3945 site VPN termination - not on p2p connect interface

Nice day!

Our border router connects to the ISP router with a subnet of p2p. The IP address on our router connect interface cannot be used for other services such as VPN. Provider filters all packets with this address defined in an IP header. Therefore, we must use the addresses of the other publicly routed subnet. I understand that we can place another router behind this border router and set his foreign address as an address on that subnet 'admitted '. But we want to offer this service on the same edge router. Is this possible? I tried to put the card encryption on a loopback interface and the traffic directly to it for encryption.

crypto ISAKMP policy 1

BA 3des

preshared authentication

Group 2

ISAKMP crypto key address z.z.172.2 no-xauth

crypto ipsec transform-set TRANS1 esp-3des esp-sha-hmac

crypto map VPN 10 ipsec-isakmp
set peer z.z.172.2
set transform-set TRANS1
match address CRYPTO_ACL

interface loopback0

description -= VPN Termination =-

ip address x.x.127.111 255.255.255.255

crypto map VPN

interface GigabitEthernet0/0.10

description -= ISP Gateway =-

encapsulation dot1Q 10

ip address y.y.122.203 255.255.255.248

interface GigabitEthernet0/0.20

description -= LAN =-

encapsulation dot1Q 20

ip address 192.168.10.1 255.255.255.0

ip route 0.0.0.0 0.0.0.0 y.y.122.201

ip route 192.168.100.0 255.255.255.0 loopback 0

ip access-list extended CRYPTO_ACL
permit ip 192.168.10.0 0.0.0.255 192.168.100.0 0.0.0.255

I does not work. The packet does not get encrypted but simply routed to the ISP router.

Please, help.

Thanks.

Viktor,

I believe crypto map on loopback interface is still unsupported but I have not been following this in the past.

The way we do it, is apply the actul crypto map to physical/logical interface facing the ISP BUT you tweak the crypto map to use loopback as it's local address.

In your case it'd look like this:

crypto map VPN local-address loopback0

In this place all everyone will think that this tunnel is established with the address assigned to the interface loopback0.

Hope this helps,

Marcin

Tags: Cisco Security

Similar Questions

  • 887VDSL2 IPSec site to site vpn does NOT use the easy vpn

    Much of community support.

    as I'm looking through the config Guide about 870 router series, only to find information about the config with eazy vpn.

    is there a classic way, about 870 Series site 2 site without eazy vpn IPSec configuration?

    Have a classic way if a tunnel? Have the 870 is not as a vpn client?

    Thank you

    Of course, here's example of Site to Site VPN configuration for your reference:

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080194650.shtml

    http://www.Cisco.com/en/us/products/HW/routers/ps221/products_configuration_example09186a008073e078.shtml

    Hope that helps.

  • Site to site VPN works not

    Hello

    I can't get my work vpn site-to-site. Not only that but I am unable to get an internet connection through my ASA. I need to use the IP address public for my local network provided by IPS = 99.143.97.186 - 190 = 255.255.255.248 subnet mask

    I followed this tutorial: http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-nex...

    can someone please take a look at my settings and help out me? Very much appreciated. Thank you.

    See the ciscoasa config (config) #.
    : Saved
    : Written by enable_15 at 01:12:15.869 UTC Thu Sep 4 2008
    !
    ASA Version 8.2 (5)
    !
    ciscoasa hostname
    activate 8Ry2YjIyt7RRXU24 encrypted password
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 99.143.97.186 255.255.255.248
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP 192.168.1.84 255.255.255.0
    !
    interface Vlan3
    No nameif
    no level of security
    no ip address
    !
    passive FTP mode
    access-list extended 100 permit ip 99.143.97.184 255.255.255.248 host 206.127.20.63
    99.143.97.184 IP Access-list extended sheep 255.255.255.248 allow host 206.127.20.63
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0 access-list sheep
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Route outside 206.127.20.63 255.255.255.255 192.168.1.254 1
    Route outside 206.127.21.3 255.255.255.255 192.168.1.254 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    Enable http server
    http 99.143.97.184 255.255.255.248 inside
    http 99.143.97.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    correspondence address card crypto outside_map 20 100
    peer set card crypto outside_map 20 206.127.21.3
    card crypto outside_map 20 transform-set RIGHT
    outside_map interface card crypto outside
    Crypto ca trustpoint _SmartCallHome_ServerCA
    Configure CRL
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    dhcpd outside auto_config
    !
    dhcpd address 99.143.97.187 - 99.143.97.190 inside
    !

    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    tunnel-group 206.127.21.3 type ipsec-l2l
    IPSec-attributes tunnel-group 206.127.21.3
    pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    !
    global service-policy global_policy
    context of prompt hostname
    anonymous reporting remote call
    Cryptochecksum:0ab759de3926ddb63f79f18a8422409e

    ciscoasa (config) # show crypto isakmp his

    There is no isakmp sas

    ciscoasa (config) # show ip performance
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 99.143.97.186 255.255.255.248
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP 192.168.1.84 255.255.255.0
    !

    You have an interface incorrect configuration: -.

    Add these lines and share how it rates:

    interface Vlan1
    no address ip 99.143.97.186 255.255.255.248
    IP 192.168.1.84 255.255.255.0

    interface Vlan2
    no address ip 192.168.1.84 255.255.255.0
    IP 99.143.97.186 255.255.255.248

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • IOS VPN will not respond to connections Cisco VPN Client.

    Hi all

    I'll put my routers fire here.

    I have two 2921 SRI both with licenses of security concerning leased lines separated. I configured one to accept our workers to remote Client VPN Cisco VPN connections.

    I have followed the set up process I used on another site with a router 1841/s and the same customers and I have also checked against the config given in the last guide of IOS15 EasyVPN.

    With debugs all assets, all I see is

    038062: 14:03:04.519 Dec 8: ISAKMP (0): received x.y.z.z dport-60225 Global (N) SA NEW 500 sport package
    038063: 14:03:04.519 Dec 8: ISAKMP: created a struct peer x.y.z.z, peer port 60225
    038064: 14:03:04.519 Dec 8: ISAKMP: new position created post = 0x3972090C peer_handle = 0x8001D881
    038065: 14:03:04.523 Dec 8: ISAKMP: lock struct 0x3972090C, refcount 1 to peer crypto_isakmp_process_block
    038066: 14:03:04.523 Dec 8: ISAKMP: (0): client setting Configuration parameters 3E156D70
    038067: 14:03:10.027 Dec 8: ISAKMP (0): packet received x.y.z.z dport 500 sport 60225 Global (R) MM_NO_STATE

    Here is the abbreviated config.

    System image file is "flash0:c2900 - universalk9-mz.» Spa. 154 - 1.T1.bin.

    AAA new-model
    !
    !
    AAA authentication login default local
    local VPNAUTH AAA authentication login
    AAA authorization exec default local
    local authorization AAA VPN network
    !
    !
    !
    !
    !
    AAA - the id of the joint session

    crypto ISAKMP policy 10
    BA aes
    preshared authentication
    Group 14

    ISAKMP crypto group configuration of VPN client
    key ****-****-****-****
    DNS 192.168.177.207 192.168.177.3
    xxx.local field
    pool VPNADDRESSES
    ACL REVERSEROUTE

    Crypto ipsec transform-set aes - esp esp-sha-hmac HASH
    tunnel mode

    Profile of crypto ipsec IPSECPROFILE
    the HASH transform-set value

    dynamic-map crypto VPN 1
    the HASH transform-set value
    market arriere-route
    !
    !
    list of authentication of card crypto client VPN VPNAUTH
    card crypto VPN VPN isakmp authorization list
    crypto map VPN client configuration address respond
    card crypto 65535-isakmp dynamic VPN ipsec VPN
    !
    !
    local IP VPNADDRESSES 172.16.198.16 pool 172.16.198.31

    REVERSEROUTE extended IP access list
    IP 192.168.0.0 allow 0.0.255.255 everything
    Licensing ip 10.0.0.0 0.0.0.255 any

    scope of IP-FIREWALL access list
    2 allow any host a.b.c.d eq non500-isakmp udp
    3 allow any host a.b.c.d eq isakmp udp
    4 ahp permits any host a.b.c.d
    5 esp of the permit any host a.b.c.d

    If anyone can see anything wrong, I would be very happy and it would save the destruction of a seemingly innocent router.

