VPN on ASA5550

I set up a VPN for remote access using IPSEC on an ASA 5550. All user and group configurations are completed. A VPN session is established using the Cisco Client software, but I am not able to access the internal network.  Any suggestions?

Check the following:

-ACL on the interface

-NAT rules

-tours on the internal destination, make sure you he knows how to get back to the ASA, by default GW or a specific range for the subnet pool VPN (assigned IP address)

-Make sure that you do not use a VPN filter

-try to assign an IP address that is specific to a user and test

-capture on the ASA tool is very useful to see if you get a response from the destination

-look for anything suspicious in the log

TIP:

Overlapping address space can be bulky to solve problems, especially if you use a lot or groups object.

Also to avoid the problems of the ARP, try using one different subnet then assigned inside network block. I've also seen in double IP address and all sorts of strange things.

Tags: Cisco Security

Similar Questions

  • Period of Continous Pings VPN

    Thanks in advance.

    I have an ASA5505 to a remote location and an ASA5550 to my loocation...

    I get the following info in my logs:

    IP = 62.73.210.70, invalid header, lack of payload SA! (next payload = 4)

    Group = 62.73.210.70, IP = 62.73.210.70, no pre-shared key configured for group

    Group = 62.73.210.70, IP = 62.73.210.70, impossible to find a group valid tunnel, abandonment...!

    Group = 62.73.210.70, IP = 62.73.210.70, Removing peer to peer table does not, no match!

    Group = 62.73.210.70, IP = 62.73.210.70, error: cannot delete PeerTblEntry

    Copy config as follows:

    Distance: 172.25.62.226 has been statically NAT' public 62.73.210.70 ed.

    Remote configuration:

    interface Vlan1
    nameif inside
    security-level 100
    IP 10.200.1.209 255.255.255.240
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP 172.25.62.226 255.255.255.248
    !
    interface Ethernet0/0
    switchport access vlan 2

    10.200.1.208 IP Access-list extended sheep 255.255.255.240 allow 10.199.1.0 255.255.255.0
    10.200.1.208 IP Access-list extended sheep 255.255.255.240 allow 10.10.144.0 255.255.252.0
    Access extensive list ip 10.200.1.208 VPNL2L allow 255.255.255.240 10.199.1.0 255.255.255.0
    Access extensive list ip 10.200.1.208 VPNL2L allow 255.255.255.240 10.10.144.0 255.255.252.0
    allowed extended access list 100 tcp host 89.254.12.35 host 10.200.1.213 eq www
    pager lines 24
    Within 1500 MTU
    Outside 1500 MTU
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0 access-list sheep
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Route outside 0.0.0.0 0.0.0.0 172.25.62.225 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    the ssh LOCAL console AAA authentication
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp - esp-md5-hmac mytrans
    address for correspondence card crypto mymap 10 VPNL2L
    card crypto mymap 10 peers set 65.181.59.210
    mymap 10 transform-set mytrans crypto card
    3600 seconds, duration of life card crypto mymap 10 set - the security association
    mymap outside crypto map interface
    crypto isakmp identity address
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    the Encryption
    md5 hash
    Group 2
    life 86400
    Crypto isakmp nat-traversal 2

    tunnel-group 65.181.59.210 type ipsec-l2l
    IPSec-attributes tunnel-group 65.181.59.210
    pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic

    My location Config:

    interface GigabitEthernet0/0
    nameif outside
    security-level 0
    IP 65.181.59.210 255.255.255.240
    !
    interface GigabitEthernet0/1
    nameif inside
    security-level 100
    IP 10.199.1.2 255.255.255.0

    DNS server-group DefaultDNS

    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    WML tcp service object-group
    Description of the data access remote wits
    Beach of port-object 1 65535

    access-list extended aclin allowed object-group DM_INLINE_PROTOCOL_5 10.199.1.2 host 65.181.59.210

