T, RELEASE SOFTWARE (fc1)
c1841 uptime is 4 days, 22 hours, 44 minutes
System returned to ROM by power-on
System image file is "flash:c1841-adventerprisek9-mz.124-24.T.bin"
 
 
Current configuration : 7042 bytes
!
version 12.4
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname c1841
!
boot-start-marker
boot-end-marker
!
aaa new-model
!
!
aaa authentication login default local
aaa authorization exec default local
aaa authorization network vpn-clientgroup local
!
!
aaa session-id common
!
ip source-route
!
!
ip dhcp excluded-address 192.168.0.1 192.168.0.99
ip dhcp excluded-address 192.168.0.126 192.168.0.254
!
ip dhcp pool Public
   network 192.168.0.0 255.255.255.0
   dns-server x.x.x.x
   default-router 192.168.0.254
!
!
ip cef
ip domain name domain.local
ip name-server 192.168.100.1
ip name-server 192.168.100.2
no ipv6 cef
!
multilink bundle-name authenticated
!
!
crypto pki trustpoint TP-self-signed-1328172832
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-1328172832
 revocation-check none
 rsakeypair TP-self-signed-1328172832
!
!
crypto pki certificate chain TP-self-signed-1328172832
 certificate self-signed 01
!
username admin privilege 15 password 7 XXXXXXX
archive
 log config
  hidekeys
!
!
crypto isakmp policy 1
 encr aes 256
 authentication pre-share
 group 2
crypto isakmp client configuration address-pool local dynpool
!
crypto isakmp client configuration group vpn-clientgroup
 key MYKEY
 dns 192.168.100.1 192.168.100.2
 domain domain.local
 pool dynpool
!
!
crypto ipsec transform-set esp-aes-sha esp-aes 256 esp-sha-hmac
!
crypto dynamic-map dynmap 1
 set transform-set esp-aes-sha
!
!
crypto map dynmap isakmp authorization list vpn-clientgroup
crypto map dynmap client configuration address respond
crypto map dynmap 1 ipsec-isakmp dynamic dynmap
!
!
interface Loopback0
 no ip address
!
interface FastEthernet0/0
 ip address x.x.x.x 255.255.255.248
 ip nat outside
 ip virtual-reassembly
 speed 100
 full-duplex
 crypto map dynmap
!
interface FastEthernet0/1
 ip address 192.168.100.254 255.255.255.0
 ip nat inside
 ip virtual-reassembly
 speed 100
 full-duplex
 no mop enabled
!
interface FastEthernet0/0/0
 shutdown
!
interface FastEthernet0/0/1
 shutdown
!
interface FastEthernet0/0/2
 shutdown
!
interface FastEthernet0/0/3
 shutdown
!
interface Dot11Radio0/1/0
 ip address 192.168.0.254 255.255.255.0
 ip access-group 120 in
 ip nat inside
 ip virtual-reassembly
 !
 ssid MYSSID
 !
 speed basic-1.0 basic-2.0 basic-5.5 basic-6.0 basic-9.0 basic-11.0 basic-12.0 basic-18.0 basic-24.0 basic-36.0 basic-48.0 basic-54.0
 station-role root
!
interface Vlan1
 no ip address
 shutdown
!
ip local pool dynpool 192.168.110.100 192.168.110.150
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 x.x.x.x
ip http server
ip http access-class 10
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
!
ip nat inside source list 10 interface FastEthernet0/0 overload
ip nat inside source list 20 interface FastEthernet0/0 overload
!
access-list 10 permit 192.168.100.0 0.0.0.255
access-list 20 permit 192.168.0.0 0.0.0.255
access-list 120 deny   ip 192.168.0.0 0.0.0.255 192.168.100.0 0.0.0.255
access-list 120 permit ip any any
!
line con 0
line aux 0
line vty 0 4
 transport input telnet ssh
line vty 5 15
 transport input telnet ssh
!
scheduler allocate 20000 1000
end

Open in new window

ASKER CERTIFIED SOLUTION
Avatar of JFrederick29
JFrederick29
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Uber_ms

