When I had my old servers running, this was the config:
I had a range of IP address for my VPN client to use registered in the cisco pix. That range is was not the same as my windows 2000 DHCP range.
on the cisco box I have a VPN range of 192.168.111.70 to 192.168.111.81
on the windows 2000...
currently my cisco pix box is doing the DHCP. I wounder if I change it to my windows 2003 box, if that will fix the problem.
The last servers I had used the windows 2000 DHCP service with WINS, and it worked fine with the cisco gear.
When my users connect to are terminal server via VPN. They cannot resolve their own host names with in the terminal server.
But if I go into the DNS and add the "A record" with the current IP and host name, and then do a reload on the forward lookup. It works fine.
Any Idea's?
I have setup PPTP using the PIX 506e.
I can connect to the PIX with no problems via PPTP, and I get an IP address. But I cannot access anything in the LAN when I'm connected.
Any Idea's?
Fixed!
After I entered the command "isakmp nat-t"
This allows multple connections from same nat/pat address with encapsulation with UDP 4500
I can now have as many people as I want connected to the vpn. I no longer get the Reason 433 error.
Yes, when it boots off the 2nd client it will have the same IP address as the 1st client had.
I turned logging on, then tested the connections once more. This is what I got. Also note I have a ip pool of 25 addresses..., So I have no idea, why they are fighting over the same one...., But that...
This is driving me nuts. I setup ipsec vpn on my cisco pix with the wizard. It works fine...., but when I get a 2nd user to access the VPN it boots the 1st user off and gives this error code....
"Secure VPN Connection terminated by Perr. Reason 433: (Reason Not Specified by Peer)"
I'm using...
I tried using your above commands...., My PIX said it does not recognize them. I used the command like this....
access-list 102 permit tcp 192.168.111.101 255.255.255.255 any eq 5631
I’m not to familiar with configuring cisco products. It appears by default that all traffic can pass thought this box. My question is, what do I type in to lock it down properly?
I want my users just to have access to the following….
Internet, email, pcanywhere, cisco vpn
What do I type in...
Well I've use that setup and the access rules seem good, but on the NAT side it just maps my inside ip to my outside ip. It has no ports mapped with NAT. I think that's where my problem is. I don't want how to mapp the gre and pptp ports with NAT.
OK here's the setup.
I have a Windows 2000 PPTP server and a PIX 506E on the inside network. I have a client that needs to connect to the server via pptp vpn outside of the network. I only have 1 public address at each location.
So here's the numbers:
Windows 2000 PPTP Server:
inside...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.