[EMAIL PROTECTED] wrote: > > I've been working on trying to eliminate the variables on each > side of the > VPN.... The unfortunate thing is, the other side is home, so I > usually wait > until the late evening/night to work on the remote side.... > That's also the > reason for the "frustrating" comment earlier. I know I could > SSH into it, > but, this isn't the only project I've been working on (as I'm > sure a lot of > you can relate)... So I'm going to hopefully wrap it up by > this weekend.
No problem, but do let us know what you learn! :-) Thanks. A few more comments below... > > One of the main issues I was running into was the remote > network was > subnetted from the main network so the ACLs got a little > confusing. I was thinking that ACLs might be related to the problem. On the crypto ACL that defines interesting packets that must be protected by IPSec, you have to get addresses and any protocols, ports, etc., just right. It doesn't help that PIX doesn't do the mask the same as IOS. While troubleshooting, you might want to make this access list pretty general purpose using big blocks of addresses and not worrying about ports. Now, don't confuse this with general-purpose access lists. This crypto access list is just for defining traffic that must be protected. > So I've > changed the IP scheme on the remote side... This also brings > me to another > question; a rather newbie one, what other ports should be > open(beside 500)? > I received an email from someone saying 50 & 51, does that > sound right? If That's a different issue from the crypto access list, but also very important, (although from what you were saying about your symptoms earlier, I don't think that's the problem.) But it's possible for IPSec to fail because general-purpose access lists are denying the UDP port used by ISAKMP, which is 500. In addition, you should make sure that IP protocol types 50 and 51 are allowed. These are used by IPSec's Encapsulating Security Payload and Authentication Header, respectively. They aren't UDP or TCP port numbers; they are IP protocol numbers. I also read this confusing warning in the VPN book I'm reading. It could be relevant: By default, all IPSec traffic is disallowed through the PIX Firewall. A NAT and conduit/access list must exist for IPSec traffic to flow through the firewall, as in any other traffic flow. However, if a crypto map is assigned to an interface, IPSec traffic for that map is allowed to bypass the adaptive security algorithm. So, you're probably OK, there, but maybe not. Why DO they make these things so complicated? :-) Keep us posted. Thank-you! Priscilla > you have the, "allow any out and return in", settings for > firewall rules... > Do the ports still need to be opened (I would think not since > there is the > nat0 command?)? The other issue I'm looking into is the MTU > size.... > > Once I establish the tunnel and maintain connectivity I'll let > y'all know > what I find.... > > Thanx for the help, > mkj > > -----Original Message----- > From: Priscilla Oppenheimer [mailto:[EMAIL PROTECTED]] > Sent: Thursday, August 01, 2002 2:54 PM > To: [EMAIL PROTECTED] > Subject: RE: VPN not connecting [7:50144] > > > Lidiya White wrote: > > > > Capture debugs on both ends at the same time. Should be more > > helpful. > > Make sure both ends have "isakmp identify address"... > > > > -- Lidiya White > > Sounds like a good idea. So Mike, what was the problem? It sure > would help > those of learning IPSec to hear how you resolved the issue. > Thanks. > > Priscilla > > > > > > > > -----Original Message----- > > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On > > Behalf Of > > [EMAIL PROTECTED] > > Sent: Tuesday, July 30, 2002 4:05 PM > > To: [EMAIL PROTECTED] > > Subject: RE: VPN not connecting [7:50144] > > > > The ACLs are mirrors of each other and the transform sets > > match.... > > Very > > frustrating.... > > > > -----Original Message----- > > From: Silju Pillai [mailto:[EMAIL PROTECTED]] > > Sent: Tuesday, July 30, 2002 2:29 PM > > To: [EMAIL PROTECTED] > > Subject: RE: VPN not connecting [7:50144] > > > > > > Hi, > > > > Pls check the interesting traffic configured > > (access list) configured at both ends. Your transform set > > parameters > > too. It > > should be same. > > > > As you are receiving IKMP_no_error your isakmp policies are > > working > > fine. > > > > regards > > Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=50483&t=50144 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

