Between the VPN Client and VPN from Site to Site
Looking for an example of ASA 8.0 configuration allowing traffic between a Cisco VPN client host and destination of remote access connected via LAN/Site-to-Site tunnel. The remote access client and the tunnel site-to-site terminate on the same device of the SAA.
Thanks in advance.
-Rey
Hi Rey,
Here is an example of a config for what you are looking for.
I hope this helps.
PS: This uses GANYMEDE + for authentication, you can replace it with your authentication method.
Kind regards
Assia
Tags: Cisco Security
Similar Questions
-
NAT-XLATE-FAILURE on the VPN from Site to site connection.
I had configured a VPN of Site to new site on my network, once I created Tunnel appears, but there is no traffic when I made trace packet its gave me error "(NAT-XLATE-FAILED), NAT has failed."
Here is the configuration runing.
ASA 9.1 Version 2
!
ciscoasa hostname
activate 2KFQnbNIdI.2KYOU encrypted password
names of
IP local pool kecdr 10.100.1.1 - 10.100.1.50 mask 255.255.255.0
local pool KECVPN 10.2.1.200 - 10.2.1.225 255.255.255.0 IP mask
!
interface GigabitEthernet0/0
nameif outside
security-level 0
IP 168.187.199.66 255.255.255.252
!
interface GigabitEthernet0/1
nameif inside
security-level 100
10.2.1.1 IP address 255.255.255.0
!
interface GigabitEthernet0/2
nameif DMZ
security-level 50
IP 10.60.1.2 255.255.255.0
!
interface GigabitEthernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/4
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/5
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
management only
nameif management
security-level 100
IP 192.168.1.1 255.255.255.0
!
passive FTP mode
DNS domain-lookup outside
DNS lookup field inside
management of the DNS domain-lookup service
DNS server-group DefaultDNS
Name-Server 8.8.8.8
permit same-security-traffic intra-interface
network of the NETWORK_OBJ_10.100.1.0_26 object
255.255.255.192 subnet 10.100.1.0
network of the NETWORK_OBJ_10.2.1.192_26 object
255.255.255.192 subnet 10.2.1.192
network of the NETWORK_OBJ_10.13.0.0 object
Home 10.13.0.0
network of the NETWORK_OBJ_10.2.0.0 object
host 10.2.0.0
network of the NETWORK_OBJ_10.3.0.0 object
Home 10.3.0.0
the DM_INLINE_NETWORK_1 object-group network
host object-network 10.2.0.0
object-network 10.60.1.0 255.255.255.0
inside_access_in list extended access permitted ip any4 any4
inside_access_in list of allowed ip extended access all 10.60.1.0 255.255.255.0
outside_access_in list extended access permitted ip any4 any4
allow global_access to access extensive ip list a whole
DMZ_access_in of access allowed any ip an extended list
DMZ_access_in list extended access permit ip any interface inside
outside_cryptomap list extended access allowed host ip DM_INLINE_NETWORK_1 10.3.0.0 object-group
permit access ip host 10.2.0.0 extended list outside_cryptomap_1 10.11.0.0
pager lines 24
Enable logging
asdm of logging of information
Outside 1500 MTU
Within 1500 MTU
management of MTU 1500
MTU 1500 DMZ
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ICMP allow any response echo inside
ICMP allow any echo inside
ICMP allow all DMZ
ICMP allow any echo DMZ
ICMP allow any response to echo DMZ
don't allow no asdm history
ARP timeout 14400
no permit-nonconnected arp
NAT (inside, outside) static source any any static destination NETWORK_OBJ_10.2.1.192_26 NETWORK_OBJ_10.2.1.192_26 non-proxy-arp-search to itinerary
NAT (inside, outside) static source any any static destination NETWORK_OBJ_10.100.1.0_26 NETWORK_OBJ_10.100.1.0_26 non-proxy-arp-search to itinerary
NAT (inside DMZ) static source a whole
NAT (inside, outside) static source NETWORK_OBJ_10.2.0.0 NETWORK_OBJ_10.2.0.0 NETWORK_OBJ_10.13.0.0 NETWORK_OBJ_10.13.0.0 non-proxy-arp-search of route static destination
NAT (inside, outside) static source DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 NETWORK_OBJ_10.3.0.0 NETWORK_OBJ_10.3.0.0 non-proxy-arp-search of route static destination
!