    Thank you

    Paul

    > I would be so happy and it would save the destruction of a seemingly innocent router.

    No, which won't work! But instead of destroying the router, I can do it for you. Just send it to me... ;-)

    OK, now more serious...

    1. The default Cisco IPSec client uses only DH group 2, while you set up the 14. Try to use Group 2 in your isakmp policy.
    2. You have your virtual model in place? She is not in the config.
  • VPN could not establish a connection to the security gateway

    My VPN connection worked, but now after several hours I can not connect.

    My LAN works. (Windows Server 2003)

    The app:

    Cisco Systems VPN Client

    The error message:

    Opening TCP to 209.189.224.138, port 10000...

    Communicating with the gateway to 209.189.224.138...

    Cannot establish a connection to the security gateway.

    What could be the problem?

    Thank you

    Greg

    Hi greg,.

    on the properties of tunnel-> transport mode, click ipsec over UDP and try to connect... I think that, from now on, you connect via TCP 10000.

    Concerning

    REDA

  • Site to Site VPN will not be forwarded to individual hosts, only of the whole networks

    I have a VPN site-to-site built between a Cisco 1750 router and an ASA 5555 X running 5 9.2 (4)

    There is no problem with the change sets, key exchange. However, I noticed that the ACL that is used to create the field of encryption on the SAA does not work correctly if the network on the 1750 is compared to the individual hosts on the SAA.

    Example of

    permit access-list extended access acme ip 172.25.91.64 255.255.255.224 host 192.168.10.24

    on the SAA where 192.168.10.24 is the remote host and 17.25.91.64 27 is protected behind the ASA network. If the 192.168.10.24 host tries to ping 172.25.91.70, I see the tunnel begin to form on the ASA and then fail with a message "failed policy."

    If I go the other way around, the 172.25.91.70 host to 192.168.10.24, the tunnel is built and traffic is allowed.

    If I change the ACL to use only the network address (in other words, use 192.168.10.0/24), it works in two ways.

    What happens here? If I use a group of objects instead of individual hosts directly going to work? Not sure why it's a failure.

    It depends on the implementation of the provider.

    Using the baseline IPSEC policy, the networks of each side must match. Filtering in the tunnel does not rely on the establishment of a tunnel, one can be a host or a subnet.

  • Site to site VPN tunnel - cannot ping the second interface of the firewall peer inside2

    I have two ASA 5505 firewall each with a basic license: FWa and FWb. currently there is a VPN tunnel between them work. I added a second (inside2) interface to the firewall, FWb, but I can't ping firewall FWa, so that I can ping the inside interface of FWa.

    I can ping the FWb inside interface 192.168.20.1 from the FWa inside 172.16.1.1 interface, but I can not ping to the 10.52.100.10 of the FWa FWb inside2 interface. I can not ping the gateway host FWa 10.52.100.1.

    I show the essential configuration of two firewalls as well as the debug icmp output on the two firewalls that I ping the internal interfaces and of FWa FWb inside2.
    =========================================================

    Here is a skeleton of the FWa configuration:

    name 172.16.1.0 network-inside
    name 192.168.20.0 HprCnc Thesys
    name 10.52.100.0 ring52-network
    name 10.53.100.0 ring53-network
    name S.S.S.S outside-interface

    interface Vlan1
    nameif inside
    security-level 100
    IP 172.16.1.1 255.255.255.0
    !
    interface Vlan2
    Description Connection to 777 VLAN to work around static Comast external Modem and IP address.
    nameif outside
    security-level 0
    outside interface IP address 255.255.255.240

    the DM_INLINE_NETWORK_5 object-group network
    network-object HprCnc Thesys 255.255.255.0
    ring52-network 255.255.255.0 network-object
    ring53-network 255.255.255.0 network-object

    the DM_INLINE_NETWORK_3 object-group network
    ring52-network 255.255.255.0 network-object
    network-object HprCnc Thesys 255.255.255.0
    ring53-network 255.255.255.0 network-object

    outside-interface of the access-list extended permitted Outside_5_cryptomap ip host object-group DM_INLINE_NETWORK_3
    inside_nat_outbound list extended access allowed inside-network ip, 255.255.255.0 DM_INLINE_NETWORK_5 object-group
    permit access list extended ip host 173.162.149.72 Outside_nat0_outbound aus_asx_uat 255.255.255.0

    NAT (inside) 0 access-list sheep
    NAT (inside) 101-list of access inside_nat_outbound
    NAT (inside) 101 0.0.0.0 0.0.0.0
    NAT (outside) 0-list of access Outside_nat0_outbound

    card crypto VPN 5 corresponds to the address Outside_5_cryptomap
    card crypto VPN 5 set pfs Group1
    VPN 5 set peer D.D.D.D crypto card
    VPN 5 value transform-set VPN crypto card
    tunnel-group D.D.D.D type ipsec-l2l
    IPSec-attributes tunnel-Group D.D.D.D
    pre-shared key *.

    =========================================================

    FWb:

    name 10.52.100.0 ring52-network
    name 10.53.100.0 ring53-network
    name 10.51.100.0 ring51-network
    name 10.54.100.0 ring54-network

    interface Vlan1
    nameif inside
    security-level 100
    address 192.168.20.1 255.255.255.0
    !
    interface Vlan2
    nameif outside
    security-level 0
    address IP D.D.D.D 255.255.255.240
    !
    interface Vlan52
    prior to interface Vlan1
    nameif inside2
    security-level 100
    IP 10.52.100.10 255.255.255.0

    the DM_INLINE_NETWORK_3 object-group network
    ring52-network 255.255.255.0 network-object
    ring53-network 255.255.255.0 network-object

    the DM_INLINE_NETWORK_2 object-group network
    ring52-network 255.255.255.0 network-object
    object-network 192.168.20.0 255.255.255.0
    ring53-network 255.255.255.0 network-object

    inside_nat0_outbound to access extended list ip 192.168.20.0 allow 255.255.255.0 host S.S.S.S
    inside2_nat0_outbound list extended access allowed object-group DM_INLINE_NETWORK_3 S.S.S.S ip host

    outside_1_cryptomap list extended access allowed object-group DM_INLINE_NETWORK_2 S.S.S.S ip host

    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    inside2_nat0_outbound (inside2) NAT 0 access list
    NAT (inside2) 1 0.0.0.0 0.0.0.0

    Route inside2 network ring51 255.255.255.0 10.52.100.1 1
    Route inside2 network ring53 255.255.255.0 10.52.100.1 1
    Route inside2 network ring54 255.255.255.0 10.52.100.1 1

    card crypto outside_map 1 match address outside_1_cryptomap
    card crypto outside_map 1 set pfs Group1
    outside_map game 1 card crypto peer S.S.S.S
    card crypto outside_map 1 set of transformation-ESP-3DES-SHA
    outside_map interface card crypto outside

    tunnel-group S.S.S.S type ipsec-l2l
    IPSec-attributes tunnel-group S.S.S.S
    pre-shared key *.

    =========================================================================
    I'm Tournai on icmp trace debugging on both firewalls and could see the traffic arriving at the inside2 interface, but never return to FWa.

