Cannot connect to PPTP VPN

am working on setting up a VPN on my MS Directaccess server. technically the vpn is up and running and working already. it is using a certificate that is issues to the DA server by the DA server. My domain joined PC's connect fine. I can also connect a non domain joined machine if I import that certificate into the PC. However I cannot connect any OSX clients or my android phone.  We have opened up port 1723 on the firewall.  I have tried to connect from my home and from another businesss locally to make sure it wasnt just my home router causing the issue for some reason.
I get this in the osx console log (I replaced the external IP with 1.1.1.1 for posting this online)
3/19/14 7:55:21 AM pppd[6282] pppd 2.4.2 (Apple version 412.5.70) started by admin, uid 501
3/19/14 7:55:24 AM pppd[6282] PPTP connecting to server '1.1.1.1' (1.1.1.1)...
3/19/14 7:55:24 AM pppd[6282] PPTP connection established.
3/19/14 7:55:24 AM pppd[6282] PPTP connection established.
3/19/14 7:55:24 AM pppd[6282] Connect: ppp0 <--> socket[34:17]
3/19/14 7:55:52 AM login[6318] USER_PROCESS: 6318 ttys001
3/19/14 7:55:54 AM pppd[6282] LCP: timeout sending Config-Requests
3/19/14 7:55:54 AM pppd[6282] Connection terminated.
3/19/14 7:55:54 AM pppd[6282] PPTP disconnecting...
3/19/14 7:55:54 AM pppd[6282] PPTP disconnected
On the directaccess server I get this in the event viewer everytime the OSX client tries to connect.  This at least proves that I can at least connect to the server from the outside.
Event 20209, RasMan
A connection between the VPN server and the VPN client 24.97.100.42 has been established, but the VPN connection cannot be completed. The most common cause for this is that a firewall or router between the VPN server and the VPN client is not configured to allow Generic Routing Encapsulation (GRE) packets (protocol 47).
Im assuming this isnt a port or protocol issus since I can connect via my non domain joined Windows PC.  Im out of ideas as to what I can do next

Here is a snapshot of my console
http://imgur.com/pYFprPk

Similar Messages

  • Newest mac os x 10.9.1 cannot connect to PPTP VPN

    I've just updated my mac to os x 10.9.1 this morning. After that my PPTP vpn no longer worked. Anyone knows what could I do?
    Thanks!!!!

    Hello Summerland1975,
    Welcome to the HP Forums.
    I see that you are having an issue with installing the printer to your Mac.
    Please remove any cables that connect the printer to the Mac and leave them off.  Please then click on the following link for the HP Officejet 7610 series Full Feature Software and Drivers - OS X 10.9 Mavericks.
    If you are still having issues, please feel free to write me back.
    Thank you.
    Click the “Kudos Thumbs Up" at the bottom of this post to say “Thanks” for helping!
    Please click “Accept as Solution ” if you feel my post solved your issue, it will help others find the solution.
    W a t e r b o y 71
    I work on behalf of HP

  • Can't connect to PPTP-VPN server...

    When attempting to connect to a DD-WRT PPTP VPN server I kept receiving the general "Can't connect to PPTP-VPN server." message. All of the settings were exactly correct and tested on a Windows laptop. I began writing this because I didn't have any other ideas but half way through it (out of the blue) decided to attempt connecting. It worked!
    The only thing I did different was delete the /Library/Preferences/SystemConfiguration contents and reboot.
    Let's hope it continues to work. Posting this in case anyone else has the same error as I.

    A follow up on the VPN issue: it would only work if my laptop's wireless was tethered off of my Android phone - any other connection would connect to the VPN and get an IP but I couldn't ping anything. Also, after rebooting, I get the exact same damning error message now and any combination of rebooting and removing/renaming (don't ever delete system files!) /Library/Preferences/SystemConfiguration/* hasn't fixed the issue.
    I very much hope Apple releases an update soon for this - it's a serious inconvenience! It must be a network stack issue too because I've tried many 3rd party applications that barf as well.

  • Cannot connect to L2TP VPN from iOS devices

    This weekend I decided to perform a hard drive upgrade on my little 2009 Mac mini that I run as a homespun server as a hobby.  In the process, I thought it would be worthwhile to flatten the whole thing and start again from fresh.
    However, in doing so, I no longer seem to be able to connect to it's VPN from an iOS device.  Both my iPhone 6 (iOS 8.1.3) and iPad 3rd Gen (iOS 8.1.3) cannot connect to the VPN server over an L2TP connection – either on my local network or over 3G, even if the local IP is provided instead of a host name.
    Interestingly though, my MacBook Pro has no issues connecting over L2TP when tethered to my iPhone's 4G.  It can dial back home and authenticate successfully.
    The settings are exactly the same on both as both are governed under a single profile containing the VPN settings and login details.
    It used to work before the hard drive upgrade, but can't remember the last time I used VPN on my iPhone.  Just wondering if this is a bug in iOS 8.1.x?
    iOS reports "The L2TP-VPN server did not respond".  Additionally, there is absolutely nothing in the Server's console for VPN or 'racoon'.  In the past when I've had issues, the connect is made but doesn't authenticate or some such.  This just doesn't get to the server in any way shape or form.
    Any ideas?