NAT source auto after (indoor, outdoor) dynamic one interface
Access-group outside_access_in in interface outside
inside_access_in access to the interface inside group
Access-group DMZ_access_in in DMZ interface
Access-Group global global_access
Route outside 0.0.0.0 0.0.0.0 168.187.199.65 1
Route DMZ 10.1.0.0 255.255.0.0 10.60.1.1 1
Route DMZ 10.2.0.0 255.255.0.0 10.60.1.1 1
Route DMZ 10.60.0.0 255.255.0.0 10.60.1.1 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
AAA authentication LOCAL telnet console
the ssh LOCAL console AAA authentication
Enable http server
http 192.168.1.0 255.255.255.0 management
http 10.0.0.0 255.0.0.0 inside
http 0.0.0.0 0.0.0.0 outdoors
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
Crypto ipsec pmtu aging infinite - the security association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
card crypto outside_map 1 match address outside_cryptomap
card crypto outside_map 1 set pfs Group1
peer set card crypto outside_map 1 196.219.202.197
card crypto outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
card crypto outside_map 2 match address outside_cryptomap_1
peer set card crypto outside_map 2 185.52.118.67
card crypto outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint _SmartCallHome_ServerCA
Configure CRL
trustpool crypto ca policy
Crypto ca certificate chain _SmartCallHome_ServerCA
certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
308204 4 a0030201 d 308205ec 0202106e cc7aa5a7 032009b 8 cebcf4e9 52d 49130
010105 05003081 09060355 04061302 55533117 ca310b30 0d 864886f7 0d06092a
30150603 55040 has 13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
13165665 72695369 676e2054 72757374 204e6574 776f726b 313 has 3038 06035504
0b 133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
20617574 7a 656420 75736520 6f6e6c79 31453043 06035504 03133c 56 686f7269
65726953 69676e20 436c 6173 73203320 5075626c 69632050 72696 72792043 61 d
65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
30303230 38303030 3030305a 170d 3230 30323037 32333539 35395a 30 81b5310b
30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
496e632e 311f301d 06035504 0b 131656 65726953 69676e20 54727573 74204e65
74776f72 6b313b30 5465726d 20757365 20617420 73206f66 39060355 040b 1332
68747470 7777772e 733a2f2f 76657269 7369676e 2e636f6d 2f727061 20286329
302d 0603 55040313 26566572 69536967 61737320 33205365 6e20436c 3130312f
63757265 20536572 76657220 20473330 82012230 0d06092a 864886f7 4341202d
010101 05000382 010f0030 82010 0d has 02 b187841f 82010100 c20c45f5 bcab2597
a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
9c688b2e 957b899b 13cae234 34c1f35b f3497b62 d188786c 83488174 0253f9bc
7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8 63cd
18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced
4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f
81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 01 has 38201 02030100 df308201
082b 0601 05050701 01042830 26302406 082 b 0601 db303406 05050730 01861868
7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1 d 130101
ff040830 02010030 70060355 b 200469 30673065 060, 6086 480186f8 1 d 060101ff
45010717 03305630 2806082b 06010505 07020116 1 c 687474 70733a2f 2f777777
2e766572 69736967 6e2e636f 6d2f6370 73302 has 06 082 b 0601 05050702 02301e1a
1 c 687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406
03551d1f 042d302b 3029 has 027 a0258623 68747470 3a2f2f63 726c2e76 65726973
69676e2e 636f6d2f 2d67352e 70636133 63726c 30 0e060355 1d0f0101 ff040403
02010630 6d06082b 06010505 07010c 59305730 55160969 5da05b30 04 61305fa1
6 d 616765 2f676966 3021301f 2b0e0302 30070605 1a04148f e5d31a86 ac8d8e6b
c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973
69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30
1 b 311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301D 0603
445 1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355 c 1604140d 551d0e04
1 230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300 d 0609 d
2a 864886 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80 f70d0101
4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e
b2227055 d9203340 3307c 265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a
99 c 71928 8705 404167d 1 273aeddc 866d 24f78526 a2bed877 7d494aca 6decd018
481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16
b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0
