Question : Cisco VPN connection to PIX 506: AddRoute failed to add a route: code 87

Unable to connect to 'inside' interface (192.168.1.2) on PIX 506.
The 'outside' interface is 192.168.100.80
The following is my Cisco VPN client log:
1      17:41:24.828  01/13/07  Sev=Warning/3      GUI/0xA3B0000B
Reloaded the Certificates in all Certificate Stores successfully.

2      17:47:53.656  01/13/07  Sev=Info/4      CM/0x63100002
Begin connection process

3      17:47:53.671  01/13/07  Sev=Info/4      CVPND/0xE3400001
Microsoft IPSec Policy Agent service stopped successfully

4      17:47:53.671  01/13/07  Sev=Info/4      CM/0x63100004
Establish secure connection using Ethernet

5      17:47:53.671  01/13/07  Sev=Info/4      CM/0x63100024
Attempt connection with server "x.x.x.x"

6      17:47:54.671  01/13/07  Sev=Info/6      IKE/0x6300003B
Attempting to establish a connection with x.x.x.x.

7      17:47:54.687  01/13/07  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to x.x.x.x

8      17:47:54.687  01/13/07  Sev=Info/4      IPSEC/0x63700008
IPSec driver successfully started

9      17:47:54.687  01/13/07  Sev=Info/4      IPSEC/0x63700014
Deleted all keys

10     17:47:54.687  01/13/07  Sev=Info/6      IPSEC/0x6370002C
Sent 306 packets, 0 were fragmented.

11     17:47:55.015  01/13/07  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x

12     17:47:55.015  01/13/07  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK AG (SA, VID(Xauth), VID(dpd), VID(Unity), VID(?), KE, ID, NON, HASH) from x.x.x.x

13     17:47:55.015  01/13/07  Sev=Info/5      IKE/0x63000001
Peer supports XAUTH

14     17:47:55.015  01/13/07  Sev=Info/5      IKE/0x63000001
Peer supports DPD

15     17:47:55.015  01/13/07  Sev=Info/5      IKE/0x63000001
Peer is a Cisco-Unity compliant peer

16     17:47:55.015  01/13/07  Sev=Info/5      IKE/0x63000082
Received IOS Vendor ID with unknown capabilities flag 0x00000025

17     17:47:55.031  01/13/07  Sev=Info/6      IKE/0x63000001
IOS Vendor ID Contruction successful

18     17:47:55.031  01/13/07  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK AG *(HASH, NOTIFY:STATUS_INITIAL_CONTACT, VID(?), VID(Unity)) to x.x.x.x

19     17:47:55.031  01/13/07  Sev=Info/4      IKE/0x63000083
IKE Port in use - Local Port =  0x01F4, Remote Port = 0x01F4

20     17:47:55.031  01/13/07  Sev=Info/4      CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 0 User Authenticated IKE SA in the system

21     17:47:55.031  01/13/07  Sev=Info/4      CM/0x6310000E
Established Phase 1 SA.  1 Crypto Active IKE SA, 1 User Authenticated IKE SA in the system

22     17:47:55.046  01/13/07  Sev=Info/5      IKE/0x6300005E
Client sending a firewall request to concentrator

23     17:47:55.046  01/13/07  Sev=Info/5      IKE/0x6300005D
Firewall Policy: Product=Cisco Systems Integrated Client Firewall, Capability= (Centralized Protection Policy).

24     17:47:55.046  01/13/07  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK TRANS *(HASH, ATTR) to x.x.x.x

25     17:47:55.125  01/13/07  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x

26     17:47:55.125  01/13/07  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK INFO *(HASH, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x

27     17:47:55.125  01/13/07  Sev=Info/5      IKE/0x63000045
RESPONDER-LIFETIME notify has value of 86400 seconds

28     17:47:55.125  01/13/07  Sev=Info/5      IKE/0x63000047
This SA has already been alive for 1 seconds, setting expiry to 86399 seconds from now

29     17:47:55.140  01/13/07  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x