    I believe the problem is in iOS, as I am experiencing the same issue.
    I have a Yosemite Server running L2TP VPN server and my Mac connects flawless, while neither the iPhone nor the iPad (both 8.2) are able to connect.
    The error is the same "The L2TP-VPN server did not respond" and by looking at the server's log it seems iOS didn't even try to connect.
    I have tried changing the server address in iOS with the corresponding IP, but the results it's the same.
    Maybe a network setting reset?

  • Connman cannot connect over pptp

    I was trying to set up a pptp VPN with connman. However, even after creating a config file in /var/lib/connman-vpn, I seem to not be able to connect to the vpn. The file (/var/lib/connman-vpn/kuins.config) is:
    [global]
    Name = KUINS
    Description = Connect to the VPN
    [provider_PPTP]
    Type = PPTP
    Name = Connection to KUINS using pptp
    Host = pptp0.kuins.kyoto-u.ac.jp
    PPTP.User = xxx
    PPTP.Password = "xyz"
    PPPD.RequireMPPE128
    PPPD.NoDeflate
    PPPD.NoBSDComp
    This particular PPTP VPN does not require a domain, so I did not add that option. I can confirm that I can connect to it using my credentials and the instructions given on this wiki page.
    Upon running:
    # connmanctl
    connmanctl> vpnagent on
    VPN Agent registered
    connmanctl> vpnconnections
    connmanctl>exit
    There is no output to vpnconnections. I would like to use connman over netctl as it provides much better speed for dhcp ethernet for me, however, if it is necessary for me to be able to connect to this PPTP VPN. Unfortunately, there is no other way (e.g. OpenVPN) for me to connect to it.
    Also, unfortunately, it seems that I cannot use pon and poff in order to enable/disable this VPN if I use connman.
    $ sudo pon kuins
    $ sudo ip route add default dev ppp0
    RTNETLINK answers: File exists
    Unfortunately, it seems not to be, as traffic certainly does not get routed through this VPN. My organisation requires that I use this VPN to connect to anything over port 80, and if that is not happening, I simply cannot connect. Which is exactly what happens here.
    Any ideas as to what to do?
    Last edited by genghizkhan91 (2014-05-10 08:57:41)

    Anybody?

  • Cannot connect to RV110w VPN error 619

    Hello,
    I'm having problems logging into my RV110w using either quickvpn or a windows pptp client connection....
    I've been following the guide here but I just can't connect....I can connect via remote management however....
    https://supportforums.cisco.com/document/124251/remote-vpn-tunnel
    So  :
    IPSec, PPTP and L2Tp enabled.
    RV110w firewall enabled
    Block WAN Request enabled
    Remote Management enabled - port 443
    MPEE Encryption Enabled
    Netbios over VPN Enabled
    2 Clients created one for quickvpn and one for pptp.
    Win 7 firewall enabled at remote end with rull to allow inbound ICMP Echo.
    Exported Certificate and copied to the quickvpn install folder.
    Disabled all other network adapters
    QuickVPN tries to connect then shows a message listing possible reasons for a failed connection....
    The quickvpn log shows:
    2015/02/01 12:14:58 [STATUS]OS Version: Windows 7
    2015/02/01 12:14:58 [STATUS]Windows Firewall Domain Profile Settings: ON
    2015/02/01 12:14:58 [STATUS]Windows Firewall Private Profile Settings: ON
    2015/02/01 12:14:58 [STATUS]Windows Firewall Private Profile Settings: ON
    2015/02/01 12:14:58 [STATUS]One network interface detected with IP address 192.168.1.79
    2015/02/01 12:14:58 [STATUS]Connecting...
    2015/02/01 12:14:58 [DEBUG]Input VPN Server Address = 90.2.30.86
    2015/02/01 12:14:58 [STATUS]Connecting to remote gateway with IP address: 90.2.30.86
    2015/02/01 12:14:59 [STATUS]Remote gateway was reached by https ...
    2015/02/01 12:14:59 [WARNING]Remote gateway wasn't reached...
    2015/02/01 12:14:59 [WARNING]Failed to connect.
    2015/02/01 12:15:20 [WARNING]Remote gateway wasn't reached...
    2015/02/01 12:15:20 [WARNING]Failed to connect.
    2015/02/01 12:15:20 [WARNING]Failed to connect!
    The RV110w doesn't seem to log anything...?
    If I try to connect using a windows pptp vpn connection I get an error 619 straight away and the RV110w log shows:
    1
    2015-02-01 12:20:14 AM
    info
    pptpd[22775]: CTRL: Client 123.150.210.162 control connection finished
    2
    2015-02-01 12:20:14 AM
    debug
    pptpd[22775]: CTRL: Reaping child PPP[22780]
    3
    2015-02-01 12:20:14 AM
    err
    pptpd[22775]: CTRL: PTY read or GRE write failed (pty,gre)=(12,13)
    4
    2015-02-01 12:20:14 AM
    err
    pptpd[22775]: GRE: read(fd=12,buffer=451c4c,len=8196) from PTY failed: status = -1 error = Input/output error, usually caused by unexpected termination of pppd, check option syntax and pppd logs
    5
    2015-02-01 12:20:14 AM
    err
    pppd[22780]: but I couldn't find any suitable secret (password) for it to use to do so.
    6
    2015-02-01 12:20:14 AM
    err
    pppd[22780]: The remote system is required to authenticate itself
    7
    2015-02-01 12:20:14 AM
    info
    pptpd[22775]: CTRL: Starting call (launching pppd, opening GRE)
    8
    2015-02-01 12:20:14 AM
    info
    pptpd[22775]: CTRL: Client 123.150.210.162 control connection started
    This is all behind a talktalk fibre router, they say it's transparent and doesn't block anything but they won't support me any further than that. Ports 443 and 1723 do seem to be open when I scan so as far as I can see the talktalk router is transparent.
    Do I need to create any rules on the RV110w firewall to get this working? or forward any ports to the router itself?
    Thanks for any help, Kevin

