adimcev -> RE: Cisco VPN Client Behind ISA 2006 Ent NLB (26.Apr.2009 12:58:27 PM)
|
I'm not sure if you got it working, but, technically speaking you cannot see UDP 4500 traffic without UDP 500 traffic for your new VPN connections. How did you take the capture ? The VPN client connects to the VPN server on UDP port 500 to begin IKE negotiations. During these, the presence of the NAT device(s) will be detected, and the client will connect(switch) to UDP port 4500 to the VPN server, and the IKE negotations and Cisco's non-RFC compliant extensions will continue. If completed successfully, the IPsec ESP traffic will be also encapsulated within UDP and send to UDP port 4500 of the VPN server. To get a better view of the traffic flow, you can try to get the captures like this, on the two ASAs(exiting the first ASA, and entering the second ASA) and on the client itself. http://blogs.techrepublic.com.com/networking/?p=1317 http://www.cisco.com/en/US/docs/security/asdm/6_1/user/guide/tools.html#wp1556018 So you can see the original packets from the client, how the packets leave the first ASA and go to the ISA cluster, and then how they will reach the last ASA after it they passed through an ISA member and vice-versa. And you may be able to pay attention to the MAC addresses too. I'm not saying this is your case(just an example), but sometimes, taking captures can be tricky, because some packets(say maybe some low level packets) will not be supplied to the mechanism used to capture the packets(pcap), so you will not see them in your packet sniffer, or some packets, like TCP ones send by the host, may be displayed with TCP checksum offloading errors, if the TCP checksum will be done in hardware(NIC) when the packet is sent out by the NIC, after the capture mechanism intercepted the packet. Thanks, Adrian
|
|
|
|