30     17:47:55.156  01/13/07  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK TRANS *(HASH, ATTR) from x.x.x.x

31     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_ADDRESS: , value = 192.168.100.80

32     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_DNS(1): , value = 192.168.1.27

33     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x63000010
MODE_CFG_REPLY: Attribute = INTERNAL_IPV4_NBNS(1) (a.k.a. WINS) : , value = 192.168.1.27

34     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x6300000E
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_DEFDOMAIN: , value = xxxxxxxx.local

35     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_SPLIT_INCLUDE (# of split_nets), value = 0x00000001

36     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x6300000F
SPLIT_NET #1
      subnet = 0.0.0.0
      mask = 0.0.0.0
      protocol = 0
      src port = 0
      dest port=0

37     17:47:55.156  01/13/07  Sev=Info/5      IKE/0x6300000D
MODE_CFG_REPLY: Attribute = MODECFG_UNITY_PFS: , value = 0x00000000

38     17:47:55.156  01/13/07  Sev=Info/4      CM/0x63100019
Mode Config data received

39     17:47:55.156  01/13/07  Sev=Info/4      IKE/0x63000056
Received a key request from Driver: Local IP = 192.168.100.80, GW IP = x.x.x.x, Remote IP = 0.0.0.0

40     17:47:55.156  01/13/07  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH, SA, NON, ID, ID) to x.x.x.x

41     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x6300002F
Received ISAKMP packet: peer = x.x.x.x

42     17:47:55.328  01/13/07  Sev=Info/4      IKE/0x63000014
RECEIVING <<< ISAKMP OAK QM *(HASH, SA, NON, ID, ID, NOTIFY:STATUS_RESP_LIFETIME) from x.x.x.x

43     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x63000045
RESPONDER-LIFETIME notify has value of 28800 seconds

44     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x63000046
RESPONDER-LIFETIME notify has value of 4608000 kb

45     17:47:55.328  01/13/07  Sev=Info/4      IKE/0x63000013
SENDING >>> ISAKMP OAK QM *(HASH) to x.x.x.x

46     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x63000059
Loading IPsec SA (MsgID=5EB7077F OUTBOUND SPI = 0x7CD0776D INBOUND SPI = 0x4392774A)

47     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x63000025
Loaded OUTBOUND ESP SPI: 0x7CD0776D

48     17:47:55.328  01/13/07  Sev=Info/5      IKE/0x63000026
Loaded INBOUND ESP SPI: 0x4392774A

49     17:47:55.390  01/13/07  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0      192.168.5.10      192.168.5.11       20
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
    192.168.5.0     255.255.255.0      192.168.5.11      192.168.5.11       20
   192.168.5.11   255.255.255.255         127.0.0.1         127.0.0.1       20
  192.168.5.255   255.255.255.255      192.168.5.11      192.168.5.11       20
      224.0.0.0         240.0.0.0      192.168.5.11      192.168.5.11       20
255.255.255.255   255.255.255.255      192.168.5.11           0.0.0.0        1
255.255.255.255   255.255.255.255      192.168.5.11      192.168.5.11        1


50     17:47:55.921  01/13/07  Sev=Info/4      CM/0x63100034
The Virtual Adapter was enabled:
      IP=192.168.100.80/255.255.255.0
      DNS=192.168.1.27,0.0.0.0
      WINS=192.168.1.27,0.0.0.0
      Domain=xxxxxxxx.local
      Split DNS Names=

51     17:47:55.921  01/13/07  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0      192.168.5.10      192.168.5.11       20
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
    192.168.1.0   255.255.255.255    192.168.100.80    192.168.100.80        1
    192.168.5.0     255.255.255.0      192.168.5.11      192.168.5.11       20
   192.168.5.11   255.255.255.255         127.0.0.1         127.0.0.1       20
  192.168.5.255   255.255.255.255      192.168.5.11      192.168.5.11       20
  192.168.100.0     255.255.255.0    192.168.100.80    192.168.100.80       20
 192.168.100.80   255.255.255.255         127.0.0.1         127.0.0.1       20
192.168.100.255   255.255.255.255    192.168.100.80    192.168.100.80       20
      224.0.0.0         240.0.0.0      192.168.5.11      192.168.5.11       20
      224.0.0.0         240.0.0.0    192.168.100.80    192.168.100.80       20
255.255.255.255   255.255.255.255      192.168.5.11      192.168.5.11        1
255.255.255.255   255.255.255.255      192.168.5.11           0.0.0.0        1
255.255.255.255   255.255.255.255    192.168.100.80    192.168.100.80        1