    I believe the problem is in iOS, as I am experiencing the same issue.
    I have a Yosemite Server running L2TP VPN server and my Mac connects flawless, while neither the iPhone nor the iPad (both 8.2) are able to connect.
    The error is the same "The L2TP-VPN server did not respond" and by looking at the server's log it seems iOS didn't even try to connect.
    I have tried changing the server address in iOS with the corresponding IP, but the results it's the same.
    Maybe a network setting reset?

  • Cannot connect to Lion VPN service unless server is locally logged into?

    I work remotely a lot.  After I upgraded to Lion server, I am unable to connect to the VPN service remotely unless I physically go over to the server (mac pro) and log into the desktop manually. 
    Previously, if my Snow Leopard server restarted (due to power failure, etc) and it re-booted up to the login screen, I could still logon to the VPN remotely as the VPN service would always startup (at the login screen) without a user having to be logging in. 
    Now, with Lion Server (10.7.4), if the server restarts, I cannot login back to the VPN. I have to get someone to go over to the server and manually login, then I can access VPN just fine. (I do not, and will not turn automatic login on on my server due to the huge security risk.) 
    How do I get the Lion Server VPN service to startup before or at the logon screen even if no user is logged in?
    Help is greatly appreciated!

    Can you SSH into the box when VPN isn't working?
    If so, ssh into the box, and look at the VPN logs when you're attempting to use the VPN.  The logs are (usually) in /var/log/ppp/vpnd.log
    I typically look at logs like this so I can see how they're updated in real time:
    tail -f /var/log/ppp/vpnd.log
    If you're VPN login is failing and there is data being pushed to that log, it may help us to figure out what's going on with your system.
    Ricardo

  • Connection to PPTP VPN

    Good day! I encountered the following problem.
    On the server side of my company's PPTP VPN is installed on Windows Server2008 R2 SP1 with the roles of DHCP and RASS. On the client side I have a Macbook Pro 13 (OS X 10.7 Lion), iPad 2 (iOS 5.1), iPhone 3GS (iOS 5.1), Windows 7 SP2 PC. I am the system administrator network - depends on me what the settings will be used in vpn.
    After creating a vpn my Windows PC is easily attached to it and worked in with lan perfectly.
    Also, all the Apple devices are connected to vnp - the connection is maintained without interruption for a long time, correct ip address and dns servers are set. However, I can not make even ping computers in LAN of may company by hostname or ip.
    How do I make mac work fine in the corporate network via vpn?

    Hi,
    How about recreate a VPN connection? please have a try, In addition, you can check which updates installed recently and which of them most related with VPN or network.
    Please make sure enabled the Use Default Gateway on Remote Network
    setting in the VPN TCP/IP configuration.
    Roger Lu
    TechNet Community Support

  • Cannot connect to workplace (VPN) with wizard

    I am trying to setup a VPN connection to my workplace on my laptop but am not able to get past the wizard.  I was able to get it to work successfully on my desktop and others who have used Windows 7 have been able to connect also.
    Specically, what I am doing is going to Network and Sharing Center, Set up a New Connection, Connect to a Workplace, Use my Internet Connection (VPN).  I use an IP address that I know works on other machines.  I have tried using the Don't Connect
    Now option as well as without that option.
    When I hit Create, I immediately get a "The wizard cannot connect" with only a Try Again option.  If I try again, it will essentially hang and I've given it over 30 minutes at least once to try to figure it out.
    I have Norton Antivirus and I disabled the Smart Firewall.  I have tried uninstalling Norton Antivirus and disabling the default Windows Firewall.  I have tried disabling Windows Defender.  I'm not sure what else to try anymore.

