Here are the routing tables before and after the VPN is on.
It seems that there is a conflict when a computer is connected to both routers.ĭoes anybody know how to configure the Linksys router so that the two computers can still be accessed between each other when one computer is on VPN (via the connect by the ASUS router)?Īlternatively, is there a way to modify the routing table to make the first computer accessible by computers on 192.168.1.x? But this Linksys router also has a subnet of 192.168.1.x.
I want to solve this problem by connecting (using cable connection instead of wireless connection) both computers to a 2nd router (Linksys E1000). The remote VPN user will have to create a VPDN dialup from its operating system (we assume Windows XP) in order to initiate the VPN connection and authenticate to the Cisco router. (EDIT: This sentence has been corrected.) When I use VPN (specifically Cisco Anyconnect Secure Mobile Client) on one computer, that computer can not be accessed by other computers on the 192.168.1.x subnet, but that computer still can access other computers on the 192.168.1.x subnet. Two computers are connected to the ASUS router via wireless connection (subnet 192.168.1.x). Radius-server host 10.0.0.I have an ASUS router at home, which is connected to the modem to access the internet.
The local command allow local users of the router to connect even if the Radius server is offline:Īaa authentication login vpnuser group radius localīe sure the crypto map command has the same name of aaa authentication:Īccess in configuration mode (Configure terminal) and specify the radius parameter with the IP address and the password specified at the beginning of the tutorial: Once the Road Warrior VPN has been configured on the Cisco router, you have to enable the authentication of the VPN users through Radius. Below is a typical diagram of a company network providing VPN access to remote users in order to access the company's network resources. Following each step shown in this article will guarantee it will work flawlessly. Select the attribute User-Name and click Next:Īdd the group VpnAuthrizedUsers that you’ve precedently created: Setting up a Cisco router to accept remote Cisco VPN clients is not an extremely difficult task. Specify the same name used for the Radius Clients: Also specify a password for the connection:Įxpande Policies and right-click on Connection Request Policies: Specify the name and the IP address of the peripheral that will forward the authentication requests to the Radius. Right-click on NPS and select Register server in Active Directory:Ĭollapse the Radius menu and right-click on RADIUS Clients: Procced with the configuration of the Radius server selecting NAP, then right-click on the server name and press Network Policy Server: Additionally, the port can be the standard 443/tcp or it can be another manually assigned port. The IOS SSL VPN allows the IP to be based on the interface IP of the router or a virtual IP address.
Press Install to start the installation of the role: The next step is to setup the IP and port information for connectivity to the SSL VPN. Select the role Network Policy and Access Services: Select the server where to install the role: Launch Server Manager and select Add Roles and Features: To facilitate the management of the users with the permission to access through VPN, we are going to create a specific group called VpnAuthorizedUsers:Īssign the user who needs the VPN access to the group VpnAuthorizedUsers: The setup includes a Cisco 1801 router, configured with a Road Warrior VPN, and a server with Windows Server 2012 R2 where we installed and activated the domain controller and Radius server role. In this post we’ll see how you can allow Active Directory users to perform the login to a VPN, configured on a Cisco router. It may be very helpful to business users willing to access from outside the internal resources of their company. A Virtual Private Network (VPN) allows to connect to a private network through the Internet, from anywhere in the world.