The new forums will be named Coin Return (based on the most recent vote)! You can check on the status and timeline of the transition to the new forums here.
Please vote in the Forum Structure Poll. Polling will close at 2PM EST on January 21, 2025.

AVG firewall vs Cisco VPN client

DortmunderDortmunder Registered User regular
edited December 2009 in Help / Advice Forum
I have AVG anti-virus installed (with internet firewall) and I'm trying to get the Cisco VPN client to work.

Does anyone know, step-by-step, what I need to configure in the firewall to get it through? I checked "Allow for all" + "Save as rule" when it first prompted, but it still can't connect. There are a bunch more advanced rules that I can tinker with, down to protocols and devices and applications etc...

Pretty certain it's the firewall that is the problem, this used to work.

Thanks

steam_sig.png
Dortmunder on

Posts

  • PirateJonPirateJon Registered User regular
    edited December 2009
    I've used AVG and the cisco legacy VPN with no problems.
    Pretty certain it's the firewall
    Try it with avg totally disabled and you'll know for sure. I'd do that first.
    Have you enabled logging? What do the logs say?

    PirateJon on
    all perfectionists are mediocre in their own eyes
  • Enos316Enos316 Registered User regular
    edited December 2009
    Yeah, Pirate is right. Disable the firewall and see if it works. Make sure you don't have any others running that you don't know of (**cough**windowsfirewall**cough**)

    Enos316 on

    Enos.jpg
  • DortmunderDortmunder Registered User regular
    edited December 2009
    Don't know why I didn't think to try that first.

    So it's not the avg firewall (or any other).

    Thanks guys

    Dortmunder on
    steam_sig.png
  • EclecticGrooveEclecticGroove Registered User regular
    edited December 2009
    Dortmunder wrote: »
    Don't know why I didn't think to try that first.

    So it's not the avg firewall (or any other).

    Thanks guys

    When did it stop working?

    I'm actually tracking down an issue that started on the 17th of this month (or very early on the 18th) that impacts IPSEC VPN systems. I'd be curious on if the Cisco client is having similar issues. Not that I expect you to know what I'm talking about, but basically the IKE authentication data is fragmenting when it shouldn't be and lots of stuff on the interwebs doesn't play nice with fragmented UDP packets.

    I've got a whole bunch of people impacted by this and have literally found nothing that points to a cause yet. Even the MS patches pushed down that day don't seem to be related, and do nothing when removed.

    EclecticGroove on
  • DortmunderDortmunder Registered User regular
    edited December 2009
    Ouf - good question.

    It's not something that I use everyday, so I couldn't tell you precisely when it stopped working. Sometime within the past two months is when I first noticed it. Probably not going to help you very much.

    Dortmunder on
    steam_sig.png
  • PirateJonPirateJon Registered User regular
    edited December 2009
    basically the IKE authentication data is fragmenting

    Buh-WHAAAAaaaaaa....???

    Weird. Like, the data is arriving in multiple packets (TCP fragmented)? Or the data isn't arriving fully (fragments of data)?

    PirateJon on
    all perfectionists are mediocre in their own eyes
  • EclecticGrooveEclecticGroove Registered User regular
    edited December 2009
    PirateJon wrote: »
    basically the IKE authentication data is fragmenting

    Buh-WHAAAAaaaaaa....???

    Weird. Like, the data is arriving in multiple packets (TCP fragmented)? Or the data isn't arriving fully (fragments of data)?

    My thought exactly.

    Spoiler for anyone that doesn't feel like reading.
    Essentially if using a larger authentication type (namely certificates):

    Computer -->VPN server initiates Phase 1
    VPN --> Computer Accepts Phase 1
    VPN --> Computer initiates Phase 2
    Computer --> VPN accepts Phase 2 and moves to authenticate.

    Then nothing. We receive no packets, partial or otherwise destined to the VPN system at all. Something along the path is eating the UDP packets. This is obnoxiously common with fragmented UDP sadly.
    Sometimes it is the local router/firewall/modem dropping the packets, sometimes it is an entire network and they can verify the phase 2 information leaving their perimeter devices.

    Using a smaller payload for auth (Like an RSA SecurID token), works fine, since it's tiny.

    Running a test for fragmentation identifies that PC -- VPN fragmentation threshold is typically around 1450, and our certificates (including all overhead) fit well within that. Since we went through that particular issue when we first moved to them several years ago.

    TLDR:
    Fragmentation should not be happening, it is anyways, and something prior to our perimeter devices is dropping it, started on the 17th/18th and impacts a fair number of people all around the country.

    EclecticGroove on
Sign In or Register to comment.