    Hi
    You are trying to connect using the wizard. I recommend you try to connect using the connection itself.
    After you are done with the wizard and the creation of your VPN connection (With the Don't connect now ticked), you should go back to Network and Sharing Center, on the left hand click on change adapter settings and you will see your VPN connection.
    Here if you right click and get the properties of your connection, you can configure many options there depending on the settings of the VPN Server. 
    I recommend you do ask your server admin about the required settings of the connection and then change the settings on different tabs accordingly, like the type of encryption and the type of tunneling protocol and etc. or another thing you could do is go
    to your desktop and go ahead with the same procedure and take note of the setting from the connection and then change the connection settings on your laptop accordingly. 
    That will probably help you
    MCT, MCSA/MCSE Security
    http://esitech.spaces.live.com/
    Note, I cannot get through the wizard so I cannot get to the properties of the connection or anything else because it does not get created.  Even when I choose the Don't Connect Now, I still get a Cannot Connect error (I mean why is it trying to connect
    if I am telling it not to bother at the moment).
    I am about as much as a server admin (at the company) than anyone else here.  I highly doubt there is something wrong from the server point of view as it is working for everyone else including myself on my desktop.  The issue is with the laptop.

  • Trouble connecting to PPTP VPN from a Windows XP computer

    I am having problems getting OS X Server 10.6 to accept an incoming PPTP connection from a Windows XP Home client (I have had no problems connecting from an OS X client)
    The error on the Windows side is "721" - Server did not respond.
    The error in the VPN log is repeated several times until it timesout the connection attempt:
    2010-06-03 15:35:16 EDT Incoming call... Address given to client = 10.110.128.103
    Thu Jun 3 15:35:16 2010 : Directory Services Authentication plugin initialized
    Thu Jun 3 15:35:16 2010 : Directory Services Authorization plugin initialized
    Thu Jun 3 15:35:16 2010 : PPTP incoming call in progress from 'n.n.n.n'...
    Thu Jun 3 15:35:16 2010 : PPTP connection established.
    Thu Jun 3 15:35:16 2010 : using link 0
    Thu Jun 3 15:35:16 2010 : Using interface ppp0
    Thu Jun 3 15:35:16 2010 : Connect: ppp0 <--> socket[34:17]
    Thu Jun 3 15:35:16 2010 : sent [LCP ConfReq id=0x1 <asyncmap 0x0> <auth chap MS-v2> <magic 0x4b27d2d8> <pcomp> <accomp>]
    Thu Jun 3 15:35:16 2010 : rcvd [LCP ConfReq id=0x0 <mru 1400> <magic 0x14ae1f30> <pcomp> <accomp> <callback CBCP>]
    Thu Jun 3 15:35:16 2010 : lcp_reqci: rcvd unknown option 13
    Thu Jun 3 15:35:16 2010 : lcp_reqci: returning CONFREJ.
    Thu Jun 3 15:35:16 2010 : sent [LCP ConfRej id=0x0 <callback CBCP>]
    Thu Jun 3 15:35:18 2010 : rcvd [LCP ConfReq id=0x1 <mru 1400> <magic 0x14ae1f30> <pcomp> <accomp> <callback CBCP>]
    Thu Jun 3 15:35:18 2010 : lcp_reqci: rcvd unknown option 13
    Thu Jun 3 15:35:18 2010 : lcp_reqci: returning CONFREJ.
    Thu Jun 3 15:35:18 2010 : sent [LCP ConfRej id=0x1 <callback CBCP>]
    I have not been able to find anything useful via Google and the forum here on any of those error messages.
    Thank you!
    ~ Jeremy

    Okay, I decided to start over -- I reformatted and decide to try L2TP w/ IPSEC.
    Got it working from a Mac client.
    But when I try and connect from Windows XP (tried from several machines, too), it just times out and this time nothing in the error log.
    After I try it several times, it eventually starts repeating the following errors every 5 or 10 seconds, and once it gets stuck in this loop, I can't connect from OS X either!
    2010-06-03 18:07:27 EDT Health control check: server is sick...
    2010-06-03 18:07:28 EDT Health control check: server is back to normal...
    I have tried turning off the firewall completely on Windows, on the server, and on the router (using DMZ). Nothing seems to help.
    I am about ready to tear my hair out! I would greatly appreciate any input, suggestions, etc. Thanks in advance!