    Ping Successul FWa inside the interface on FWb

    FWa # ping 192.168.20.1
    Type to abort escape sequence.
    Send 5, echoes ICMP 100 bytes to 192.168.20.1, time-out is 2 seconds:
    Echo request ICMP from outside-interface to 192.168.20.1 ID = 32068 seq = 23510 len = 72
    ! ICMP echo reply to 192.168.20.1 in outside-interface ID = 32068 seq = 23510 len = 72
    ....

    FWb #.
    Echo ICMP of S.S.S.S to 192.168.20.1 ID request = 32068 seq = 23510 len = 72
    ICMP echo reply 192.168.20.1 S.S.S.S ID = 32068 seq = 23510 len = 72
    ==============================================================================
    Successful ping of Fwa on a host connected to the inside interface on FWb

    FWa # ping 192.168.20.15
    Type to abort escape sequence.
    Send 5, echoes ICMP 100 bytes to 192.168.20.15, wait time is 2 seconds:
    Echo request ICMP from outside-interface to 192.168.20.15 ID = seq 50862 = 18608 len = 72
    ! ICMP echo reply to 192.168.20.15 in outside-interface ID = seq 50862 = 18608 len = 72
    ...

    FWb #.
    Inside outside:S.S.S.S ICMP echo request: 192.168.20.15 ID = seq 50862 = 18608 len = 72
    ICMP echo reply to Interior: 192.168.20.15 outside:S.S.S.S ID = seq 50862 = 18608 len = 72

    ===========================
    Unsuccessful ping of FWa to inside2 on FWb interface

    FWa # ping 10.52.100.10
    Send 5, echoes ICMP 100 bytes to 10.52.100.10, wait time is 2 seconds:
    Echo request ICMP from outside-interface to 10.52.100.10 ID = 19752 seq = 63173 len = 72
    ? Echo request ICMP from outside-interface to 10.52.100.10 ID = 19752 seq = 63173 len = 72
    ...

    FWb #.
    10.52.100.10 ID of S.S.S.S ICMP echo request = 19752 seq = 63173 len = 72
    10.52.100.10 ID of S.S.S.S ICMP echo request = 19752 seq = 63173 len = 72
    ....

    ==================================================================================

    Unsuccessful ping of Fwa to a host of related UI inside2 on FWb

    FWa # ping 10.52.100.1
    Type to abort escape sequence.
    Send 5, echoes ICMP 100 bytes to 10.52.100.1, wait time is 2 seconds:
    Echo request ICMP from outside-interface to 10.52.100.1 ID = 11842 seq = 15799 len = 72

    FWb #.
    Echo request ICMP outside:S.S.S.S to inside2:10.52.100.1 ID = 11842 seq = 15799 len = 72
    Echo request ICMP outside:S.S.S.S to inside2:10.52.100.1 ID = 11842 seq = 15799 len = 72

    =======================

    Thank you

    Hi odelaporte2,

    Is very probably the "access management" command is not applied in the second inside, only inside primary (see the race management) which will confirm.

    This command can be applied to an interface at a time, for example, if the law is now applied to the inside, it can not be applied to the inside2 at the same time.

    It may be useful

    -Randy-

  • Site to site VPN (ASA-> router IOS, with two interfaces) help

    Dear,

    I need help to configure VPN from Site to Site of cisco ASA to the IOS router, the router has 2 WAN links, a primary and secondary backup.

    There was only a single week of link there is, now we have installed the second link as a backup, we use OSPF as the routing protocol.

    VPN with simple link worked fine, now, when the main link fails the network is down.

    Waiting for response.

    There is an easy solution.  On the router, you must terminate the VPN on the loopback interface.

    something like this:

    interface lo0

    IP x.x.x.x where x.x.x.x

    card crypto-address lo0

    interface wan_1

    vpn crypto card

    interface wan_2

    vpn crypto card

    One condition is that the loopback interface has accessible by the device of the SAA.

  • Site to Site VPN tunnel is not come between 2 routers

    Dear all,

    I have 2 routers for branch which is configured for VPN site-to-site, but the tunnel does not come!

    I ran debug and I enclose herwith output for your kind review and recommendation. I also enclose here the 2 routers configs branch.

    Any idea on why the Site to site VPN is not coming?

    Kind regards

    Haitham

    You guessed it!

    Just because you have re-used the same card encryption for LAN to LAN and vpn-client traffic.

    This from the DOC CD

    No.-xauth

    (Optional) Use this keyword if the router to router IP Security (IPSec) is on the same card encryption as a virtual private network (VPN) - client - to-Cisco-IOS IPSec. This keyword prevents the router causing the peer for the information of extended authentication (Xauth) (username and password).

  • Problems with site-to-site vpn with of the asa 2

    I tried different ways so that this works, but failed. After 8 hours, I literally have a bad headache and have to step away for a minute.  I realize I need to ping between the tunnels mentioned, but still can not to. can someone take a look and tell me where I have gone wrong?  Im trying to configure a site to site vpn between:

    ASA_A

    external interface 5.179.17.66

    inside the interface 10.1.1.1

    ASA B

    external interface 5.81.57.19

    inside the 10.1.2.1 interface

    Frist why do you have two DGs on box -

    Route outside 0.0.0.0 0.0.0.0 5.179.121.65 1

    Route outside 0.0.0.0 0.0.0.0 5.179.17.65 1

    Attach the two end then it should work.

    Thank you

    Ajay

  • Site to Site VPN configuration does not

    Hello

    I just tried to set up a test site to site VPN. Diagram of arrangement is attached. Router R2 is supposed to act as the 'Internet' to allow connectivity between the two networks.

    My VPN on ASA1 and ASA2 configs are below:

    ASA1

    Note to outside_cryptomap_1 to access list VPN traffic to encrypt
    outside_cryptomap_1 to access extended list ip 10.10.10.0 allow 255.255.255.0 172.16.10.0 255.225.255.0

    Crypto ikev1 allow outside
    IKEv1 crypto policy 1
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    life 86400

    tunnel-group 11.11.11.2 type ipsec-l2l
    IPSec-attributes tunnel-Group 11.11.11.2
    Cisco pre-shared key IKEv1

    Crypto ipsec transform-set ikev1 AES - SHA esp-aes-256 esp-sha-hmac
    card crypto outside_map 1 match address outside_cryptomap_1
    peer set card crypto outside_map 1 11.11.11.2
    card crypto outside_map 1 set of transformation-AES-SHA
    outside_map interface card crypto outside

    ASA2

    Note to outside_cryptomap_1 to access list VPN traffic to encrypt
    permit access list extended ip 172.16.10.0 outside_cryptomap_1 255.255.255.0 10.10.10.0 255.225.255.0

    Crypto ikev1 allow outside
    IKEv1 crypto policy 1
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    life 86400

    tunnel-group 12.12.12.2 type ipsec-l2l
    IPSec-attributes tunnel-group 12.12.12.2
    Cisco pre-shared key IKEv1

    Crypto ipsec transform-set ikev1 AES - SHA esp-aes-256 esp-sha-hmac
    card crypto outside_map 1 match address outside_cryptomap_1
    peer set card crypto outside_map 1 12.12.12.2
    card crypto outside_map 1 set of transformation-AES-SHA
    outside_map interface card crypto outside

    I can ping with the ASA2 ASA1, but when I try to test the VPN trying from one PC to another, I get nothing.

    I tried a few commands show and they came out absolutely empty... as I have not configured:

    SH in detail its crypto isakmp

    There are no SAs IKEv1

    There are no SAs IKEv2

    SH crypto ipsec his

    There is no ipsec security associations

    Anyone have any ideas?

