Hi All,
I'm hoping someone can help me with this.
I have ASL 4.016 running with three interfaces: Internal, External, DMZ and the external IF has a static address. My problem is with dropped traffic from a RoadWarrior IPSec VPN connection. I'm using x509 certs for auth.
Scenario 1:
Endpoint Definition
Local Endpoint : External
Remote Endpoint : Any
Auto Packet Filter : ON
Subnet Definition
Local Subnet : Internal Network
Remote Subnet : None
Remote Keys
My_Key using virtual IP 10.12.2.224, Auto packet filter is OFF and I have used the Packet Filter interface to add a wide open rule (for testing) that says allow any to any from IPSec_My_Key.
Using this config the VPN connection is established from the client with no problem. Once the connection is established I am not able to ping any of the IPs on the internal net, can't do nslookups using an "internal" name server, etc. The only dropped traffic I see in the logs is from my virtual IP to an internal host on port 137 UDP.
Second Config
If I choose not to use a virtual IP, I can ping to the Internal net and everything works fine.
I want to use virtual IPs to have more control over the rules. Does anyone have any suggestions?
Thanks,
Clay
This thread was automatically locked due to age.