    Note to access local rules no.-nat-list
    access-list no. - nat extended ip Rignet 255.255.255.0 allow 10.10.144.0 255.255.252.0
    Note to access local rules no.-nat-list
    access-list extended no. - nat ip Rignet 255.255.255.0 ConocoNova 255.255.255.240 allow
    Note No.-nat-ConocoNova access list

    access-list no. - nat extended ip Rignet 255.255.255.0 allow ENI 255.255.255.240
    access-list no. - nat extended ip 10.10.144.0 allow 255.255.252.0 ENI 255.255.255.240
    access-list extended no. - nat ip Rignet 255.255.255.0 Norway_Office 255.255.255.240 allow
    access-list no. - nat extended ip 10.10.144.0 allow 255.255.252.0 Norway_Office 255.255.255.240
    access-list extended no. - nat ip Rignet 255.255.255.0 BobbyVPN 255.255.255.0 allow
    access-list no. - nat extended ip 10.10.144.0 allow 255.255.252.0 BobbyVPN 255.255.255.0

    Note to inside_access_in access list block port 135 for the port scan
    inside_access_in list extended access deny 135 a
    inside_access_in list extended access allowed object-group DM_INLINE_PROTOCOL_4 10.10.144.0 255.255.252.0 Rignet 255.255.255.0
    test the access list extended permit icmp any any echo
    test from the list of access permit icmp any any echo response
    Allow InsideNOV_access_in to access extended list ip 10.200.0.0 255.255.0.0 10.10.144.0 255.255.252.0
    InsideNOV_access_in list extended access allow DM_INLINE_SERVICE_7 of object-group a
    InsideNOV_access_in list extended access allowed object-group DM_INLINE_SERVICE_4 Rignet 255.255.255.0 10.10.144.0 255.255.252.0
    InsideNOV_access_in list extended access allowed object-group DM_INLINE_PROTOCOL_12 Norway_Office 255.255.255.240 10.10.144.0 255.255.252.0
    InsideNOV_access_in list extended access allowed object-group DM_INLINE_PROTOCOL_8 BobbyVPN 255.255.255.0 10.10.144.0 255.255.252.0
    inside_acl list extended access allow DM_INLINE_SERVICE_8 of object-group a
    inside_acl list extended access allowed object-group DM_INLINE_SERVICE_5 10.10.144.0 255.255.252.0 Rignet 255.255.255.0
    inside_acl list extended access allowed object-group DM_INLINE_SERVICE_6 Rignet 255.255.255.0 10.10.144.0 255.255.252.0
    inside_acl list extended access allowed object-group DM_INLINE_PROTOCOL_10 10.200.0.0 255.255.0.0 255.255.255.0 Rignet
    inside_access_in_1 list extended access allowed object-group DM_INLINE_PROTOCOL_7 BobbyVPN 255.255.255.0 255.255.255.0 Rignet
    allow inside_access_in_1 to access extended list ip 10.200.0.0 255.255.0.0 255.255.255.0 Rignet
    outside_cryptomap list extended access allowed object-group DM_INLINE_PROTOCOL_13 65.181.59.210 host 10.200.1.222
    inside_access_in_2 list extended access allowed object-group Rignet DM_INLINE_SERVICE_11 255.255.255.0 255.255.255.0 Rignet
    outside_cryptomap_1 list extended access allowed object-group DM_INLINE_PROTOCOL_14 65.181.59.210 host 10.200.1.222
    pager lines 24
    Enable logging
    asdm of logging of information

    ASDM image disk0: / asdm - 621.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    Global (inside) 2 65.181.57.51 mask 255.255.255.255 subnet
    NAT (outside) 1 0.0.0.0 0.0.0.0
    NAT (inside) - access list 0 no - nat
    NAT (inside) 1 Rignet 255.255.255.0
    NAT (inside) 1 0.0.0.0 0.0.0.0
    public static 65.181.59.222 (Interior, exterior) 10.199.1.23 netmask 255.255.255.255
    public static 65.181.59.219 (Interior, exterior) 10.199.1.27 netmask 255.255.255.255
    public static 65.181.59.216 (Interior, exterior) 10.199.1.29 netmask 255.255.255.255
    Access-group aclin in interface outside
    inside_access_in_1 access to the interface inside group