    Hi martin,

    Your configs are quite right. I tried your script, its works really well. Here's the configs & outputs.
    What I mentioned in the previous note follow this.

    --------------------

    ASA1

    ASA1 (config) # sh run
    : Saved
    :
    ASA Version 8.0 (2)
    !
    hostname ASA1
    activate 8Ry2YjIyt7RRXU24 encrypted password
    names of
    !
    interface Ethernet0/0
    nameif outside
    security-level 0
    IP 12.12.12.2 255.255.255.0
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    10.10.10.2 IP address 255.255.255.0
    !
    interface Ethernet0/2
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/5
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    2KFQnbNIdI.2KYOU encrypted passwd
    passive FTP mode
    extended vpn 10.10.10.0 ip access list allow 255.255.255.0 172.16.10.0 255.255.255.0
    pager lines 24
    Within 1500 MTU
    Outside 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Route outside 0.0.0.0 0.0.0.0 12.12.12.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout, uauth 0:05:00 absolute
    dynamic-access-policy-registration DfltAccessPolicy
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-sha-hmac tset
    card crypto cmap 1 match for vpn
    card crypto cmap 1 set peer 11.11.11.2
    card crypto cmap 1 transform-set tset
    cmap outside crypto map interface
    crypto ISAKMP allow outside
    crypto ISAKMP policy 1
    preshared authentication
    3des encryption
    md5 hash
    Group 5
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    !
    !
    tunnel-group 11.11.11.2 type ipsec-l2l
    IPSec-attributes tunnel-Group 11.11.11.2
    pre-shared-key *.
    context of prompt hostname
    Cryptochecksum:00000000000000000000000000000000
    : end
    ASA1 (config) #.
    ---------------------

    ASA2 (config) # sh run
    : Saved
    :
    ASA Version 8.0 (2)
    !
    hostname ASA2
    activate 8Ry2YjIyt7RRXU24 encrypted password
    names of
    !
    interface Ethernet0/0
    nameif outside
    security-level 0
    IP 11.11.11.2 255.255.255.0
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    IP 172.16.10.2 255.255.255.0
    !
    interface Ethernet0/2
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/4
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/5
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    2KFQnbNIdI.2KYOU encrypted passwd
    passive FTP mode
    extended vpn 172.16.10.0 ip access list allow 255.255.255.0 10.10.10.0 255.255.255.0
    pager lines 24
    Outside 1500 MTU
    Within 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    don't allow no asdm history
    ARP timeout 14400
    Route outside 0.0.0.0 0.0.0.0 11.11.11.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout, uauth 0:05:00 absolute
    dynamic-access-policy-registration DfltAccessPolicy
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-sha-hmac tset
    card crypto cmap 1 match for vpn
    card crypto cmap 1 set peer 12.12.12.2
    card crypto cmap 1 transform-set tset
    cmap outside crypto map interface
    crypto ISAKMP allow outside
    crypto ISAKMP policy 1
    preshared authentication
    3des encryption
    md5 hash
    Group 5
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH timeout 5
    Console timeout 0
    a basic threat threat detection
    Statistics-list of access threat detection
    !
    !
    !
    tunnel-group 12.12.12.2 type ipsec-l2l
    IPSec-attributes tunnel-group 12.12.12.2
    pre-shared-key *.
    context of prompt hostname
    Cryptochecksum:00000000000000000000000000000000
    : end
    ASA2 (config) #.

    -------------------------
    OUTPUTS:

    *********************

    ASA1 (config) # sh crypto isakmp his

    ITS enabled: 1
    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)
    Total SA IKE: 1

    1 peer IKE: 11.11.11.2
    Type: L2L role: initiator
    Generate a new key: no State: MM_ACTIVE

    ---------------------

    ASA1 (config) # sh crypto ipsec his
    Interface: outside
    Tag crypto map: cmap, seq num: 1, local addr: 12.12.12.2

    access vpn ip 10.10.10.0 list allow 255.255.255.0 172.16.10.0 255.255.255.0
    local ident (addr, mask, prot, port): (10.10.10.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (172.16.10.0/255.255.255.0/0/0)
    current_peer: 11.11.11.2

    #pkts program: 50, #pkts encrypt: 50, #pkts digest: 50
    #pkts decaps: 49, #pkts decrypt: 49, #pkts check: 49
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 50, comp #pkts failed: 0, #pkts Dang failed: 0
    success #frag before: 0, failures before #frag: 0, #fragments created: 0
    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0
    #send errors: 0, #recv errors: 0

    local crypto endpt. : 12.12.12.2, remote Start crypto. : 11.11.11.2

    ------------------------
    ASA2 (config) # sh crypto isakmp his

    ITS enabled: 1
    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)
    Total SA IKE: 1

    1 peer IKE: 12.12.12.2
    Type: L2L role: answering machine
    Generate a new key: no State: MM_ACTIVE

    ------------------------

    ASA2 (config) # sh crypto ipsec his
    Interface: outside
    Tag crypto map: cmap, seq num: 1, local addr: 11.11.11.2

    access vpn ip 172.16.10.0 list allow 255.255.255.0 10.10.10.0 255.255.255.0
    local ident (addr, mask, prot, port): (172.16.10.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (10.10.10.0/255.255.255.0/0/0)
    current_peer: 12.12.12.2

    #pkts program: 49, #pkts encrypt: 49, #pkts digest: 49
    #pkts decaps: 50, #pkts decrypt: 50, #pkts check: 50
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 49, #pkts comp failed: 0, #pkts Dang failed: 0
    success #frag before: 0, failures before #frag: 0, #fragments created: 0
    Sent #PMTUs: 0, #PMTUs rcvd: 0, reassembly: 20th century / of frgs #decapsulated: 0
    #send errors: 0, #recv errors: 0

    local crypto endpt. : 11.11.11.2, remote Start crypto. : 12.12.12.2
    -------------------------

  • Connectivity between two site to site VPN

    I have two remote sites that each connect to our main office using a site to site VPN. Remote offices have 831 routers. The main office has a PIX 515.

    A remote office is 192.168.15.X and the other is 192.168.100.X. The main office is on a 10.X.X.X network.

    Each remote office can contact the office with no problems. However, they cannot communicate with each other at all and I need this to work. I just want to be able to access the network 192.168.100.X network 192.168.15.X through the VPN tunnel that is already set up between each remote desktop.

    I tried to add the other network to the ACL for the tunnel, but that did not work. I feel I'm missing something simple.

    For example, the following ACL initially.

    Note access-list 103 IPSec rule

    access-list 103 allow ip 192.168.15.0 0.0.0.255 10.0.0.0 0.255.255.255

    I added this line to this LIST.

    access-list 103 allow ip 192.168.15.0 0.0.0.255 192.168.100.0 0.0.0.255

    But that did not help.

    Thanks in advance.

    Hello

    What code are you running on the Pix. Talk to talk IPSEC connectivity is supported only in version 7.0 and higher.

    Enhanced support has spoke-to-Spoke VPN

    Version 7.0 (1) improving support communications a spoke-to-spoke (customer-to-customer) VPN, providing the ability to traffic to enter and exit the same interface. In addition, remote access to splitting tunnel connections can be completed on the external interface of the security apparatus, enabling traffic destined to the Internet for remote user VPN tunnels to leave on the same interface as it happened (after that the firewall rules have been applied).

    The same-security-traffic command permits traffic to enter and exit the same interface when it is used with the keyword a spoke-to-spoke VPN using intra-interface. For more information, see the section "Allows Intra-Interface traffic" in the in the command line Configuration Guide Cisco Security Appliance.

    http://www.Cisco.com/univercd/CC/TD/doc/product/iaabu/PIX/pix_sw/v_70/70_rn/pix_70rn.htm#wp162358

    Example of Configuration:

    http://www.Cisco.com/en/us/partner/products/HW/vpndevc/ps2030/products_configuration_example09186a00804675ac.shtml

    Let me know if it helps.