5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8
6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28
6c2527b9 deb78458 c61f381e a4c4cb66
quit smoking
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev2 allow outside
Crypto ikev1 allow outside
IKEv1 crypto policy 10
authentication crack
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 20
authentication rsa - sig
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 30
preshared authentication
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 40
authentication crack
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 50
authentication rsa - sig
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 60
preshared authentication
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 70
authentication crack
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 80
authentication rsa - sig
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 90
preshared authentication
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 100
authentication crack
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 110
authentication rsa - sig
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 120
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 130
authentication crack
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 140
authentication rsa - sig
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 150
preshared authentication
the Encryption
sha hash
Group 2
life 86400
Telnet 0.0.0.0 0.0.0.0 outdoors
Telnet 10.0.0.0 255.0.0.0 inside
Telnet 10.2.0.0 255.255.0.0 inside
Telnet 10.1.0.0 255.255.0.0 inside
Telnet timeout 5
SSH 0.0.0.0 0.0.0.0 outdoors
SSH 10.0.0.0 255.0.0.0 inside
SSH 10.2.0.0 255.255.0.0 inside
SSH 10.1.0.0 255.255.0.0 inside
SSH timeout 5
SSH group dh-Group1-sha1 key exchange
Console timeout 0
management of 192.168.1.2 - dhcpd address 192.168.1.254
enable dhcpd management
!
a basic threat threat detection
statistical threat detection port
Statistical threat detection Protocol
Statistics-list of access threat detection
a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200
internal GroupPolicy_185.52.118.67 group strategy
attributes of Group Policy GroupPolicy_185.52.118.67
Ikev1 VPN-tunnel-Protocol
internal GroupPolicy_196.219.202.197 group strategy
attributes of Group Policy GroupPolicy_196.219.202.197
Ikev1 VPN-tunnel-Protocol
internal kecdr group policy
attributes of the strategy of group kecdr
value of server DNS 8.8.8.8
Ikev1 VPN-tunnel-Protocol
internal KECCISCO group policy
KECCISCO group policy attributes
value of server DNS 8.8.8.8
Ikev1 VPN-tunnel-Protocol
internal KECVPN group policy
KECVPN group policy attributes
value of server DNS 8.8.8.8
Ikev1 VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
username, password admin eY/fQXw7Ure8Qrz7 encrypted privilege 15
cisco 3USUcOPFUiMCO4Jk encrypted password username
username privilege 15 encrypted password 3ofqMXhysxFRHhoQ keccisco
type tunnel-group kecdr remote access
tunnel-group kecdr General-attributes
address kecdr pool
Group Policy - by default-kecdr
kecdr group of tunnel ipsec-attributes
IKEv1 pre-shared-key *.
type tunnel-group KECVPN remote access
attributes global-tunnel-group KECVPN
address kecdr pool
Group Policy - by default-KECVPN
IPSec-attributes tunnel-group KECVPN
IKEv1 pre-shared-key *.
type tunnel-group KECCISCO remote access
attributes global-tunnel-group KECCISCO
address KECVPN pool
Group Policy - by default-KECCISCO
IPSec-attributes tunnel-group KECCISCO
IKEv1 pre-shared-key *.
tunnel-group 196.219.202.197 type ipsec-l2l
tunnel-group 196.219.202.197 General-attributes
Group - default policy - GroupPolicy_196.219.202.197
IPSec-attributes tunnel-group 196.219.202.197
IKEv1 pre-shared-key *.
remote control-IKEv2 pre-shared-key authentication *.
pre-shared-key authentication local IKEv2 *.
tunnel-group 185.52.118.67 type ipsec-l2l
tunnel-group 185.52.118.67 General-attributes
Group - default policy - GroupPolicy_185.52.118.67
IPSec-attributes tunnel-group 185.52.118.67
IKEv1 pre-shared-key *.
remote control-IKEv2 pre-shared-key authentication *.
pre-shared-key authentication local IKEv2 *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
context of prompt hostname
anonymous reporting remote call
HPM topN enable
Cryptochecksum:8156993fef96da73dedfaacd7a14e767
: endMy local IP address: 10.2.X.X
My remote IP address: 10.3.X.X
Can anyone support me for the error
Hello
Your self after dynamic PAT takes the static NAT...