    Route outside 0.0.0.0 0.0.0.0 65.181.59.209 1
    Route inside 153.15.156.217 255.255.255.255 65.181.57.51 1

    dynamic-access-policy-registration DfltAccessPolicy

    Sysopt connection tcpmss 1100
    Sysopt noproxyarp inside
    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set esp - esp-md5-hmac RIGHT
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    dynamic-map crypto myDYN-card 5 transform-set RIGHT
    set life - the association of security crypto dynamic-map myDYN-card 5 28800 seconds
    kilobytes of life Dynamics-card crypto myDYN-card 5 set security-association 4608000
    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    card crypto myMAP 1 match address outside_cryptomap_1
    card crypto myMAP 1 set peer 62.73.210.70
    card crypto myMAP 1 transform-set RIGHT
    dynamic crypto 65000 isakmp ipsec myDYN-map myMAP map
    myMAP outside crypto map interface
    Crypto ca trustpoint Intelliserv.rignet.local

    Crypto ca trustpoint ASDM_TrustPoint3
    Configure CRL
    Crypto ca trustpoint ASDM_TrustPoint0

    crypto isakmp identity address
    crypto ISAKMP allow outside
    crypto ISAKMP policy 1
    preshared authentication
    the Encryption
    md5 hash
    Group 2
    life 86400
    Crypto isakmp nat-traversal 21

    attributes of Group Policy DfltGrpPolicy
    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
    internal group myGROUP strategy
    Group myGROUP policy attributes
    Split-tunnel-policy tunnelspecified
    allow to NEM
    internal group ENI policy
    attributes of ENI Group Policy
    Protocol-tunnel-VPN IPSec

    IPSec-attributes tunnel-group DefaultL2LGroup
    pre-shared-key *.
    type tunnel-group mytunnel remote access
    tunnel-group mytunnel General-attributes
    strategy - by default-group myGROUP
    mytunnel group of tunnel ipsec-attributes
    pre-shared-key *.
    tunnel-group 164.85.0.18 type ipsec-l2l
    IPSec-attributes tunnel-group 164.85.0.18
    validation by the peer-id cert
    string
    tunnel-group 62.73.210.70 type ipsec-l2l
    tunnel-group 62.73.210.70 General-attributes
    Group Policy - by default-ENI
    by default-group DefaultL2LGroup tunnel-Group-map
    !
    class-map inspection_default
    match default-inspection-traffic

    I don't see a group of tunnel and psk associated with your primary location for the remote site 5505 outside interface.

    Sent by Cisco Support technique iPad App

  • L L VPN routing via alternative tunnel... mesh?

    Hi all

    We have a L - L IPSEC tunnel between our head office and a hosting company, everything works fine, solid as a rock. But we now have a requirement for one of our branches to also run a tunnel to the host, but for cost and control reasons, it was decided that the office will be forwarded via the head office...

    We also have an IPSEC tunnel running between the head and branch if all we need to the whole running is to get the branch to move towards the hosting via the headquarters company and have been performed.

    It would be like a mesh full, but with one of the deleted links (branch of accommodation), or a hybrid any? BTW both Headquarters and branch run Cisco ASA5550 and 5515 respectively and we have full control over these devices, the hosting company, I'm not sure but maybe an ASA...

    Links to documentation or advice would be greatly appreciated...

    Hello

    Well I don't know how you have configured NAT configuration for traffic between the branch and accommodation.

    It appears from the foregoing that you add is the real network of agencies for headquarters accommodation L2L VPN? If this is true, then need you a NAT configuration in the seat which is between "outside" and "outside". In other words a NAT0 configuration for the "outside" interface. (My suggesting original was to PAT dynamic for the branch if you want to avoid changes of configuration on the hosting Site)

    It would probably be something first of all, I would like to check.