  • Cannot Make PPTP VPN Connection in 10.7.4

    As far as I can tell everything is setup correctly but every time I try to connect I get this message:
    You were disconnected by the communication device. Try reconnecting. If the problem continues, verify your settings.
    Console Log:
    6/25/12 5:11:40.382 PM pppd: PPTP connection established.
    6/25/12 5:11:40.443 PM pppd: Connect: ppp0 <--> socket[34:17]
    6/25/12 5:11:40.447 PM pppd: PPTP error when reading socket : EOF
    6/25/12 5:11:40.447 PM pppd: PPTP error when reading header : read -1, expected 12 bytes
    6/25/12 5:11:40.447 PM pppd: PPTP hangup
    6/25/12 5:11:40.448 PM pppd: Connection terminated.
    6/25/12 5:11:40.454 PM pppd: PPTP disconnecting...
    6/25/12 5:11:40.455 PM pppd: PPTP disconnected
    I am trying to connect to a Linux based VPN server.  I have double checked my username and password multiple times, made sure the MTU is set the same on client, server, and router, and tried turning the encryption off and on on the server and the client.  Nothing has made a difference, I get the same error every time.  I am able to FTP and SSH into the Linux box. 
    Any suggestions of other things to try would be much appreciated.  I saw some threads about editing config files on my mac but this is a brand new machine that I have had for a week running an OS that is on it's fourth point release.  I really should not have to muck around with config files but at this point I'm ready to try anything. 

    Looks like it might be a configuration error on the server's end. The VPN makes a connection and tries to read the server's configuration to create a socket for communication, but runs into a formatting error when it is passed an "End of File" character instead of a required component of the socket. Can you try connecting to another VPN server, or perhaps try an L2TP connection instead of PPTP?

  • How can I connect to a VPN via PPTP?

    Hello,
    I am a foreigner living in Taiyuan, the capital city of Shanxi Province, in China. I bought my macbook the summer of 2006. It still works perfectly except I cannot connect to the internet here at the university.
    The internet here is split into two parts: local, and international. The ethernet connection allows me to access Chinese websites, but nothing else. It sounds counterintuitive but really, that's how it is. In order to get the rest of the world, all computers have to connect to a VPN via PPTP. Once this is established, viola, you have internet.
    My problem is I cannot seem to connect to the VPN. I have used Internet Connect, I have created a VPN via PPTP, and put in all the right numbers...
    the VPN IP is 202.207.128.115
    the username is tyut
    the password is tyut
    But when I try to connect, it just says it can't. Nobody at the university has been helpful because they've never used a Mac before, and besides which, they aren't used to using a computer in English.
    Can anyone help me? Or does anyone know how to get in touch with Apple Services in China (in English)?

    Yeah, but that's not the problem here. I'm an English teacher at Taiyuan University of Technology (the irony does not escape me). The other teachers have PCs and can get full internet in their apartment. Since I have a mac, it's much harder for the school technicians to help me.
    This is what my log says from the VPN connection (which does connect now.)
    Mon Oct 29 16:05:52 2007 : PPTP connecting to server '202.207.128.115' (202.207.128.115)...
    Mon Oct 29 16:05:52 2007 : PPTP connection established.
    Mon Oct 29 16:05:52 2007 : Using interface ppp0
    Mon Oct 29 16:05:52 2007 : Connect: ppp0 <--> socket[34:17]
    Mon Oct 29 16:05:52 2007 : local IP address 172.30.1.252
    Mon Oct 29 16:05:52 2007 : remote IP address 172.30.1.2
    But I still can't load any pages from the VPN connection, just the regular ethernet connection (local internet). It doesn't work if I use IP addresses instead. :-/ I unselected "send all traffic over the VPN connection" because if it's selected, I don't even get local internet.
    Looking online I found a possible fix, but it's for Windows XP. I don't know how to find the same settings on the Mac...For Windows XP:
    1. Click Start -> Control Panel
    2. Click on the Network and Internet Connections icon and then click "Network Connections". If your Control Panel is in classic view, simply double click the "Network Connections" icon.
    3. Right click on the new VPN connection and select Properties
    4. Select the "Networking" tab
    5. Verify that Internet Protocol (TCP/IP) is highlighted
    6. Click on the Properties button
    7. Within the Internet Protocol (TCP/IP) properties window, click on the "Advanced..." button. Within the Advanced TCP/IP Settings window, REMOVE the check mark next to "Use default gateway on remote network"
    8. Click "OK" to close all open windows
    Where would the "default gateway on remote network" be on a Mac?