ASKER

This is a VPN problem. I'm able to get out to the Internet from those two subnets.
Yeah, but here's the problem.  When you try to communicate between the VPN and LAN subnet, the router is NAT'ng the traffic and therefore communication fails.  You need to exclude LAN to VPN communication from NAT to enable communication.
Avatar of Uber_ms

ASKER

Okay, still isn't working. Here's a copy of my Cisco VPN Client log...
Cisco Systems VPN Client Version 5.0.05.0290
Copyright (C) 1998-2009 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.0.6001 Service Pack 1
 
33     08:18:12.834  04/14/09  Sev=Info/4	CM/0x63100002
Begin connection process
 
34     08:18:12.865  04/14/09  Sev=Info/4	CM/0x63100004
Establish secure connection
 
35     08:18:12.865  04/14/09  Sev=Info/4	CM/0x63100024
Attempt connection with server "24.x.x.x"
 
36     08:18:12.874  04/14/09  Sev=Info/6	IKE/0x6300003B
Attempting to establish a connection with 24.x.x.x.
 
37     08:18:12.880  04/14/09  Sev=Info/4	IKE/0x63000001
Starting IKE Phase 1 Negotiation
 
38     08:18:12.888  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 24.x.x.x
 
39     08:18:12.901  04/14/09  Sev=Info/4	IPSEC/0x63700008
IPSec driver successfully started
 
40     08:18:12.901  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
41     08:18:12.902  04/14/09  Sev=Info/5	IKE/0x6300002F
Received ISAKMP packet: peer = 24.x.x.x
 
42     08:18:12.902  04/14/09  Sev=Warning/2	IKE/0xE300009B
Invalid SPI size (PayloadNotify:116)
 
43     08:18:12.902  04/14/09  Sev=Info/4	IKE/0xE30000A6
Invalid payload: Stated payload length, 568, is not sufficient for Notification:(PayloadList:149)
 
44     08:18:12.902  04/14/09  Sev=Warning/3	IKE/0xA3000058
Received malformed message or negotiation no longer active (message id: 0x00000000)
 
45     08:18:18.000  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
46     08:18:18.000  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
47     08:18:23.071  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
48     08:18:23.071  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
49     08:18:28.140  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
50     08:18:28.140  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
51     08:18:33.211  04/14/09  Sev=Info/4	IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=530F89A533C56B7E R_Cookie=B993A5B326B0C113) reason = DEL_REASON_PEER_NOT_RESPONDING
 
52     08:18:33.711  04/14/09  Sev=Info/4	IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=530F89A533C56B7E R_Cookie=B993A5B326B0C113) reason = DEL_REASON_PEER_NOT_RESPONDING
 
53     08:18:33.711  04/14/09  Sev=Info/4	CM/0x63100014
Unable to establish Phase 1 SA with server "24.x.x.x" because of "DEL_REASON_PEER_NOT_RESPONDING"
 
54     08:18:33.711  04/14/09  Sev=Info/5	CM/0x63100025
Initializing CVPNDrv
 
55     08:18:33.735  04/14/09  Sev=Info/6	CM/0x63100046
Set tunnel established flag in registry to 0.
 
56     08:18:33.735  04/14/09  Sev=Info/4	IKE/0x63000001
IKE received signal to terminate VPN connection
 
57     08:18:33.743  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
58     08:18:33.743  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
59     08:18:33.743  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
60     08:18:33.743  04/14/09  Sev=Info/4	IPSEC/0x6370000A
IPSec driver successfully stopped

Open in new window

Do you get a login authentication box? Do you connect but can't access anything (doesn't look like it based on the logs).  Can you change the client logging to high and post the log again.
Avatar of Uber_ms

ASKER

No I never get a login box. That log is set to high.
Are you sure you have typed the group name correctly and preshared key?  Both are case sensitive:

group = vpn-clientgroup
group password = MYKEY
SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of Uber_ms