NAT source auto after (indoor, outdoor) dynamic one interface
You must reconfigure you NAT or PAT rule defined in your firewall.
no nat source auto after (indoor, outdoor) dynamic one interface
network local-lan-pat1 object
10.2.0.0 subnet 255.255.255.0
NAT dynamic interface (indoor, outdoor)
!
network local-lan-pat2 object
10.60.1.0 subnet 255.255.255.0
NAT dynamic interface (indoor, outdoor)
!
no nat source (indoor, outdoor) public static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 NETWORK_OBJ_10.3.0.0 NETWORK_OBJ_10.3.0.0 non-proxy-arp-search of route static destination
!outside_cryptomap to access extended list ip 10.2.0.0 allow 255.255.255.0 host 10.3.0.0 255.255.255.0
No list of extended outside_cryptomap access not allowed host ip DM_INLINE_NETWORK_1 10.3.0.0 object-group
!
We hope that you do this between subnets... not for the host at the other end.
Concerning
Knockaert
-
Split of static traffic between the VPN and NAT
Hi all
We have a VPN from Site to Site that secures all traffic to and from 10.160.8.0/24 to/from 10.0.0.0/8. It's for everything - including Internet traffic. However, there is one exception (of course)...
The part that I can't make it work is if traffic comes from the VPN (10.0.0.0/8) of 10.160.8.5 (on 80 or 443), then the return traffic must go back through the VPN. BUT, if traffic 80 or 443 comes from anywhere else (Internet via X.X.X.X which translates to 10.160.8.5), so there need to be translated réécrirait Internet via Gig2.
I have the following Setup (tried to have just the neccessarry lines)...
interface GigabitEthernet2
address IP Y.Y.Y.Y 255.255.255.0! the X.X.X.X and Y.Y.Y.Y are in the same subnet
address IP X.X.X.X 255.255.255.0 secondary
NAT outside IP
card crypto ipsec-map-S2S
interface GigabitEthernet4.2020
Description 2020
encapsulation dot1Q 2020
IP 10.160.8.1 255.255.255.0
IP nat inside
IP virtual-reassembly
IP nat inside source list interface NAT-output GigabitEthernet2 overload
IP nat inside source static tcp 10.160.8.5 80 80 X.X.X.X map route No. - NAT extensible
IP nat inside source static tcp 10.160.8.5 443 443 X.X.X.X map route No. - NAT extensible
NAT-outgoing extended IP access list
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443
permit tcp host 10.160.8.5 all eq www
permit tcp host 10.160.8.5 any eq 443
No. - NAT extended IP access list
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq www
refuse 10.160.8.5 tcp host 10.0.0.0 0.0.0.255 eq 443
allow an ip
route No. - NAT allowed 10 map
corresponds to the IP no. - NAT
With the above configuration, we can get to the Internet 10.160.8.5, but cannot cross it over the VPN tunnel (from 10.200.0.0/16). If I remove the two commands «ip nat inside source static...» ', then the opposite that happens - I can get then to 10.160.8.5 it VPN tunnel but I now can't get to it from the Internet.
How can I get both? It seems that when I hit the first NAT instruction (overload Gig2) that 'decline' in the list of ACL-NAT-outgoing punts me out of this statement of NAT. It can process the following statement of NAT (one of the 'ip nat inside source static... ") but does not seem to"deny"it in the NON - NAT ACL me punt out of this statement of NAT. That's my theory anyway (maybe something is happening?)
If this work like that or I understand something correctly? It's on a router Cisco's Cloud Services (CSR 1000v).
Thank you!
Your netmask is bad for your 10.0.0.0/8. I worry not about the port/protocol or since that can screw you up. A better way to do it would be to deny all IP vpn traffic.
NAT-outgoing extended IP access list
deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255
...
No. - NAT extended IP access list
deny ip 10.160.8.0 0.0.0.0.255 10.0.0.0 0.255.255.255
allow an ip
Doc:
Router to router IPSec with NAT and Cisco Secure VPN Client overload
Thank you
Brendan
-
Limit remote traffic in a VPN from Site to Site
I have a setup VPN from Site to Site in a lab using two ASA5505s environment. VPN site to Site is functional however, what I wanted to do is to deny all traffic between the Remote LAN and not allow a single host to access the local network. Is it convenient or can it be done? If so, what Miss me the following ACL do not seem to effect?