  • Help needed to connect to remote PPTP VPN via PIX 515e

    Hello,
    A user in our office needs to connect to a client's remote PPTP VPN but can't connect.  The user is running Windows 7.  We have a Cisco PIX 515e firewall that is running PIX Version 6.3(3) - this is what our user is having to go through to try and make the connection to the client's remote VPN.
    The client's network guys have come back and said the issue is at our side.  They say that they can see some of our traffic but not all of it. The standard error is shown below, and they say it's symptomatic of the client-side firewall not allowing PPTP traffic:
    "A connection between the VPN server and the VPN client XXX.XXX.XXX.XXX has been established, but the VPN connection cannot be completed. The most common cause for this is that a firewall or router between the VPN server and the VPN client is not configured to allow Generic Routing Encapsulation (GRE) packets (protocol 47). Verify that the firewalls and routers between your VPN server and the Internet allow GRE packets. Make sure the firewalls and routers on the user's network are also configured to allow GRE packets. If the problem persists, have the user contact the Internet service provider (ISP) to determine whether the ISP might be blocking GRE packets."
    I have very little firewall experience and absolutely no Cisco experience I'm afraid.  From looking at the PIX config I can see the following line:
    fixup protocol pptp 1723.
    Does this mean that the PPTP protcol is enabled on our firewall?  Is this for both incoming and outgoing traffic?
    I can see no reference to GRE 47 in the PIX config.  Can anyone advise me what I should look for to see if this has been enabled or not?
    I apologise again for my lack of knowledge.  Any help or advice would be very gratefully received.
    Ros

