Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

Can't connect to Cisco VPN Devices

We have configured our Firewall (Cisco PIX 501) to enable VPN connections from outside the LAN.

This works fine with the "+Cisco VPN Client+" Application, which *can successfully connect to our LAN* from outside the network; *but it's NOT possible to do this with Mac OS X's built-in VPN Client:*

We have created an VPN Connection in the Network Preferences (VPN-Type: Cisco IPSec) and _entered everything exactly in the same way as in Cisco's VPN Client_, but the Mac always says that it +can't reach/connect to the VPN Server...+

We have also tried out almost everything in the encryption section of the Firewall, but no success. 😟
+(The ONLY working way is to enable PPTP on the Firewall together with Mac OS X's VPN-PPTP Connection, but this encryption type is not save enough for our requirements.)+

So - I cant understand why Apple offers a way to connect to Cisco VPN Devices although it's not possible to create a connection to them. 😟

*Any ideas? I'd really be glad for a helping hand!*

Regards,
Chris

Mac Pro 2 x 2.4 GHz, Mac OS X (10.6.6), 3 XServes, Cisco PIX 501

Posted on Jan 9, 2011 9:01 AM

Reply
14 replies

Jan 10, 2011 7:27 AM in response to Chris Pastl

No, I don't use the built-in VPN. I was doing so until our corporate folks did something which broke that. Since then I've used the Cisco software which was cobbled together by someone (our IT guy found it for me), and that worked reliably until 10.6.6 was released. Need I add that Macs are not supported by my corporate IT people?

If you're using the built-in VPN, may I suggest having a talk with whatever IT person you deal with. That was enough to get me started. I walked in with my laptop, plugged it into the network, and our technician helped me set it up.

David

Jan 11, 2011 9:04 AM in response to WisDavid

Exact same problem here. Once I upgraded to 10.6.6 vpn no longer works. The log file from the Cisco VPN client:

Cisco Systems VPN Client Version 4.9.01 (0100)
Copyright (C) 1998-2006 Cisco Systems, Inc. All Rights Reserved.
Client Type(s): Mac OS X
Running on: Darwin 10.6.0 Darwin Kernel Version 10.6.0: Wed Nov 10 18:13:17 PST 2010; root:xnu-1504.9.26~3/RELEASE_I386 i386
Config file directory: /etc/opt/cisco-vpnclient

1 10:52:20.526 01/11/2011 Sev=Info/4 CM/0x43100002
Begin connection process

2 10:52:20.526 01/11/2011 Sev=Warning/2 CVPND/0x83400011
Error -28 sending packet. Dst Addr: 0x0A0001FF, Src Addr: 0x0A000107 (DRVIFACE:1158).

3 10:52:20.865 01/11/2011 Sev=Info/4 CM/0x43100004
Establish secure connection using Ethernet

4 10:52:20.865 01/11/2011 Sev=Info/4 CM/0x43100024
Attempt connection with server "134.124.99.1"

5 10:52:20.865 01/11/2011 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (500).

6 10:52:20.865 01/11/2011 Sev=Warning/2 CVPND/0xC340001C
Privilege Separation: unable to bind to port: (500).

7 10:52:21.865 01/11/2011 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (500).

8 10:52:21.865 01/11/2011 Sev=Warning/2 CVPND/0xC340001C
Privilege Separation: unable to bind to port: (500).

9 10:52:22.865 01/11/2011 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (500).

10 10:52:22.866 01/11/2011 Sev=Warning/2 CVPND/0xC340001C
Privilege Separation: unable to bind to port: (500).

11 10:52:23.866 01/11/2011 Sev=Info/4 CVPND/0x43400019
Privilege Separation: binding to port: (500).

12 10:52:23.866 01/11/2011 Sev=Warning/2 CVPND/0xC340001C
Privilege Separation: unable to bind to port: (500).