    Kind regards

    Arul

    * Please note all useful messages *.

  • Site to Site VPN connection

    I have trouble getting a connection from site to site between a site that I am owner and a seller at a distance. (neither of us are experts)

    Can someone tell me what Miss them us?

    Ok

    I hope I understood the situation correctly.

    With the changes below all your LAN traffic should flow through the VPN L2L at the Remote Site connection. However, I can't say what is happening in the traffic from there in. Internet traffic should work just fine.

    Your ASA Site

    10.4.200.0 IP Access-list extended siteA 255.255.248.0 allow all

    no extended siteA LocalNetwork 255.255.248.0 ip access list allow 10.4.0.0 255.255.0.0

    Note of the access-list NAT0 for VPN L2L traffic INSIDE-NAT0

    IP 10.4.200.0 allow to Access-list INTERIOR-NAT0 255.255.248.0 all

    NAT (inside) 0-list of access to the INTERIOR-NAT0

    crypto Outside_map2 1 game card address siteA

    Supplier of ASA site

    permit same-security-traffic intra-interface

    access-list siteA extended permits all ip 10.4.200.0 255.255.248.0

    no extended siteA 10.4.0.0 ip access list do not allow 255.255.0.0 10.4.200.0 255.255.248.0

    NAT (outside) 1 10.4.200.0 255.255.248.0

    This should forward traffic from your site to the remote site if the destination address of the connections is nothing other than your LAN.

    It should also allow your site to use the connection of remote sites ASAs since we allow traffic to make a u-turn on the interface of the ASA "outside" remote and dynamic to the ' outside ' interface IP address be also participated.

    -Jouni

  • VPN clients connecting to the site to site VPN

    Hi all

    I'm currently configured my firewall outside interface VPN closing the point for two clients VPN and Cisco VPN site-to-site. What I found is that when I Client VPN, I can't access the devices on the site-to-site VPN. I think that the PIX does not allow this kind of connections, because it requires routing on the same interface. Can someone point me to some docs on ORC who can help me in this situation. Thanks in advance for your help.

    the restriction has been resolved with pix v7, and the related command is "permit same-security-traffic intra-interface".

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2030/products_configuration_example09186a008046f307.shtml

  • Help! Several problem of the setup of site-to-site VPN connection

    Recently, I place ASA 5505 on 3 sites and communicate with VPN site-to-site. I am able to connect HQ for two offices without any problem. And each office connect as weel. However, I can't do desktop connection remote at camp. Please see below for each configuration of office and thanks to any part of your experience.

    (Pri:172.29.88.254 remote desktop; Pub: 173.190.234.138; Subnet:172.29.88.0/24)

    |

    |     (VPN)

    |

    HQ office (Pri: 172.29.8.254;) Pub: 173.111.222.140; Subnet: 172.29.8.0/24)

    |

    |      (VPN)

    |

    Colo (Pri: 172.29.168.254;) Pub: 111.167.239.218; Subnet: 172.29.168.0/24)

    Configuration of HQ ASA5505-

    ASA 4,0000 Version 1

    !

    hostname jtfw-AC

    domain jollytech.com

    activate the encrypted password of Yr4Jr0JzJxYTTQQu

    GCdiui.2NH7n52DU encrypted passwd

    names of

    !

    interface Ethernet0/0

    switchport access vlan 2

    Speed 100

    !

    interface Ethernet0/1

    switchport access vlan 2

    Speed 100

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 172.29.8.254 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    IP 173.111.222.140 255.255.255.248

    !

    passive FTP mode

    clock timezone GMT 0

    DNS server-group DefaultDNS

    domain jollytech.com

    permit same-security-traffic inter-interface

    network obj_any object

    subnet 0.0.0.0 0.0.0.0

    service object RDP

    source eq 3389 tcp service

    Orange network object

    Home 172.29.8.151

    network of the WAN_173_111_222_138 object

    Home 173.111.222.138

    SMTP service object

    tcp source eq smtp service

    service object PPTP

    tcp source eq pptp service

    service of the JT_WWW object

    tcp source eq www service

    service of the JT_HTTPS object

    tcp source eq https service

    network obj_lex object

    172.29.88.0 subnet 255.255.255.0

    network of offices of Lexington Description

    network obj_HQ object

    172.29.8.0 subnet 255.255.255.0

    guava network object

    Home 172.29.8.3

    network obj_HQVPN object

    192.168.8.0 subnet 255.255.255.0

    jt-fn68zv1 network object

    Home 172.29.8.71

    service of the JT_FTP object

    tcp source eq ftp service

    network obj_colo object

    172.29.168.0 subnet 255.255.255.0

    Standard access list VPN_Tunnel_User allow 172.29.8.0 255.255.255.0

    VPN_Tunnel_User standard access list allow 192.168.8.0 255.255.255.0

    inside_access_in list extended access permit icmp any one

    inside_access_in tcp extended access list deny any any eq idle 135

    inside_access_in tcp extended access list refuse any eq 135 all idle state

    inside_access_in list extended access deny udp any what eq 135 all idle state

    inside_access_in list extended access deny udp any any eq idle 135

    inside_access_in tcp extended access list deny any any eq 1591

    inside_access_in tcp extended access list refuse any eq 1591 everything

    inside_access_in list extended access deny udp any eq which 1591 everything

    inside_access_in list extended access deny udp any any eq 1591

    inside_access_in tcp extended access list deny any any eq 1214

    inside_access_in tcp extended access list refuse any eq 1214 all

    inside_access_in list extended access deny udp any any eq 1214

    inside_access_in list extended access deny udp any what eq 1214 all

    inside_access_in of access allowed any ip an extended list

    inside_access_in list extended access permit tcp any any eq www

    inside_access_in list extended access permit tcp any eq www everything

    outside_access_in list extended access permit icmp any one

    outside_access_in list extended access permit tcp any host 173.111.222.138 eq 3389

    outside_access_in list extended access permit tcp any host 173.111.222.138 eq smtp

    outside_access_in list extended access permit tcp any host 173.111.222.138 eq pptp

    outside_access_in list extended access permit tcp any host 173.111.222.138 eq www

    outside_access_in list extended access permit tcp any host 173.111.222.138 eq https

    outside_access_in of access allowed any ip an extended list

    inside_access_out list extended access permit icmp any one

    inside_access_out of access allowed any ip an extended list

    access extensive list ip 172.29.8.0 outside_cryptomap allow 255.255.255.0 172.29.88.0 255.255.255.0

    permit access list extended ip object obj_colo object obj_lex outside_cryptomap

    inside_in list extended access permit icmp any one

    inside_in of access allowed any ip an extended list

    inside_in list extended access udp allowed any any eq isakmp

    inside_in list extended access udp allowed any isakmp eq everything

    inside_in list extended access udp allowed a whole

    inside_in list extended access permitted tcp a whole

    permit access list extended ip object obj_HQ object obj_colo outside_cryptomap_1

    permit access list extended ip object obj_lex object obj_colo outside_cryptomap_1

    pager lines 24

    Enable logging

    timestamp of the record

    logging trap information

    asdm of logging of information

    address record [email protected] / * /

    host of logging inside the 172.29.8.89

    Within 1500 MTU

    Outside 1500 MTU

    mask 192.168.8.100 - 192.168.8.150 255.255.255.0 IP local pool Jolly_HQVPN_DHCP

    ICMP unreachable rate-limit 1 burst-size 1

    enable ASDM history

    ARP timeout 14400

    NAT static orange interface (inside, outside) source RDP RDP service

    NAT (inside, outside) source obj_HQ destination obj_HQ static static obj_lex obj_lex-route search

