David, Have you got a Syslog server where you can check the errors appearing, then send them to Cisco or who ever is your CISCO support, looking at the logs it should give a good indication onto why you clients a droping the VPN, maybee they need another client as well ?
Regards, Cesar "David Gillett" <[EMAIL PROTECTED] To: "'stephen at unix dot za dot net'" da.edu> <[EMAIL PROTECTED]> cc: <[EMAIL PROTECTED]> 12/08/2003 02:07 Subject: RE: Cisco Workaround Please respond to gillettdavid Whether your VPN users need GRE or ESP+AH will depend on what particular VPN technology they use. (In our case, some users need one and some the other, but that's probably not typical.) David Gillett > -----Original Message----- > From: stephen at unix dot za dot net [mailto:[EMAIL PROTECTED] > Sent: August 10, 2003 23:27 > To: David Gillett > Cc: 'Douglas Gullett'; 'Adam Overlin'; > [EMAIL PROTECTED] > Subject: RE: Cisco Workaround > > > > hi guys, > > all the posts i've seen replying to this guy's problem don't included > references to needing GRE (proto 47). > > it is needed for VPN connectivity, who are we all just > assuming everyone > knows this? (even though there's no mention of it) > > > stephen > > > > On Mon, 4 Aug 2003, David Gillett wrote: > > > ESP is protocol 50 and AH is 51. Neither opening 52 nor > > leaving 50 closed is likely to help. > > > > David Gillett > > > > > -----Original Message----- > > > From: Douglas Gullett [mailto:[EMAIL PROTECTED] > > > Sent: August 2, 2003 08:49 > > > To: Adam Overlin; [EMAIL PROTECTED] > > > Subject: RE: Cisco Workaround > > > > > > > > > Adam, > > > > > > If the "cheat" sheet you are referring to is the Cisco > > > Security Alert, I am > > > guessing that you put in their access-list. For IPSEC you > > > need to have > > > Protocol Port 51 (ESP) and Protocol Port 52 (AH) open, as > > > well as UDP Port > > > 500 (isakmp). > > > > > > Doug > > > > > > -----Original Message----- > > > From: Adam Overlin [mailto:[EMAIL PROTECTED] > > > Sent: Thursday, July 31, 2003 12:59 PM > > > To: [EMAIL PROTECTED] > > > Subject: RE: Cisco Workaround > > > > > > > > > I just joined this list so I haven't seen the whole thread on > > > this issue, > > > thus my company's particular issue may have been discussed > > > already, but I > > > thought I would see if I could get some help anyway. > > > > > > Background: > > > We have a Cisco 827 router and a PIX 506e locally. Router > > > being in front of > > > the PIX. We also have a co-location facility that we are > > > connected via a > > > constant VPN tunnel. There we have a PIX 515e. The two > > > pixes are what > > > control the VPN/encryption. > > > > > > Issue: > > > The pixes don't run IOS so we didn't have to worry about > > > upgrading those. > > > However, the router does. So we upgraded the router to the > > > latest version. > > > Everything worked ok, except, the VPN tunnel. That got > > > knocked out. Keep > > > in mind that I am no Cisco expert. I did the upgrade with > > > the help of a > > > *cheat* sheet that Cisco sent us. All I did was copy the > > > information. I > > > didn't really understand what I was actually typing into the > > > console (we > > > have another network consultant that is responsible for the > > > "understanding > > > part, although he didn't know why it wasn't working either). :) > > > > > > So after a little messing around we reverted back to the > old IOS and > > > everything was peachy. A couple days later they sent us > > > another version to > > > upgrade with and that did the same thing. Needless to say, > > > we are still > > > upgradeless. > > > > > > If there are any suggestions out there, I would really > > > appreciate it. If I > > > didn't give enough info, please let me know, and I will get > > > you whatever you > > > need (within my power of course). > > > > > > Thanks in advance, > > > Adam > > > > > > > > > -------------------------------------------------------------- > > > ------------- > > > -------------------------------------------------------------- > > > -------------- > > > > > > > > > -------------------------------------------------------------- > > > ------------- > > > -------------------------------------------------------------- > > > -------------- > > > > > > > > -------------------------------------------------------------- > ------------- > > > -------------------------------------------------------------- > -------------- > > > --------------------------------------------------------------------------- ---------------------------------------------------------------------------- --------------------------------------------------------------------------- ----------------------------------------------------------------------------