    If it is fine, then I would check the VPN counters

    That both of the L2L VPN connections

    Show crypto ipsec peer his

    This should show you if the L2L VPN has negotiated for networks of branch and hosting on both connections from VPN L2L. It could also tell you if the packets are flowing in both directions.

    If the problem is outside your network then headquarters you would see probably décapsulés/decrypted only packets for VPN L2L headquarters - L2L BOVPN and only encapsulated/encrypted packets for the headquarters - hosting Site

    -Jouni

  • The VPN log

    Hello world

    Is there a way I can turn on logging on my ASA5550 so that I can check the time and date (and how long) the VPN users are connected?

    Your help is greatly appreciated.

    Thank you

    Alfred

    You can set the ASA to send syslog messages when the user connects and disconnects.

    # User vpn connection to syslog message is # 713119 and 611310 syslog:

    http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4775678

    http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4774637

    and to disconnect is syslog # 113019:

    http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4769539

    Hope that helps.

  • How SSL VPN packages for two ASAs clustered licenses

    Hi all!

    If I have installed two Cisco ASA 5550 (ASA5550-BUN-K9) in failover mode, which I know support only 2 concurrent sessions of SSL VPN and you want to upgrade my boxes to support 15 AnyConnect SSL VPN sessions, how many licenses packages I need to buy?

    An ASA5500-SSL-25 for both boxes or two ASA5500-SSL-25 for one per box?

    Depends on what version of ASA you are running.

    If you are running version 8.3 and above, then you just buy 1 ASA5500-SSL-25 for a failover pair and it would work. If you buy 2 ASA5500-SSL-25, one license per box in failover pair, then the license gets grouped into 50 SSL user license.

    Here is the license information for ASA version 8.3 for failover pair:

    http://www.Cisco.com/en/us/docs/security/ASA/asa83/license_standalone/license_management/license.html#wp1315746

    For ASA running version 8.2 and below, you are required to buy 2 ASA5500-SSL-25 (one of each ASA in the failover pair) as the license should be exactly the same for the pair to failover to work, in the earlier version of the SAA.

    Hope that makes sense.

  • ASA 5550 VPN question

    Dear Experts,


    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-marge-top : 0 ; mso-para-marge-droit : 0 ; mso-para-marge-bas : 10.0pt ; mso-para-marge-left : 0 ; ligne-hauteur : 115 % ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : Arial ; mso-bidi-theme-font : minor-bidi ;}

    I configured Cisco ASA 5550 as a VPN server at the head office.

    I configured the material Cisco ASA5505 branch customer.

    Tunnel is up & I can access my local computer in the branch of LAN H.O. But I am unable to ping / LAN access machine from branch headquarters.

    It's just a communication face right now.


    Need help.


    Thank you


    I.A

    Is your customer/PAT ezvpn or NMS (network expansion Mode) mode?

    If the NEM, then you will need to add the following in your inside_nat0_outbound ACL:

    inside_nat0_outbound 10.10.10.0 ip access list allow 255.255.255.0

    Also, please add the following command on ASA5550:

    management-access inside

    And from the remote host, see if you can ping 10.10.10.1.

  • VPN works with Sierra?

    I understand that the VPN does not yet, with the Sierra

    Is this a Bug? or, if this possibility has been deleted?

    Can we expect support once again with one of the 10.12. # updates?

    This is a very important feature to my office with it, we will not update for Sierra.

    Thank you

    VPNS work very well in Sierra as long as they don't use PPTP. Support for PPTP has been removed because it is not safe. By using a PPTP based VPN is useless. Your data is not safe.

  • Tips to add a VPN router to my current network configuration

    Dear all

    My apologies if the answer to this question already exists, however, I searched in many situations and none seem to match what I'm after.

    I currently have an ISP modem/router in Bridge mode connected to a TC of Apple which is my wireless router, I have 2 Express airport connected to this acting as the extensors of the range.  I have a VPN service through the MyPrivate network I activate on the desired device when required and everything works fine.

