Solved

IPSec Tunnel Tru. ISA or Microsoft Forefront Threat Management Gateway

Posted on 2009-05-19
3
794 Views
Last Modified: 2013-12-04
I have ISA2006 server installed on my office network and all the pc on the network are  using SNAT. some of the users on the network  have nortel vpn client to connect to corporate head office. Through ISA2006/TMG SNAT nortel vpn client fails to establish a tunnel.
The policy for ISA is set to allow all traffice from inside(internal network) to external and no other restriction is added in the policy.
nortel client version is v04_87
0
Comment
Question by:Manojc3
  • 2
3 Comments
 
LVL 29

Accepted Solution

by:
pwindell earned 500 total points
ID: 24487066
It is failing due to NAT-T  (NAT Traversal)

IPSec is not capable of running over NAT.  If the Nortel Client was using PPTP it would be working fine.  To overcome the IPSec's failure of NAT requires NAT Traversal.  

Make sure the Nortel Client is configured to use NAT-T

These links may help:
http://www.isaserver.org/articles/IPSec_Passthrough.html
http://forums.isaserver.org/m_2002012471/tm.htm
0
 

Author Comment

by:Manojc3
ID: 24603930
Yes I downloaded the new notel vpn client 6.0 which has NATT support. It working now. Thank you.
0
 
LVL 29

Expert Comment

by:pwindell
ID: 24604025
Very good.  Glad it worked out for you.
 
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host Profile issue on Esxi 5.5 U3a 6 545
Encrypted Laptop running Linux 3 122
Accessing SQL Server Instance from outside the network 29 103
is this a virus? 3 39
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question