    Hi Eugene,
    Thank you for taking the time to reply to me.  Please see our full PIX config below.  I've XX'd out names and IP addresses as I'm never comfortable posting those type of details in a public forum.  I hope that the information below is still sufficient for you.
    Thanks again for your help,
    Ros
    PIX(config)# en
    Not enough arguments.
    Usage:  enable password [] [level ] [encrypted]
            no enable password level
            show enable
    PIX(config)# show config
    : Saved
    : Written by enable_15 at 10:30:31.976 GMT/BDT Mon Apr 4 2011
    PIX Version 6.3(3)
    interface ethernet0 auto
    interface ethernet1 auto
    interface ethernet2 auto
    nameif ethernet0 outside security0
    nameif ethernet1 inside security100
    nameif ethernet2 DMZ security10
    enable password XXX encrypted
    passwd XXX encrypted
    hostname PIX
    domain-name XXX.com
    clock timezone GMT/BST 0
    clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00
    fixup protocol dns maximum-length 512
    fixup protocol ftp 21
    fixup protocol h323 h225 1720
    fixup protocol h323 ras 1718-1719
    fixup protocol http 80
    fixup protocol pptp 1723
    fixup protocol rsh 514
    fixup protocol rtsp 554
    fixup protocol sip 5060
    fixup protocol sip udp 5060
    fixup protocol skinny 2000
    fixup protocol smtp 25
    fixup protocol sqlnet 1521
    fixup protocol tftp 69
    names
    name XX.XX.XX.XX Secondary
    access-list outside_access_in permit tcp XX.XX.XX.XX 255.255.255.240 host XX.XX.XX.XX eq smtp
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq https
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq 993
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq 587
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq 82
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq www
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq www
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq www
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq https
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 993
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 587
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 82
    access-list outside_access_in permit tcp host XX.XX.XX.XX host XX.XX.XX.XX eq 82
    access-list outside_access_in permit tcp host XX.XX.XX.XX host XX.XX.XX.XX eq 82
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq smtp
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 8082
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq www
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq https
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 993
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 587
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq 82
    access-list outside_access_in permit tcp any host XX.XX.XX.XX eq smtp
    access-list outside_access_in permit tcp any host XX.XX.XX.XX. eq www
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.0.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl deny udp any any eq 135
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list inside_outbound_nat0_acl permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_40 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_60 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list USER1 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_10 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_20 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_30 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_50 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list outside_cryptomap_70 permit ip any XX.XX.XX.XX 255.255.0.0
    access-list USER2 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list USER3 permit ip any XX.XX.XX.XX 255.255.255.0
    access-list USER4 permit ip any XX.XX.XX.XX 255.255.0.0
    pager lines 24
    logging on
    logging host inside XX.XX.XX.XX
    icmp permit any outside
    icmp permit any inside
    mtu outside 1500
    mtu inside 1500
    mtu DMZ 1500
    ip address outside XX.XX.XX.XX 255.255.255.248
    ip address inside XX.XX.XX.XX 255.255.255.0
    no ip address DMZ
    ip audit info action alarm
    ip audit attack action alarm
    pdm location XX.XX.XX.XX 255.255.255.255 inside
    pdm location XX.XX.XX.XX 255.255.0.0 outside
    pdm location XX.XX.XX.XX 255.255.255.0 outside
    pdm logging debugging 100
    pdm history enable
    arp timeout 14400
    global (outside) 1 interface
    nat (inside) 0 access-list inside_outbound_nat0_acl
    nat (inside) 1 0.0.0.0 0.0.0.0 0 0
    static (inside,outside) XX.XX.XX.XX XX.XX.XX.XX netmask 255.255.255.255 0 0
    static (inside,outside) XX.XX.XX.XX. XX.XX.XX.XX netmask 255.255.255.255 0 0
    static (inside,outside) XX.XX.XX.XX. XX.XX.XX.XX netmask 255.255.255.255 0 0
    static (inside,outside) XX.XX.XX.XX XX.XX.XX.XX netmask 255.255.255.255 0 0
    access-group outside_access_in in interface outside
    route outside 0.0.0.0 0.0.0.0 XX.XX.XX.XX 1
    route inside XX.XX.XX.XX 255.255.0.0 XX.XX.XX.XX 1
    timeout xlate 3:00:00
    timeout conn 2:00:00 half-closed 0:30:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
    timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
    timeout uauth 0:05:00 absolute
    aaa-server TACACS+ protocol tacacs+
    aaa-server RADIUS protocol radius
    aaa-server LOCAL protocol local
    ntp authenticate
    ntp server XX.XX.XX.XX source outside prefer
    http server enable
    http XX.XX.XX.XX 255.255.0.0 outside
    http XX.XX.XX.XX 255.255.255.0 outside
    http XX.XX.XX.XX 255.255.255.255 inside
    snmp-server host inside XX.XX.XX.XX
    no snmp-server location
    no snmp-server contact
    snmp-server community XXX
    snmp-server enable traps
    floodguard enable
    sysopt connection permit-ipsec
    crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
    crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
    crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
    crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
    crypto dynamic-map cola 20 set transform-set ESP-3DES-MD5
    crypto dynamic-map dod 10 set transform-set ESP-3DES-MD5
    crypto map outside_map 10 ipsec-isakmp dynamic cola
    crypto map outside_map 20 ipsec-isakmp
    crypto map outside_map 20 match address outside_cryptomap_20
    crypto map outside_map 20 set peer XX.XX.XX.XX
    crypto map outside_map 20 set transform-set ESP-3DES-MD5
    crypto map outside_map 25 ipsec-isakmp
    crypto map outside_map 25 match address USER1
    crypto map outside_map 25 set peer XX.XX.XX.XX
    crypto map outside_map 25 set transform-set ESP-3DES-MD5
    crypto map outside_map 30 ipsec-isakmp
    crypto map outside_map 30 match address outside_cryptomap_30
    crypto map outside_map 30 set peer XX.XX.XX.XX
    crypto map outside_map 30 set transform-set ESP-3DES-MD5
    crypto map outside_map 40 ipsec-isakmp
    crypto map outside_map 40 match address outside_cryptomap_40
    crypto map outside_map 40 set peer XX.XX.XX.XX
    crypto map outside_map 40 set transform-set ESP-3DES-MD5
    crypto map outside_map 50 ipsec-isakmp
    crypto map outside_map 50 match address outside_cryptomap_50
    crypto map outside_map 50 set peer XX.XX.XX.XX
    crypto map outside_map 50 set transform-set ESP-3DES-MD5
    crypto map outside_map 60 ipsec-isakmp
    crypto map outside_map 60 match address outside_cryptomap_60
    crypto map outside_map 60 set peer XX.XX.XX.XX
    crypto map outside_map 60 set transform-set ESP-3DES-MD5
    crypto map outside_map 70 ipsec-isakmp
    crypto map outside_map 70 match address outside_cryptomap_70
    crypto map outside_map 70 set peer XX.XX.XX.XX
    crypto map outside_map 70 set transform-set ESP-3DES-MD5
    crypto map outside_map 75 ipsec-isakmp
    crypto map outside_map 75 match address USER4
    crypto map outside_map 75 set peer XX.XX.XX.XX
    crypto map outside_map 75 set transform-set ESP-3DES-MD5
    crypto map outside_map 80 ipsec-isakmp
    crypto map outside_map 80 match address USER2
    crypto map outside_map 80 set peer XX.XX.XX.XX
    crypto map outside_map 80 set transform-set ESP-3DES-MD5
    crypto map outside_map 90 ipsec-isakmp
    crypto map outside_map 90 match address USER3
    crypto map outside_map 90 set peer XX.XX.XX.XX
    crypto map outside_map 90 set transform-set ESP-3DES-MD5
    crypto map outside_map interface outside
    isakmp enable outside
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address 0.0.0.0 netmask 0.0.0.0
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp key ******** address XX.XX.XX.XX netmask 255.255.255.255 no-xauth no-config-mode
    isakmp policy 20 authentication pre-share
    isakmp policy 20 encryption 3des
    isakmp policy 20 hash md5
    isakmp policy 20 group 2
    isakmp policy 20 lifetime 86400
    telnet XX.XX.XX.XX 255.255.0.0 outside
    telnet XX.XX.XX.XX 255.255.255.255 inside
    telnet XX.XX.XX.XX 255.255.255.255 inside
    telnet XX.XX.XX.XX 255.255.255.255 inside
    telnet timeout 30
    ssh XX.XX.XX.XX 255.255.255.248 outside
    ssh XX.XX.XX.XX 255.255.255.248 outside
    ssh timeout 30
    management-access inside
    console timeout 0
    terminal width 80
    Cryptochecksum:XXX
    PIX(config)#