ASKER

I'm positive I typed them correctly. With those changes, still isn't working. Here's a new log:
Cisco Systems VPN Client Version 5.0.05.0290
Copyright (C) 1998-2009 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Windows, WinNT
Running on: 6.0.6001 Service Pack 1
 
61     09:17:30.704  04/14/09  Sev=Info/4	CM/0x63100002
Begin connection process
 
62     09:17:30.738  04/14/09  Sev=Info/4	CM/0x63100004
Establish secure connection
 
63     09:17:30.739  04/14/09  Sev=Info/4	CM/0x63100024
Attempt connection with server "24.x.x.x"
 
64     09:17:30.747  04/14/09  Sev=Info/6	IKE/0x6300003B
Attempting to establish a connection with 24.x.x.x.
 
65     09:17:30.752  04/14/09  Sev=Info/4	IKE/0x63000001
Starting IKE Phase 1 Negotiation
 
66     09:17:30.761  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 24.x.x.x
 
67     09:17:30.775  04/14/09  Sev=Info/4	IPSEC/0x63700008
IPSec driver successfully started
 
68     09:17:30.775  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
69     09:17:30.775  04/14/09  Sev=Info/5	IKE/0x6300002F
Received ISAKMP packet: peer = 24.x.x.x
 
70     09:17:30.775  04/14/09  Sev=Warning/2	IKE/0xE300009B
Invalid SPI size (PayloadNotify:116)
 
71     09:17:30.775  04/14/09  Sev=Info/4	IKE/0xE30000A6
Invalid payload: Stated payload length, 568, is not sufficient for Notification:(PayloadList:149)
 
72     09:17:30.775  04/14/09  Sev=Warning/3	IKE/0xA3000058
Received malformed message or negotiation no longer active (message id: 0x00000000)
 
73     09:17:36.146  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
74     09:17:36.146  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
75     09:17:41.217  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
76     09:17:41.217  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
77     09:17:46.287  04/14/09  Sev=Info/4	IKE/0x63000021
Retransmitting last packet!
 
78     09:17:46.287  04/14/09  Sev=Info/4	IKE/0x63000013
SENDING >>> ISAKMP OAK AG (Retransmission) to 24.x.x.x
 
79     09:17:51.357  04/14/09  Sev=Info/4	IKE/0x63000017
Marking IKE SA for deletion  (I_Cookie=302D007DBC9747AE R_Cookie=B993A5B3B6EA2685) reason = DEL_REASON_PEER_NOT_RESPONDING
 
80     09:17:51.857  04/14/09  Sev=Info/4	IKE/0x6300004B
Discarding IKE SA negotiation (I_Cookie=302D007DBC9747AE R_Cookie=B993A5B3B6EA2685) reason = DEL_REASON_PEER_NOT_RESPONDING
 
81     09:17:51.858  04/14/09  Sev=Info/4	CM/0x63100014
Unable to establish Phase 1 SA with server "24.x.x.x" because of "DEL_REASON_PEER_NOT_RESPONDING"
 
82     09:17:51.858  04/14/09  Sev=Info/5	CM/0x63100025
Initializing CVPNDrv
 
83     09:17:51.881  04/14/09  Sev=Info/6	CM/0x63100046
Set tunnel established flag in registry to 0.
 
84     09:17:51.881  04/14/09  Sev=Info/4	IKE/0x63000001
IKE received signal to terminate VPN connection
 
85     09:17:52.889  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
86     09:17:52.889  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
87     09:17:52.889  04/14/09  Sev=Info/4	IPSEC/0x63700014
Deleted all keys
 
88     09:17:52.890  04/14/09  Sev=Info/4	IPSEC/0x6370000A
IPSec driver successfully stopped

Open in new window

Okay, so I just pasted your config on one of my test routers and am able to connect fine.

Do you have connectivity to the router?  Firewall in front?
Avatar of Uber_ms

ASKER

No, nothing in front except a bridged DSL modem.
You're right, I'm connected now. I connected via my iPhone, my laptop was on my internal WLAN, not my neighbors...


Thanks.
No prob.  That would do it.