52     17:47:55.921  01/13/07  Sev=Warning/2      CVPND/0xE3400013
AddRoute failed to add a route: code 87
      Destination      192.168.5.255
      Netmask      255.255.255.255
      Gateway      192.168.100.80
      Interface      192.168.100.80

53     17:47:55.921  01/13/07  Sev=Warning/2      CM/0xA3100024
Unable to add route. Network: c0a805ff, Netmask: ffffffff, Interface: c0a86450, Gateway: c0a86450.

54     17:47:55.937  01/13/07  Sev=Info/4      CM/0x63100038
Successfully saved route changes to file.

55     17:47:55.937  01/13/07  Sev=Info/5      CVPND/0x63400013
    Destination           Netmask           Gateway         Interface   Metric
        0.0.0.0           0.0.0.0      192.168.5.10      192.168.5.11       20
        0.0.0.0           0.0.0.0    192.168.100.80    192.168.100.80        1
      x.x.x.x   255.255.255.255      192.168.5.10      192.168.5.11        1
      127.0.0.0         255.0.0.0         127.0.0.1         127.0.0.1        1
    192.168.1.0   255.255.255.255    192.168.100.80    192.168.100.80        1
    192.168.5.0     255.255.255.0      192.168.5.11      192.168.5.11       20
    192.168.5.0     255.255.255.0    192.168.100.80    192.168.100.80       20
   192.168.5.10   255.255.255.255      192.168.5.11      192.168.5.11        1
   192.168.5.11   255.255.255.255         127.0.0.1         127.0.0.1       20
  192.168.5.255   255.255.255.255      192.168.5.11      192.168.5.11       20
  192.168.100.0     255.255.255.0    192.168.100.80    192.168.100.80       20
 192.168.100.80   255.255.255.255         127.0.0.1         127.0.0.1       20
192.168.100.255   255.255.255.255    192.168.100.80    192.168.100.80       20
      224.0.0.0         240.0.0.0      192.168.5.11      192.168.5.11       20
      224.0.0.0         240.0.0.0    192.168.100.80    192.168.100.80       20
255.255.255.255   255.255.255.255      192.168.5.11      192.168.5.11        1
255.255.255.255   255.255.255.255      192.168.5.11           0.0.0.0        1
255.255.255.255   255.255.255.255    192.168.100.80    192.168.100.80        1


56     17:47:55.937  01/13/07  Sev=Info/6      CM/0x63100036
The routing table was updated for the Virtual Adapter

57     17:47:56.000  01/13/07  Sev=Info/4      CM/0x6310001A
One secure connection established

58     17:47:56.046  01/13/07  Sev=Info/4      CM/0x6310003B
Address watch added for 192.168.5.11.  Current hostname: RMMLifebook, Current address(es): 192.168.100.80, 192.168.5.11.

59     17:47:56.062  01/13/07  Sev=Info/4      CM/0x6310003B
Address watch added for 192.168.100.80.  Current hostname: RMMLifebook, Current address(es): 192.168.100.80, 192.168.5.11.

Any help or suggestions would be greatly appreciated

Answer : Cisco VPN connection to PIX 506: AddRoute failed to add a route: code 87

Going back and looking at the log, it does seem to succesfully connect to the VPN.  So for now I would ignore the route add failure.

So, after you get connected, what can't you do?  

You may want to go to here:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/prod_configuration_examples_list.html

and search for "VPN Client"  there are a couple different sample configs that may help you with the PIX config.
Random Solutions  
 
programming4us programming4us