Remote LAN: 172.16.1.0/24
LAN: 192.168.1.0/24outside_access_in list extended access permitted tcp 172.16.1.100 host 192.168.1.100 lytic 5000 10000
outside_access_in list extended access deny ip 172.16.1.0 255.255.255.0 192.168.1.0 255.255.255.0
Access-group outside_access_in in interface outsideAppreciate any help that anyone can give.
Hi tsabsuavyaj,
By default, the sysopt connection VPN-enabled command is enabled which will bypass your list of access-interface referenced for all VPN traffic.
To resolve this problem, you can:
- Run the command No sysopt connection VPN-enabled. Caution with this, because it has global effect, which means it will interrogate ACL interface for all incoming VPN traffic.
- Change your proxy-ACL (aka ACL interesting traffic) so that your remote control network is simply the address of the host that you would like to have access to your network. In so doing, nothing else is routed through your tunnel L2L at the remote end. This ACL must be mirrored on the other side (remote), so that the proxy-ACL must change so that its share of the 'Local network' is only the appropriate host and nothing else.
Please let me know if you have further questions/clarification.
Kind regards
Kevin
* Do not forget to note the useful messages but also to mark it as 'responded' once your problem is solved. This will help others find your solution more quickly.
-
SA520W VPN from Site to Site with several VLANs
Hello
I have a customer here with several VLANS in their places who wants to set up a VPN from Site to site between 2 devices SA520W. Unfortunately I can not find a way to set it up. In the VPN policy, I can choose between everything (which is not what I want, I want only traffict between subnets the routed via VPN), IP address unique, a beach (in a subnet) and a subnet itself - but only one. I don't find a way to configure several subnets in the selection of local traffic and remotely. Adding another IKE policy between the 2 sites does not either (which is good normally).
Any ideas? Anything I'm doing wrong?
Thank you for your help.
Best regards
Thomas
I know that if you have an ASA or a router, you can define as VLANS to pass through the tunnel.
Do not have access to a SA520W to test...
A recommendation might be to post the question on the SMB community where they answered questions related to this product, just to check what other people did.
Federico.
-
How can I block a VPN from site to Site traffic
I configured a VPN from Site to Site, the wizard on a
ASA 5510 and it works.
However, I want to restrict http traffic only.
I tried to change the ACL entry that allows ip traffic to allow only http traffic, but that seems to block all traffic and translates into a journal entry:
Inbound TCP connection doesn't deny x to Y/80 SYN flags on the incoming interface.
I managed to block pings by entering an ACL rule to specifically deny icmp, but I would like to deny all except http.
Any advice on how to achieve this appreciated.
William.
Hello
Guess that's what you're looking for. See the Bidirectional VPN filter configuration section.
-
What the difference between the $29.00 and $1 099 in terms of features?
I want to buy the software but I m so uncertain ante Adobe phones DO NOT work properly... What the difference between the $29.00 and $1 099 in terms of features?
There is no real difference at all, it is the same app, same features.
The $ 29 subscription means that you 'Rent' the application, you will have all the upgrades and patches during your free subscription. You can have two versions installed, but no more with this license. In addition, it is related to your personal Adobe ID.
The perpetual license means that you have the application, it can use 'forever', and it is NOT linked to your Adobe ID when a new version appears that you will have to pay for the upgrade (if possible). You can have as many versions on your system you want with perpetual licenses. This can be important if you need to work for clients that use older versions.
ATTENTION: I am only a user, does not not for Adobe, that's what I see as the major differences. Crossing my fingers that someone from the staff will give you more details.
-
New window creates a gap between the Favorites (top) and tabs (bottom)
19/12/14 bug Firefox began to occur:
- When having only 1 window open and opening tabs behaves normally.
- However, when you open a new window of the space between the bookmarks (top) and tabs (bottom) spans all windows. Its boring.
So far only challenge is to just close and open 1 single window, or to use the module 'Classic theme restaurateur' and switch the tabs position from the bottom to the top, but all new windows will open the gap again.
Image below.