  • Mobile Devices (Android and iOS) cannot Connect to WS 2008 RRAS L2TP VPN with Pre-Shared Key

    I have my Windows Server 2008 standard installed with RRAS service and configure with L2TP VPN with pre-shared key. Services such as Active Directory, DHCP and DNS are not installed. The Internet connection doesn't pass through a router to my server machine.
    I have the Verizon fios Internet cable plugged in to the server machine directly.
    PCs running Windows and Mac OS X can connect to the server without problem. When I tried to connect by using android or iOS mobiles and tablets, they cannot connect to the server. If I change the VPN type to PPTP, the mobile devices can connect successfully
    but I would like to use IPSec/L2TP since it's more secure.
    I tried so hard to look for the solution for this issue on Internet but I had no luck on that. Can anyone please provide me some help, please ?
    Thanks,
    CK

    Hi CK,
    I think we may need to create a policy in Network Policies. Please follow the steps below,
    Right click Network Policies, Click New.
    Enter the policy name, click Next.
    Click Add, select the Day and Time Restrictions, click
    Add.
    In the Day and Time Restrictions, choose Permited for
    all, click OK.
    Click Next five times(leave everything default), click
    Finish.
    Move the policy to top and try to connect with your device.
    If issue persists, please make sure that the Connection Requet Policies have been configured properly.
    For detailed information about how to create a network policy, please refer to the link below,
    Configuring NPS network policies
    http://technet.microsoft.com/en-us/library/dd441006.aspx
    Best Regards.
    Steven Lee
    TechNet Community Support

  • Cannot connect to VPN Server

    Upgraded to Yosemite last night and now my iMac can't connect to my companies VPN server.
    My error is  “The PPTP-VPN server did not respond.”
    The error log at my company's VPN server is...
    Log Name: System
    Source: RasMan
    Date: 10/17/2014 3:46:05 AM
    Event ID: 20209
    Task Category: None
    Level: Warning
    Keywords: Classic
    User: N/A
    Computer: TEXAS.private.4d.com
    Description:
    A connection between the VPN server and the VPN client 69.132.54.71 has been established, but the VPN connection cannot be completed. The most common cause for this is that a firewall or router between the VPN server and the VPN client is not configured to allow Generic Routing Encapsulation (GRE) packets (protocol 47).
    Event Xml:
    <Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
      <System>
      <Provider Name="RasMan" />
      <EventID Qualifiers="0">20209</EventID>
      <Level>3</Level>
      <Task>0</Task>
      <Keywords>0x80000000000000</Keywords>
      <TimeCreated SystemTime="2014-10-17T10:46:05.000000000Z" />
      <EventRecordID>46547</EventRecordID>
      <Channel>System</Channel>
      <Computer>TEXAS.private.4d.com</Computer>
      <Security />
      </System>
      <EventData>
      <Data>69.132.54.71</Data>
      </EventData>
    </Event>
    Hope there is a solution to this problem. My MacBook Pro on the same network running 10.9.5 connect just fine.

    I had the same problem. Tried different vpn protocols via the OS X native interface but to no avail.
    I solved the problem by installing Tunnelblick: https://code.google.com/p/tunnelblick/
    Best regards
    Jan

Maybe you are looking for

  • Opening and closing stock at storage location level

    Dear all I need a std report which will give the opening and closing stock at storage location level, Or should I go for dev. if yes please guide me. Regards Samuel

  • MMbe atock and IQ09 stock

    Hi, For a material in MMBE it shows stock has 10 nos. If I see it in IQ09 serial number report for the same article it shows 11. How it can be possible Pls advise

  • How to hide this method?

    I want to use Protection Proxy Pattern,but I feel nervous about my real method,how can i hide it(such as set it friendly or protected)? you can see this code: interface Safe{      public String getSecret(); class RealSafe implements Safe{      public

  • Distorted Album Art And Effects

    When using the CoverFlow view in iTunes 7, my albums have a diagonal line through them. Also, the titles and scroll bars are not transparent as they should be. I've run the DirectX Diagnostic Tool and everyting passed. Is there some other graphics se

  • Multiple EUL Connections in Discoverer 9i Plus

    Discoverer 9i Plus doesn't allow you to change your default EUL anymore. I currently have to set up different connections for each EUL. Is there a way to set up one connection and change between my EULs like it had done in previous versions?