13 10:52:23.866 01/11/2011 Sev=Critical/1 CVPND/0xC3400003
Function SocketApiBind() failed with an error code of 0xFFFFFFFF(ike-init-state.cpp:402)

14 10:52:23.866 01/11/2011 Sev=Critical/1 CVPND/0x43400012
Unable to bind to IKE port. This could be because there is another VPN client installed or running. Please disable or uninstall all VPN Clients other than the Cisco VPN Client.

15 10:52:23.866 01/11/2011 Sev=Info/4 CM/0xC3100003
Failure to Initialize IKE ports

16 10:52:23.866 01/11/2011 Sev=Info/5 CM/0x43100025
Initializing CVPNDrv

17 10:52:23.866 01/11/2011 Sev=Info/4 CVPND/0x4340001F
Privilege Separation: restoring MTU on primary interface.

18 10:52:23.867 01/11/2011 Sev=Info/4 IPSEC/0x43700008
IPSec driver successfully started

19 10:52:23.867 01/11/2011 Sev=Info/4 IPSEC/0x43700014
Deleted all keys

20 10:52:23.867 01/11/2011 Sev=Info/4 IPSEC/0x43700014
Deleted all keys

21 10:52:23.867 01/11/2011 Sev=Info/4 IPSEC/0x43700014
Deleted all keys

22 10:52:23.867 01/11/2011 Sev=Info/4 IPSEC/0x4370000A
IPSec driver successfully stopped

Mar 2, 2011 11:16 AM in response to mdwhitis

Presumably if you are running your own Cisco VPN concentrator, you already know what your shared secret is, but if you don't happen to know, the CiscoVPN Client keeps an encrypted copy in a .pcf file found in:

/private/etc/CiscoSystemsVPNClient/Profiles

Cisco's method for encrypting this data has been reverse engineered so recovering the shared secret is fairly trivial. My guide (linked in the previous post) includes a form which converts "enc_GroupPwd" strings from .pcf files to their plain-text variant which when used as the shared secret make the native OS X VPN work in place of the CiscoVPN Client.

Mar 3, 2011 1:30 PM in response to reason001

As an aside, the current version of Cisco VPNClient is 4.9.01.0280 - released in January. Unfortunately, you have to have a Cisco Connection Online account (which usually means a SmartNet Maintenance contract) in order to have access to download it. If you work for an organization, have whomever manages your Cisco equipment log in and download it for you.

I've been able to make the built-in Snow Leopard IPSec VPN client work 99% of the time. However, I have one environment, where end users are VPN'ing into an ASA 5520, where they can connect with the built-in client, but not resolve DNS or pass any traffic. Cisco VPNClient works fine with the exact same info. I opened a TAC case with Cisco; they reviewed the ASA config, and pronounced it correct, yet it does not work.

I originally stumbled on this thread because a user had purchased one of the new Early 2011 MacBook Pro's, however she could not get Cisco VPNClient to connect (the kext wouldn't load, complained of wrong architecture). That's when I found the new .0280 version; there was a .0230 version released awhile ago which we had been using with no problems under Snow Leopard...

Mar 24, 2011 8:04 PM in response to Chris Pastl

I found a TEMPORARY solution.

The short answer: "hard code" all DNS servers. No Automatic configurations.

I have observed that traffic is still route-able over the regular internet connection and to the remote network being accessed via Cisco IPSEC, only DNS is hurt!

To fix this you will have to "hard code" all DNS servers in your network configuration, DHCP and other automatic configurations will be ignored!

On the plus side, you will have all the IP addresses you need will be in your network interface's config as "soft" in a light grey font.
To get to a typical DNS configuration for an interface you will go into System Settings -> Network -> Click on a required interface --> Advanced button and then finally there will be a DNS tab. All you need to do is put that nice and soft IP address in by clicking the "+" button.

If your in a bit of a BIND, for a public DNS server (On your Airport or Ethernet interfaces) may I recommend Google's DNS server at 8.8.8.8 because it is very easy to remember. This will allow you to speed up your configuration by not having to even think of "192.168.0.1","10.0.0.1" or "234.245.12.333". (Good luck with that last one!)

Possibly Optional:
And as for your VPN interface, you will need to add your super secret domains into the "Search Domains" box by clicking on the "+". I have observed some odd behavior with adding these.