    NAT (inside, outside) source obj_HQ destination obj_HQ static static obj_colo obj_colo-route search

    NAT (inside, outside) source obj_colo destination obj_colo static static obj_lex obj_lex-route search

    NAT (inside, outside) source obj_lex destination obj_lex static static obj_colo obj_colo-route search

    NAT guava Shared source (internal, external) WAN_173_164_222_138 service JT_WWW JT_WWW

    NAT guava Shared source (internal, external) WAN_173_164_222_138 service JT_HTTPS JT_HTTPS

    NAT guava Shared source (internal, external) WAN_173_164_222_138 service RDP RDP

    NAT guava Shared source (internal, external) WAN_173_164_222_138 SMTP SMTP service

    NAT guava Shared source (internal, external) WAN_173_164_222_138 PPTP PPTP service

    NAT interface service (Interior, exterior) source static jt-fn68zv1 JT_FTP JT_FTP

    NAT (inside, outside) source obj_HQ destination obj_HQ static static obj_HQVPN obj_HQVPN

    !

    network obj_any object

    NAT dynamic interface (indoor, outdoor)

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 173.111.222.142 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    AAA-server protocol nt guava

    AAA-server host 172.29.8.3 guava (inside)

    Timeout 15

    guava auth - NT domain controller

    identity of the user by default-domain LOCAL

    identity of the user inactive-user-timer minutes 360

    Enable http server

    http 172.29.8.0 255.255.255.0 inside

    SNMP-server host within the 172.29.8.89 community * version 2 c

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_VPN_Set ikev1

    Crypto ipsec ikev2 ipsec-proposal OF

    encryption protocol esp

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 proposal ipsec 3DES

    Esp 3des encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES

    Esp aes encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES192

    Protocol esp encryption aes-192

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 AES256 ipsec-proposal

    Protocol esp encryption aes-256

    Esp integrity sha - 1, md5 Protocol

    Crypto-map Dynamics 20 ikev1 transform-set Remote_VPN_Set set outside_dyn_map

    Crypto-map dynamic outside_dyn_map 20 the value reverse-road

    card crypto outside_map 1 match address outside_cryptomap

    card crypto outside_map 1 set pfs

    peer set card crypto outside_map 1 173.190.234.138

    card crypto outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5

    ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA'RE

    P-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 1jeu ikev2 AES AES192 AES256 3DES ipsec-proposal

    card crypto outside_map 2 match address outside_cryptomap_1

    card crypto outside_map 2 set pfs

    peer set card crypto outside_map 2 111.167.239.218

    card crypto outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5

    ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA'RE

    P-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 2 set AES AES192 AES256 3DES ipsec-proposal ikev2

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 10

    aes-192 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 20

    aes encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 30

    3des encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 40

    the Encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    Crypto ikev2 allow outside

    Crypto ikev1 allow outside

    IKEv1 crypto policy 10

    authentication crack

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 20

    authentication rsa - sig

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 30

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 40

    authentication crack

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 50

    authentication rsa - sig

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 60

    preshared authentication

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 70

    authentication crack

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 80

    authentication rsa - sig

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 90

    preshared authentication

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 100

    authentication crack

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 110

    authentication rsa - sig

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 120

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 130

    authentication crack

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 140

    authentication rsa - sig

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 150

    preshared authentication

    the Encryption

    sha hash

    Group 2

    life 86400

    Telnet 172.29.8.0 255.255.255.0 inside

    Telnet timeout 5

    SSH timeout 5

    SSH group dh-Group1-sha1 key exchange

    Console timeout 0

    dhcpd auto_config off vpnclient-wins-override

    !

    dhcprelay Server 172.29.8.3 on the inside

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    allow outside

    internal Jolleytech_VPN group strategy

    attributes of Group Policy Jolleytech_VPN

    value of server DNS 172.29.8.3

    Ikev1 VPN-tunnel-Protocol

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list VPN_Tunnel_User

    jollytech.local value by default-field

    internal GroupPolicy_10.8.8.1 group strategy

    attributes of Group Policy GroupPolicy_10.8.8.1

    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2

    name of user who encrypted password eicyrfJBrqOaxQvS

    type tunnel-group jollytech remote access

    tunnel-group jollytech General-attributes

    address pool Jolly_HQVPN_DHCP

    authentication-server-group guava

    Group Policy - by default-Jolleytech_VPN

    jollytech group of tunnel ipsec-attributes

    IKEv1 pre-shared-key *.

    tunnel-group 111.167.239.218 type ipsec-l2l

    tunnel-group 111.167.239.218 General-attributes

    Group - default policy - GroupPolicy_10.8.8.1

    IPSec-attributes tunnel-group 111.167.239.218

    IKEv1 pre-shared-key *.

    remote control-IKEv2 pre-shared-key authentication *.

    remotely IKEv2 authentication certificate

    pre-shared-key authentication local IKEv2 *.

    tunnel-group 173.190.234.138 type ipsec-l2l

    tunnel-group 173.190.234.138 General-attributes

    Group - default policy - GroupPolicy_10.8.8.1

    IPSec-attributes tunnel-group 173.190.234.138

    IKEv1 pre-shared-key *.

    remote control-IKEv2 pre-shared-key authentication *.

    remotely IKEv2 authentication certificate

    pre-shared-key authentication local IKEv2 *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    Policy-map global_policy

    class inspection_default

    inspect the pptp

    inspect the ftp

    inspect the netbios

    inspect the http

    !

    global service-policy global_policy

    172.29.8.3 SMTP server

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:2da829cf9fd3d4901e8131c2ae32b679

    : end

    Configuration of remote desktop-

    ASA Version 8.4 (3)

    !

    hostname jtfw-lex

    activate the encrypted password of Yr4Jr0JzJxYTTQQu

    GCdiui.2NH7n52DU encrypted passwd

    names of

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    switchport access vlan 2

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 172.29.88.254 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    IP 173.190.234.138 255.255.255.248

    !

    passive FTP mode

    network obj_any object

    subnet 0.0.0.0 0.0.0.0

    service object RDP

    source eq 3389 tcp service

    SMTP service object

    tcp source eq smtp service

    service object PPTP

    tcp source eq pptp service

    service of the JT_WWW object

    tcp source eq www service

    service of the JT_HTTPS object

    tcp source eq https service

    jt-dc01 network object

    Home 172.29.88.151

    network of the object WAN_jt-dc01

    Home 10.8.8.3

    network obj_lex object

    172.29.88.0 subnet 255.255.255.0

    network of offices of Lexinton Description

    network obj_HQ object

    172.29.8.0 subnet 255.255.255.0

    network Jollytech HQ Description

    network obj_colo object

    172.29.168.0 subnet 255.255.255.0

    network of colo Jollytech Description

    inside_access_in list extended access permit icmp any one

    inside_access_in tcp extended access list deny any any eq idle netbios-ssn

    inside_access_in tcp extended access list refuse any netbios-ssn eq all idle state