    What I want to do now is to be able to use my AppleTV and burning Amazon via the VPN as well so you need to add a VPN router in the configuration.  I want to finish with 2 wireless networks running together for these devices who need VPN and those who are not.  I don't want to lose the opportunity to extend the network to express it however airport.

    If someone could explain to me if this is possible and if so how do I set up the network.

    Thanks in advance

    Mark

    Basically you would need a device that supports VPN-passthrough and VLANS for your goals of networking. MyPrivate network, seems to be a VPN SSL, which is a user-server configuration. In other words, you install a client VPN on your Mac and you connect to the VPN network MyPrivate server to establish a VPN tunnel.

    Networking two or more "separated", should be using a router that supports VLAN services. Each segment of VIRTUAL local area network, in essence, would be a separate, she either wired or wireless network or a combination of both. This would probably be the 'easiest' part for the installation program.

    Now how combining the two would be the question, and I don't know what would be the best way, or even if it is possible.

    A few thoughts:

    • Use a router that supports VLANS. Create at least two VIRTUAL LAN segments. One for Apple TV & Burns, one for Internet access in general. Connect the device to VPN client host on the first segment, and configure for Internet sharing.
    • Download a dedicated VPN network application that supports hosting of third-party VPN clients, like yours. You would still need a router that supports VLAN to provided separate network segments.
    • Hire a consultant network. Let them know what you the goals of networking and ask them to offer potential solutions.
  • Settings lost VPN - iOS 10.0.2

    I had stored in my iPad VPN settings. VPN connections worked well until the latest iOS update. Now ALL my VPN connections disappeared. To make it even worse-, I am unable to put once again, because there are new mandatory fields: VPN type and shared key. I don't have the slightest idea how to fill them because I never need them when connecting to the VPN through my iMac - please see the screenshot.

    It drives me crazy. I welcome any suggestion.

    Prepare for removal of PPTP VPN before upgrade you to iOS 10 and macOS Sierra

    Preparation for iOS system administrators 10 and macOS Sierra should stop using PPTP VPN connections. Learn about alternatives, you can use to protect your data.

    If you have configured a PPTP VPN server, 10 iOS and macOS users Sierra will not be able to connect to it. iOS 10 and macOS Sierra will remove any profile VPN PPTP connections when a user upgrades from their device.

    Even if the PPTP protocol is always available on iOS 9 or an earlier version or OS X El Capitan and earlier, we do not recommend that you use it for secure, private communication.

    Alternatives for PPTP VPN connections

    Try one of these other VPN protocols for authentication by user that are safer:

    • L2TP/IPSec
    • IKEv2/IPSec
    • Cisco IPSec
    • VPN SSL clients on the App Store, such as those of AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure and SonicWall
  • iPhone 6 s - how to remove hidden VPN Express app?

    A few days ago, I received a notification under the name of VPN Express app wanted access to my location information. I had never ordered or installed such an application and declined. The VPN Express App then retired to the background. I thought that I would remove just but discovered it was hidden somehow. If I ask Siri to open it, it opens. How can I find and remove hidden apps? Similar experiences? Anyone know what is happening with this app?

    Use the Spotlight search, it will show where the app.

  • a VPN client is necessary?

    Is a customer VPN as necessary Incognito on MacBook?

    I've recently updated Sierra

    Yes if yu to connect to public networks and you don't want your ISP know what sites you visit

  • Can't ssh on Mac OS VPN server

    I can connect to my VPN L2TP server with my iPhone running iOS 10 through my network of data carriers and passed to my home network from Comcast, but everything does not work;

    What works:

    Access default Web site running the macOS Server using its IP address

    Public Web surfing

    I can ping my phone of any system IP address on my network

    What does not (what I tried):

    SSH to any system macOS on my network

    Access screen sharing on any system macOS on my network

    Resolve the local hostname to an IP address

    More information

    my iphone is running iOS 10

    My computers are running macOS Sierra

    I use Mac OS as host VPN server

    I use the client VPN L2TP iOS 10.