Unfortunately, none of these options works, so far, use 'CTR' and turn the legs up (default) allows the opening of new windows without gaps.
Seems to be some sort of bug recently showing on CTR.You will need to find a way to contact the developer to let them know.
EDIT: It seems to be resolved, seems a new version was released and the problem disappeared. Thank you very much for the help.
-
Exchange of data between the main VI and sub - VI
It is my first attempt to build a comprehensive program and hope you can help me.
The idea is to load a set of data and to perform several calculations and operations on them, find themselves in the creation of a report file.
What I want to do is to build a main VI which contains the data, and several sub - vi to do the math, dynamically loaded in a subgroup of experts (for the simple user interface). I thought about this architecture because I'm sure I'll have to change the calculation of VI, and I don't know how I'm going to need, so I can just add an another calc VI to the plugin dir and load it. The thing is, I have to keep moving data back from the main VI to the Subvi and maybe even between sub - vi. Is there an easy (or not so hard) how? I thought about queues, but sometimes the data is to be sent to more than a subvi, and I can't have a queue for each. The idea that I get is like a network producer-consumer mode BOX: the main VI produce some data and all those interested in this data use. Then they send the results back (as a "producer") and all stakeholders in the response it consumes.
Attached, is a "skeleton" of what I intend to do.
There are several ways you can accomplish this. First of all, you can use the Start Asychronous Call, which will provide a component of connector for you. So, it is easy to wire the reference to it. You could also implement a global functional (also known as a motor of action) to access the event reference. It is the approach we use for our shared events. If you have lines between the main VI and ths Subvi you to format a particular message reference. However, I don't think that this approach would correspond to what you are doing.
-
How to fix Windows 7 32 Bit error: the trust relationship between the th workstation and primary domain failed
Hi João,.
To help solve the problem, remove the PC from the domain and then connect the computer to the domain.
Click the Microsoft KB Article below for troubleshooting steps.
The trust relationship between this workstation and the primary domain failed
Let us know how it goes.
Thank you
-
relationship between the active layer and enable layer
I use AE CC 12.2.1. I think that is not specific to the AE version but something general.
When I read my layer by extendscript property, it shows layer.enabled = true and layer.active = false. If I change layer.enabled from false to true, the active property seems to follow the enabled property also. I don't know the meaning of 'active', because even layer.active = false, there is no problem to manage the layer in AE.
I would like to know something.
1. How do the status layer.active to AE UI even I check it in the source of the script?
2. What is the difference between layer.active = false and true?
3. What is the relationship between the layer active and active layer?
Thanks in advance.
[Moved to After Effects - moderator script forum]
In general, a layer is activated if the eyeball is on in the timeline panel. It is active if the layer is activated and that the model currently is between the points layer and output. You can control the active state. The active state is determined by the active state, in and out of the points and the current time.
There are some exceptions (audio layers, other layers prone, etc.), but that's about all.
Dan
-
How to reduce the space between the section number and title of section in TOC
Hello
I want to reduce the space between the section number and title of section in TOC.
can someone guide me on how to do this:
Thank you
Try to do it from the style of paragraph (bullets and numbering) options
-
I am new to Adobe flash and tried to create an E-card for a class. My teacher said that it is better just to have a keyframe for each layer in the main timeline and do all the clips of animation and film on the deadlines of each symbol. I'm having a hard time to understand how it works. To illustrate my confusion, let's start with an example. I have a kite I want to start flying to frame 20. The kite is a symbol, so I create movement to 20 image interpolation in chronology of the wing. 20 on the symbol Timeline frame occurs at the same time as frame 20 of the MAIN scenario, or are they completely separate instances of time?
Part of my mission, is should I use code snippets to add an element of interactivity to the Ecard. My confusion about the timeline affects my ability to do so. My teacher said that you need a stop on the first keyframe code to make sure that things will not start before you click the play button. Can I put the stop action on the main timeline or in the timeline of each symbol, or both? Let's say I want to create a button that makes the kite flies when I click it. Where to play action 'go to and play', in the Assembly of the wing?
I would greatly appreciate any help from the community. I'm the kind of person who needs to understand how things work. I searched for days, watch videos and read articles, but I still need to find a resource that effectively dissolved my confusion on this subject. So if anyone knows of any tutorials that explain how the main timeline and symbol timelines coincide, please share them with me. Thank you very much for your time.