    inside_access_in list extended access deny udp any what eq 139 all

    inside_access_in list extended access deny udp any any eq 139

    inside_access_in tcp extended access list deny any any eq 135

    inside_access_in tcp extended access list refuse any eq 135 everything

    inside_access_in list extended access deny udp any what eq 135 everything

    inside_access_in list extended access deny udp any any eq 135

    inside_access_in tcp extended access list deny any any eq 1591

    inside_access_in tcp extended access list refuse any eq 1591 everything

    inside_access_in list extended access deny udp any eq which 1591 everything

    inside_access_in list extended access deny udp any any eq 1591

    inside_access_in tcp extended access list deny any any eq 1214

    inside_access_in tcp extended access list refuse any eq 1214 all

    inside_access_in list extended access deny udp any what eq 1214 all

    inside_access_in list extended access deny udp any any eq 1214

    inside_access_in of access allowed any ip an extended list

    outside_access_in list extended access permit icmp any one

    outside_access_in list extended access permit tcp any host 10.8.8.3 eq smtp

    outside_access_in list extended access permit tcp any host 10.8.8.3 eq pptp

    outside_access_in list extended access permit tcp any host 10.8.8.3 eq www

    outside_access_in list extended access permit tcp any host 10.8.8.3 eq https

    outside_access_in list extended access permit tcp any host 10.8.8.3 eq 3389

    outside_access_in of access allowed any ip an extended list

    inside_access_out list extended access permit icmp any one

    access extensive list ip 172.29.88.0 outside_cryptomap allow 255.255.255.0 object obj_HQ

    permit access list extended ip object obj_lex object obj_colo outside_cryptomap

    Standard access list VPN_Tunnel_user allow 172.29.88.0 255.255.255.0

    Standard access list VPN_Tunnel_user allow 172.29.8.0 255.255.255.0

    Standard access list VPN_Tunnel_user allow 172.29.168.0 255.255.255.0

    Standard access list VPN_Tunnel_user allow 192.168.88.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    IP local pool jolly_lex_DHCP 192.168.88.100 - 192.168.88.120 mask 255.255.255.0

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    NAT WAN_jt-dc01 service (Interior, exterior) source static jt-dc01 RDP RDP

    NAT static (inside, outside) source JT_WWW JT_WWW WAN_jt-dc01 jt-dc01 service

    NAT (inside, outside) source obj_lex destination obj_lex static static obj_HQ obj_HQ-route search

    NAT (inside, outside) source obj_lex destination obj_lex static static obj_colo obj_colo-route search

    !

    network obj_any object

    NAT dynamic interface (indoor, outdoor)

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 173.190.234.137 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    Enable http server

    http 172.29.88.0 255.255.255.0 inside

    SNMP-server host within the 172.29.88.30 community * version 2 c

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_VPN_set ikev1

    Crypto ipsec ikev2 ipsec-proposal OF

    encryption protocol esp

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 proposal ipsec 3DES

    Esp 3des encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES

    Esp aes encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES192

    Protocol esp encryption aes-192

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 AES256 ipsec-proposal

    Protocol esp encryption aes-256

    Esp integrity sha - 1, md5 Protocol

    card crypto outside_map 1 match address outside_cryptomap

    card crypto outside_map 1 set pfs

    peer set card crypto outside_map 1 173.111.222.140

    card crypto outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5

    ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA'RE

    P-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 1jeu ikev2 AES AES192 AES256 3DES ipsec-proposal

    outside_map interface card crypto outside

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 10

    aes-192 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 20

    aes encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 30

    3des encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 40

    the Encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    Crypto ikev2 allow outside

    Crypto ikev1 allow outside

    IKEv1 crypto policy 10

    authentication crack

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 20

    authentication rsa - sig

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 30

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 40

    authentication crack

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 50

    authentication rsa - sig

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 60

    preshared authentication

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 70

    authentication crack

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 80

    authentication rsa - sig

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 90

    preshared authentication

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 100

    authentication crack

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 110

    authentication rsa - sig

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 120

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 130

    authentication crack

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 140

    authentication rsa - sig

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 150

    preshared authentication

    the Encryption

    sha hash

    Group 2

    life 86400

    Telnet 172.29.88.0 255.255.255.0 inside

    Telnet timeout 5

    SSH timeout 5

    Console timeout 0

    dhcpd address 172.29.88.50 - 172.29.88.100 inside

    dhcpd dns 172.29.8.3 166.102.165.11 interface inside

    dhcpd jollytech.local area inside interface

    dhcpd allow inside

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    internal GroupPolicy_173.164.222.140 group strategy

    attributes of Group Policy GroupPolicy_173.164.222.140

    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2

    name of user who has encrypted password JOYSoaqW4x32VHKB

    tunnel-group 173.111.222.140 type ipsec-l2l

    tunnel-group 173.111.222.140 general-attributes

    Group - default policy - GroupPolicy_173.164.222.140

    IPSec-attributes tunnel-group 173.111.222.140

    IKEv1 pre-shared-key *.

    remote control-IKEv2 pre-shared-key authentication *.

    remotely IKEv2 authentication certificate

    pre-shared-key authentication local IKEv2 *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    Policy-map global_policy

    class inspection_default

    inspect the pptp

    inspect the ftp

    inspect the netbios

    !

    global service-policy global_policy

    172.29.8.3 SMTP server

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:0a0cf040a1f0f979ff55f0ef7e15c452

    : end

    Configuration Colo-

    ASA Version 8.4 (3)

    !

    hostname jtfw-colo

    domain jollytech.com

    activate the encrypted password of Yr4Jr0JzJxYTTQQu

    GCdiui.2NH7n52DU encrypted passwd

    names of

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    switchport access vlan 2

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 172.29.168.254 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    IP 111.167.239.218 255.255.255.248

    !

    passive FTP mode

    clock timezone GMT 0

    DNS server-group DefaultDNS

    domain jollytech.com

    network obj_any object

    subnet 0.0.0.0 0.0.0.0

    service object RDP

    source eq 3389 tcp service

    SMTP service object

    tcp source eq smtp service

    service object PPTP

    tcp source eq pptp service

    service of the JT_WWW object

    tcp source eq www service

    service of the JT_HTTPS object

    tcp source eq https service

    network obj_lex object

    172.29.88.0 subnet 255.255.255.0

    network of offices of Lexington Description

    network obj_HQ object

    172.29.8.0 subnet 255.255.255.0

    network Jollytech HQ Description

    guava network object

    Home 172.29.8.3

    network obj_HQVPN object

    192.168.8.0 subnet 255.255.255.0

    Description Jollytech HQ VPN network

    network of the WAN_111_167_239_220 object

    Home 111.167.239.220

    jt-dc01 network object

    Home 172.29.168.3

    jt-exch2010 network object

    Home 172.29.168.25

    network obj_colo object

    172.29.168.0 subnet 255.255.255.0

    network of colo Jollytech Description

    network of the object RC_jt-r610

    Home 172.29.168.8

    network of the WAN_111_167_239_221 object

    Home 111.167.239.221

    inside_access_in list extended access permit icmp any one

    inside_access_in tcp extended access list deny any any eq idle 135

    inside_access_in tcp extended access list refuse any eq 135 all idle state

    inside_access_in list extended access deny udp any what eq 135 everything

    inside_access_in list extended access deny udp any any eq 135

    inside_access_in tcp extended access list deny any any eq 1591

    inside_access_in tcp extended access list refuse any eq 1591 everything

    inside_access_in list extended access deny udp any eq which 1591 everything

    inside_access_in list extended access deny udp any any eq 1591

    inside_access_in tcp extended access list deny any any eq 1214

    inside_access_in tcp extended access list refuse any eq 1214 all

    inside_access_in list extended access deny udp any any eq 1214

    inside_access_in list extended access deny udp any what eq 1214 all

    inside_access_in list extended access permit tcp any any eq www

    inside_access_in list extended access permit tcp any eq www everything

    inside_access_in of access allowed any ip an extended list

    outside_access_in list extended access permit icmp any one

    outside_access_in list extended access permit tcp any object WAN_198_167_239_220 eq 3389

    outside_access_in list extended access permit tcp any object WAN_198_167_239_220 eq www

    outside_access_in list extended access permit tcp any object https eq WAN_198_167_239_220

    outside_access_in list extended access permit tcp any object WAN_198_167_239_221 eq www

    outside_access_in list extended access permit tcp any object https eq WAN_198_167_239_221

    outside_access_in list extended access permit tcp any object WAN_198_167_239_221 eq 3389

    outside_access_in of access allowed any ip an extended list

    inside_access_out list extended access permit icmp any one

    inside_access_out of access allowed any ip an extended list

    permit access list extended ip object obj_colo object obj_HQ outside_cryptomap

    permit access list extended ip object obj_colo object obj_lex outside_cryptomap

    pager lines 24

    Enable logging

    asdm of logging of information

    address record [email protected] / * /

    exploitation forest-address recipient [email protected] / * / level of errors

    host of logging inside the 172.29.168.89

    Within 1500 MTU

    Outside 1500 MTU

    mask 192.168.168.100 - 192.168.168.110 255.255.255.0 IP local pool Jolly_coloVPN_DHCP