If you have issues with the above, you should setup a resolver configuration.
To do this you will have to do the following:

Open up the terminal, type "sudo bash" and then enter your password.
Make a directory with "mkdir /etc/resolver"
Change the current directory to resolver with "cd /etc/resolver"
Now you will have to create a file for each domain on the VPN you wish to access (yes pain, thankfully I only have a couple to setup). For this example I will use the domain "foo.com", so create the file by typing in "nano foo.com".
Now fill the file with the following (note the almost bogus IP address) :


domain foo.com
nameserver 8.8.8.8 <-- change to your VPN's DNS server

Hit "Control+x" to save and exit.

And then you should be OK.

It isn't ideal, but it is working for me at the moment.

BONUS:
Hopefully your host list isn't long, Edit /etc/hosts:
Company hostnames that exist on the public internet you will want to specify in your hosts file.
ie:
mail.your-company-email-hosted-by-google.com
VPN endpoints
Any other site you need outside the VPN

The reason for doing this is once you connect to vpnendpoint.foo.com, you may not be able to resolve it again because of the resolver config or the OS X DNS configuration. So re-connecting to the VPN without rebooting will be impossible, and in one case where I used the raw IP instead of a hostname!

Apple: you're not off the hook, please fix so we don't have to do this crap!

OH, and fix the ** key management issue! I am sick of re-entering my passwords and keys!!

Jul 10, 2012 7:11 PM in response to reason001

I was having a very similar issue with Snow Leopard 10.6.8 - I ran another VPN client, and then could no longer get the Cisco VPN client to run.


In the Cisco VPN Client, I was getting:

31414:39:38.673 07/10/2012 Sev=Info/4CVPND/0x43400019

Privilege Separation: binding to port: (500).


31514:39:38.674 07/10/2012 Sev=Warning/2CVPND/0xC340001C

Privilege Separation: unable to bind to port: (500).


31614:39:38.674 07/10/2012 Sev=Critical/1 CVPND/0xC3400003

Function SocketApiBind() failed with an error code of 0xFFFFFFFF(ike-init-state.cpp:402)


31714:39:38.674 07/10/2012 Sev=Critical/1 CVPND/0x43400012

Unable to bind to IKE port. This could be because there is another VPN client installed or running. Please disable or uninstall all VPN Clients other than the Cisco VPN Client.


31814:39:38.674 07/10/2012 Sev=Info/4CM/0xC3100003

Failure to Initialize IKE ports


What worked for me was to find the process using isakmp, kill it, and then start up the Cisco VPN software and connect to a site.


~ cwr$ sudo lsof -i

...

iked 46 root 15u IPv4 0x0dac7d38 0t0 UDP *:isakmp

iked 46 root 16u IPv4 0x0dac7c5c 0t0 UDP *:ipsec-msft

...


~ cwr$ sudo kill -1 46


I was then able to start up the Cisco VPN client, which was able to bind to port 500 (iaskmp)


~ cwr$ sudo lsof -i

....

cvpnd 401 nobody 6u IPv4 0x0dc6bf28 0t0 TCP localhost:29746 (LISTEN)

cvpnd 401 nobody 7u IPv4 0x0ebb6658 0t0 UDP localhost:29746

cvpnd 401 nobody 8u IPv4 0x0ddc1378 0t0 TCP localhost:29746->localhost:55938 (ESTABLISHED)

cvpnd 401 nobody 9u IPv4 0x0dc6b2f8 0t0 TCP localhost:29746->localhost:55941 (ESTABLISHED)

cvpnd 401 nobody 10u IPv4 0x0dcc2378 0t0 TCP localhost:55942->localhost:29748 (ESTABLISHED)

cvpnd 401 nobody 11u IPv4 0x0dac6604 0t0 UDP *:isakmp

cvpnd 401 nobody 13u IPv4 0x0ebb68ec 0t0 UDP *:ipsec-msft

....

~ cwr$

Can't connect to Cisco VPN Devices

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple ID.