(P.S. are CC Animate Adobe and Adobe Flash Professional CC the same?)
Thank you both for responding. Yes, your answers were useful, but a bit Advanced. I hope that you don't mind me asking a few follow-up questions.
For Pete47-
So I put my stop() in the main timeline. How the actionscript in the main timeline code works on the chronology of the wing if the two are separate? Why not put the ActionScript on chronology of the wing? Clearly, there must be an interaction between the main timeline and symbols, right? When you say "you can drag the symbol on the main timeline and it will run when you start", what do you mean by that? Like GETTING started, in the main timeline or in the scenario of the symbol? As you can see I am very confused by there!
For Colin.
I thought that Pete said you want to only have a keyframe in the main timeline. Then, when you said... "you can do it with an interpolation of the main timeline... from the beginning to the final position," why would you animate the motion on the main timeline? Why not in the chronology of the wing, can create another symbol of the tail in this period?
And if the schedules of chronology and main symbol are separated, how SYNCHRONIZE you together different symbols to their movement to work together? And why should it be like that anyway?
I am new to the community here, the last thing I want to say because you two sounds very knowledgeable on the Flash. How did you get your start? Did you start by watching the tutorials, read the manual, or something else?
Once more, you have my abundant thanks for taking the time to help.
-
messages between the main thread and the FX application thread
I run a thread of the Application of FX for a main thread using Application.launch [described here: {: identifier of the thread = 2530636}]
I try to have the application thread return information on the main thread, but Application.launch returns void. Is there an easy way to communicate between the main thread and the thread of the Application?
So far, I googled and found:
-MOM (Message Oriented Middleware)
-Sockets
Thoughts/ideas/examples are appreciated--especially examples ;)--now I try to use Sockets to show/hide the application and data transmission.
What is the preferred method? Are there others that I did not find (gasp) via Google?
Dave.
Published by: cr0ck3t on April 30, 2013 21:04
Published by: cr0ck3t on April 30, 2013 21:05Is there an easy way to get a reference to these objects to both the main thread and the thread of Application FX - called via Application.launch () since the main thread? Or what I need to use Sockets or MOM?
Not much to do with the concurrent programming is what I would call easy. It looks easy - but it's not.
You can do kind of what you're describing using Java concurrency constructs without using sockets or a package of Message Oriented Middleware (MOM).
With the Java concurrency stuff you really implement your own form or MOM light.
If you have quite an application is complex with many messages of comes and goes, then a sort of package for MOM such as the camel and ActiveMQ (http://camel.apache.org) is useful.
---------
You can find a sample of the various interactions of thread with JavaFX here:
https://gist.github.com/jewelsea/5500981 "Simulation of dwarf dragons using multiple threads to eat."
Related code is just demo-ware to try different competitive access facilities and not necessarily a recommended strategy.
If your curiosity, you can take a look and try to work out what it is, what it does and how it does.
The main reason followed is that of a blocking queue:
http://docs.Oracle.com/javase/6/docs/API/Java/util/concurrent/BlockingQueue.html
---------
Note that once you call launch of the main thread, no subsequent statement in the main method will be different until the JavaFX application terminates. If you can't start from the main thread and communicate with the main thread JavaFX application. Instead, you need to spawn another thread (or a set of threads) for communication with the JavaFX application.
---------
But really, in most cases, the best solution with the simultaneity is not care at all (or at least as little as possible). Write everything in JavaFX, use the animation of JavaFX framework to time related things and the simultaneity of JavaFX utilities for when you really need multiple interaction of wire.
http://docs.Oracle.com/JavaFX/2/threads/jfxpub-threads.htm
----------
For additional assistance, you may be better off describing exactly (i.e. really specific) what you're trying to make in a new question, perhaps with a solution of the sample in a http://sscce.org NBS -
What is the difference between the ref cursor and the sys_refcursor.
create or replace procedure GetEmployeesInDept (c sys_refcursor)
Hello
I have a query related to the above stored procedures.