    ICMP unreachable rate-limit 1 burst-size 1

    enable ASDM history

    ARP timeout 14400

    NAT of the service interface to the Shared source (internal, external) JT_WWW JT_WWW RC_jt-r610

    NAT of the service interface to the Shared source (internal, external) JT_HTTPS JT_HTTPS RC_jt-r610

    NAT service of WAN_111_167_239_220 jt-dc01 Shared source (internal, external) JT_HTTPS JT_HTTPS

    NAT service of WAN_111_167_239_220 jt-dc01 Shared source (internal, external) JT_WWW JT_WWW

    NAT service of WAN_111_167_239_220 jt-dc01 Shared source (inside, outside) RDP RDP

    NAT service of WAN_111_167_239_221 jt-exch2010 static source (inside, outside) RDP RDP

    NAT source service (Interior, exterior) static jt-exch2010 WAN_111_167_239_221 JT_WWW JT_WWW

    NAT source service (Interior, exterior) static jt-exch2010 WAN_111_167_239_221 JT_HTTPS JT_HTTPS

    NAT (inside, outside) source obj_colo destination obj_colo static static obj_HQ obj_HQ-route search

    NAT (inside, outside) source obj_colo destination obj_colo static static obj_lex obj_lex-route search

    !

    network obj_any object

    NAT dynamic interface (indoor, outdoor)

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 111.167.239.217 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    Enable http server

    http 172.29.168.0 255.255.255.0 inside

    http 172.29.8.0 255.255.255.0 inside

    SNMP-server host within the 172.29.168.89 community * version 2 c

    location of SNMP server it Fremont Colo

    SNMP Server contact [email protected] / * /

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac

    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac

    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_VPN_Set ikev1

    Crypto ipsec transform-set esp-3des esp-md5-hmac Remote_vpn_set ikev1

    Crypto ipsec ikev2 AES256 ipsec-proposal

    Protocol esp encryption aes-256

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES192

    Protocol esp encryption aes-192

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal AES

    Esp aes encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 proposal ipsec 3DES

    Esp 3des encryption protocol

    Esp integrity sha - 1, md5 Protocol

    Crypto ipsec ikev2 ipsec-proposal OF

    encryption protocol esp

    Esp integrity sha - 1, md5 Protocol

    Crypto-map Dynamics 20 ikev1 transform-set Remote_VPN_Set set outside_dyn_map

    Crypto-map dynamic outside_dyn_map 20 the value reverse-road

    card crypto outside_map 1 match address outside_cryptomap

    card crypto outside_map 1 set pfs

    peer set card crypto outside_map 1 173.111.222.140

    card crypto outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5

    ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA'RE

    P-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    IKEv2 crypto policy 1

    aes-256 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 10

    aes-192 encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 20

    aes encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 30

    3des encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    IKEv2 crypto policy 40

    the Encryption

    integrity sha

    Group 2 of 5

    FRP sha

    second life 86400

    Crypto ikev2 allow outside

    Crypto ikev1 allow outside

    IKEv1 crypto policy 1

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 43200

    IKEv1 crypto policy 10

    authentication crack

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 20

    authentication rsa - sig

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 30

    preshared authentication

    aes-256 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 40

    authentication crack

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 50

    authentication rsa - sig

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 60

    preshared authentication

    aes-192 encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 70

    authentication crack

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 80

    authentication rsa - sig

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 90

    preshared authentication

    aes encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 100

    authentication crack

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 110

    authentication rsa - sig

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 120

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 130

    authentication crack

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 140

    authentication rsa - sig

    the Encryption

    sha hash

    Group 2

    life 86400

    IKEv1 crypto policy 150

    preshared authentication

    the Encryption

    sha hash

    Group 2

    life 86400

    Telnet 172.29.8.0 255.255.255.0 inside

    Telnet 172.29.168.0 255.255.255.0 inside

    Telnet timeout 5

    SSH timeout 5

    Console timeout 0

    dhcpd auto_config off vpnclient-wins-override

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    allow outside

    internal GroupPolicy_173.111.222.140 group strategy

    attributes of Group Policy GroupPolicy_173.111.222.140

    L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2

    name of user who encrypted password eicyrfJBrqOaxQvS

    tunnel-group 173.111.222.140 type ipsec-l2l

    tunnel-group 173.111.222.140 general-attributes

    Group - default policy - GroupPolicy_173.111.222.140

    IPSec-attributes tunnel-group 173.111.222.140

    IKEv1 pre-shared-key *.

    remote control-IKEv2 pre-shared-key authentication *.

    remotely IKEv2 authentication certificate

    pre-shared-key authentication local IKEv2 *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    Policy-map global_policy

    class inspection_default

    inspect the pptp

    inspect the ftp

    inspect the netbios

    !

    global service-policy global_policy

    172.29.8.3 SMTP server

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:a45d9f3e7b23713c34d13d5a8ac5ece5

    : end

    Hello

    I think that these NAT configurations must change in the ASA HQ

    NAT (inside, outside) source obj_colo destination obj_colo static static obj_lex obj_lex-route search

    NAT (inside, outside) source obj_lex destination obj_lex static static obj_colo obj_colo-route search

    Note that you must configure to use 'inside' and 'outside' interface.

    However if two remote sites put an end to the ASA HQ "outside" interface and the traffic between these remote sites (that go through this ASA HQ) actually must a NAT between 'outside' and 'outside '.

    You will need to use the (outside, outside) in the NAT configurations.

    NAT (outside, outside) source obj_colo destination obj_colo static static obj_lex obj_lex-route search

    NAT (outside, outside) source obj_lex destination obj_lex static static obj_colo obj_colo-route search

    You could actually be fine with either NAT 2 only two-way configurations as it should.

    -Jouni

Maybe you are looking for

  • Album artwork is displayed is not on iPod

    I've just updated my iTunes yesterday and now when I synced my iPod (Touch, 6th generation) all album artwork that I had downloaded manually does not appear on the iPod. He still shows up in iTunes so. All I have this problem or knows how to fix? I t

  • Bike E setting

    How to activate the blocking on the motorola?

  • HP 2000 laptop: HP 2000 Notebook PC Drivers

    I did a format for my PC but I lost all the drivers, I can't connect to Internet also I can not connect via Ethernet cablePCI DRIVERETHERNET CONTROLLER DRIVERNETWORK CONTROLLER DRIVERBCM20702AO DRIVER The device information:Manufacturer: Hewlett-Pack

  • HP compaq mini CQ10 computer: enter the CURRENT password

    CURRENT PASSWORD: CNU0090HBQ computer HP Compaq mini CQ10 Please TK

  • How can I remove mcci browser?

    How can I get rid of the mcci browser? Don't know how it got here, but it has many addons and windows does not see the .exe program file to remove. I think it is causing IE to run very slowly. Can you help me?