    Firewalls in the system is disabled.

    Typical VPN connections, you use the DNS server of your iPhone and not the DNS server of the network corresponding to your server.  In addition, Hello services are only available on the LAN.  So you have no way to resolve names to IP adrdesses for the network, you are VPNing.

    The only easy solution from an iPhone is to make a list of IP addresses and use them to connect instead of host names.  using IPs will work as long as your ISP does not also use the same internal (like 192.168 or 10.0) IP address than the network that you connect to.

  • integrated macOS Sierra Cisco IPsec VPN does not work anymore (impossible to validate the server certificate)

    Hello

    I just upgraded to macOS Sierra and built-in Cisco IPsec VPN no longer works. When you try to connect, I get a "cannot validate the certificate of the server. "Check your settings and try to reconnect" error message. I use Cisco ASA with self-signed certificates and everything worked fine with previous versions of OS X.

    Please help me, I need my VPN Thx a lot

    I am having the same problem with StrongSwan and help cert signed with the channel to complete certificates included in the pkcs12 file imported to the keychain. It was working properly in El Capitan, but now broken in the Sierra.

  • Cisco VPN does not work in the Sierra

    I just upgraded to OS Sierra and the Cisco VPN, I had the installer does connect more.  The Setup looks right into network preferences. When I click it looks like it is trying but stops without asking for a password.

    Cisco VPN client may need to update or re-installed. If she uses the PPTP Protocol, it will not work. Support for PPTP was ignored, because it is no longer considered as secure.

  • VPN access no longer works after upgrade from 10 IOS!  Any input to fix?

    VPN access no longer works after update IOS 10!  With the help of an iPhone 5 or 6, our employees use their hotspot phone to connect to our VPN.  Suddenly, he broke Monday after the upgrade to IOS 10.  We have experienced many versions of IOS, and it has always worked.  Any patch available?

    Hello howlindaug,
    Thank you for using communities of Apple Support.

    If I understand your message that your employees will no longer be able to connect to your virtual private network with their iPhone 5 or 6 after the upgrade to iOS 10. Sierra Mac OS and iOS 10 delete a VPN profile PPTP connections when a user upgrades from their device. If your VPN is a PPTP connection, you'll want to use one of the options listed in the section below:

    Prepare for removal of PPTP VPN before upgrade you to iOS 10 and macOS Sierra

    Alternatives for PPTP VPN connections

    Try one of these other VPN protocols for authentication by user that are safer:

    • L2TP/IPSec
    • IKEv2/IPSec
    • Cisco IPSec
    • VPN SSL clients on the App Store, such as those of AirWatch, Aruba, Check Point, Cisco, F5 Networks, MobileIron, NetMotion, Open VPN, Palo Alto Networks, Pulse Secure and SonicWall

    Best regards.

Maybe you are looking for

  • Removed add it again in the next place, songs later play playlist iOS 10.0.2

    Using and iPhone 6 installed 10.0.2, when I remove a song from the top then / list of play later and then move to the next or same song to pause and press on play on the current song, the song that I removed back in the list where he was. This starte

  • print quality

    I have HP officejet Pro 8600.  When sending e-mail using eprint. (1) how to configure it to send to the printer and print using lower quality (project) in color or B & W? (2) is there a possibility to limit the pages # to print?  (incase didn't reali

  • HP Color Laserjet 2605dn: Print is washed out/completely wilted on printer 2605dn

    We have a Laserjet 2605dn HP color printer has intermittent printing problems. Most of the time, the quality of the printed output is very well, but from time to time, the print quality deteriorates completely. After a while, printing then returned b

  • Installation of PSC2210

    I am installing a psc2210 aio to my hp computer that uses windows 7 Home premium. I deleted print devices and updated the drivers, selected PSC 2200 series and still nothing. Ideas?

  • Questions about Windows updates.

    OT: Windows updates. I have a system Win Vista and an HP desktop PC. Are updates of any of the system-wide victory or some specific problems in your own PC? John