When you set the cursor, we mentioned as sys_refcursor and in some US sites I saw him as a REF CURSOR as shown
create or replace procedure GetEmployeesInDept (Ref Cursor c)
Please tell me what is the difference between the ref cursor and the sys_refcursor.http://download.Oracle.com/docs/CD/B19306_01/AppDev.102/b14261/tuning.htm#sthref2376
Concerning
Etbin
-
the different between the default constructors and complete this builders
I have in my grain I have two constractors
public Person() {}
}
public person (String id, String firstName, String lastName) {}
This.ID = id;
this.firstName = firstName;
this.lastName = lastName;
}
in servlet I test the following, they do the same job, so what's the difference between these two constractors?
Person person = new Person (id, firstName, lastName);
Person person = new Person();
person.setId (id);
person.setFirstName (firstName);
person.setLastName (lastName);
If the daughter class extends the class parent, if I need to use great I can use the default constructors?A few notes to clarify the terminology first.
I have in my grain I have two constractors
Initially, I planned to ignore this harmless typo, but since you have repeated, we will the work point and move it ouf of the path: it's + constr.uctor +.
the different between the default constructors and complete this builders
There is no such thing as a "full" constructor There are builders, and a single class may have several of them, which are differentiated by their argument list.
I assume you mean by "complete Builder" "constructor with arguments" (I dunno what is the official term for this, I'll try to find it in the specs, but that's a detail).Also note that the notion of "default constructor" is different from what you think:
Citing the [url http://java.sun.com/docs/books/jls/third_edition/html/classes.html#16823] JLS:If a class contains no statement of constructor, a constructor that takes no default setting is automatically provided:
(...) the default constructor takes no parameters and simply calls the constructor of the superclass without arguments.In your case (given the code provided), you mean "an explicitly declared constructor, which takes no arguments.
the different between the default constructors and complete this builders
In addition, there is no such thing as a manufacturer 'this '.
There are builders, who are declared (or by default), and there is This syntax, which allows to invoke a constructor.
Typical example:public class Price { /** * Creates a new price, with the specified amount and in the specified currency. */ public Price(int amount, String currency) { this.amount = amount; this.currency = currency; } /** * Creates a new price, with the specified amount and in the default currency (US $). */ public Price(int amount) { this (amount, "USD"); } /** * Creates a new price, with a zero amount and in the default currency (US $). */ public Price() { this(0); } }
* If the daughter class extends the class parent, if I need to use great I can use the default constructors?
If your question is "I can invoke any superclass constructor, including the default?", then the answer is almost Yes (it's 'Yes, you can call a constructor that is visible to the subclass' - visibility here is in terms of public/protected/package ).
Example:
public class Mafioso extends Person { public Mafioso(String firstName, String lastName) { super(firstName, "The Silencer"); // Mafiosi usually don't like being known by their actual last name } public Mafioso() { super(); } }
Note that you can call the constructor of the superclass No. - arg (see super() invocation above), as soon as such a no. - arg constructor exists and is visible, no matter if you explicitly declared, as in your person class, or is this a compiler-generated default constructor.
I hope this helps. Kind regards
J.
Maybe you are looking for
-
Silverlight will not install on my computer. I get an error code 659. Silverlight has worked on computer at the same time. Vista in Home Office business management. Can someone help me with this issue? I installed Vista service pack 2.
-
MacBook Pro and SanDisk Ultra II 960 GB does not
I bought two SSDs to 960GB SanDisk Ultra II for installation in a Late 2009 27 inch iMac and a MacBook Pro mid-2012. I could absolutely not anything other than a white screen on the 27-inch. I could get the external computer to boot via USB, but when
-
Windows Vista screen saver don't work.
I have Vista Premium Home edition. Years my screensaver bivalent has switched to display my photos in random order, after 3 minutes of inactivity. Now turns to black and a little rectangular screen appears saying the screen saver does not start. I
-
Laptop still slow even after standard performance settings
I'm about to throw my laptop out the window, so any help would be appreciated. He turned slowly for about a year now. For example, it may take 20 seconds to open a Windows Explorer window. It is a HP and is three years old. Recently, I have deleted a
-
Deply debug token - eclipse of Manager for the blackberry proxy
I'm creating and depoly token of debugging on the device using the "BB10 eclipse plugin for android» But I get this error - "failed to connect the server signature. Make sure the internet connection is enabaled. I filled out the details of proxy with