Filtering on ASA URL tunnel through

Hello

IAM can't put this thread in which section firewall or vpn. I want to know if we can set up the filtering of URLS with websense through the VPN. If so, how can do us the same thing and if we can do it for the two site to site and remote access? Let's take an example with websense on the ASA1 DMZ. Now, if Site 2 wants to send to all of its users to 1 Site for the URL filtering, then back it out with its (ASA1) internet (with the external interface ASA1) is it possible?

(192.168.3.0) Site1 - ASA1 - VPN - ASA2 - Site 2 (10.22.22.0)

Jayesh salvation,

(192.168.3.0) Site1 - ASA1 - VPN - ASA2 - Site 2 (10.22.22.0)

Now I see 2 ways to apply:

(1) URL filtering config on ASA1: with this configured and also the ASA2 configured to send all internet traffic also to ASA1, when the ASA1 sees the initial GET to a site request, it forwards the request to the time the URL-filling server and the web server. Now, when the web server responds to this request, the ASA1 will decide to drop or before it based on the response from the websense server.

(2) URL filtering config on ASA2: once again with this configured and also the the ASA2 configured to send all internet traffic also to ASA1, when the ASA2 sees the initial GET request, it will send traffic to the server on the DMZ ASA1 more url filtering web server. Please note that this query to the websense Server package, will have a source IP address of the external interface and destination IP of the server filter URL ASA2. We must therefore ensure that the 2 following things:

++ the ACL on ASA2 crypto includes an entry of external interface IP of ASA2 at the DMZ IP of the websense server and vice versa on ASA1.

++ an exemption nat configured on the DMZ ASA1 (acl pointing to the DMZ IP of websense server to the external IP of the ASA2).

In this case labour will be similar. When ASA2 sees the server'sw web to answer the first GET request, decide to drop ot or transmit it on the client based on the response of the websense.

Please let me know if that clarifies things.

See you soon,.

Assia

Tags: Cisco Security

Similar Questions

  • View of the horizon 3.5.0 and ThinApp v4.7 with Cisco ASA Smart Tunnel 9.3.3

    Hello

    The problem:

    Our technology smart tunnel doesn't seem to be forward traffic to our new customer from the view.  I wonder what kind of configuration changes must be considered to enable such a connection.  The error returned when searching for the host name goes in the direction of the hostname not found.  Error finding of intellectual property is related to the time-out.

    Background information and specifications:

    We are in the process of upgrading our servers from 5.2 to 6.2 connection.  As part of the upgrade, we want to improve our customers for the Horizon to use version 3.5.0.  To make it easier on vendors and remote computers we prefer also to our Horizon View Client with ThinApp 4.7.3 ThinApp.  We currently have a Cisco ASA, supporting a SSL VPN portal with "Smart Tunnel" technology.  The ASA is currently on firmware 9.3.3 in production, but we have access to version 9.5 in test.

    Preferred connection scenario:

    User > PC > VMware View Client (ThinApp would be) > Cisco ASA Smart Tunnel > view connection server > Virtual Office

    .exe running on the client to view ThinApp:

    It seems the ThinApp Client version view is only launching VMware - view.exe.

    .exe running from the customer view full/thickness:

    VMware - view.exe

    -ftnlsv.exe

    -vmwsprrdpwks.exe

    -ftscanmgr.exe

    There is something else to consider when the view client configuration ThinApp or thickness to work with Cisco SSL VPN Portal and the Smart Tunnel?  We should have ports configured in the client in connection with the same view Firewall works with SSL VPN Portal port redirector functionality.

    We have not been able to find any documentation on how to properly configure the smart to work with the New Horizon 3.5.2 client Tunnel.  A ticket of troubleshooting with Cisco suggests that the Smart Tunnel feature still perhaps not compatible with this new Horizon (thin or thick) client.  Currently, we are looking at other options because it is not not clear whether Cisco will be able to get us the confirmation or offer a solution without delay of our project to upgrade.  Maybe stick to the previous VMware View Client version 5.4.0 which we know work with Smart Tunnel in some situations and with the redirector port for others.

  • Cisco ASA url filtering

    I have cisco ASA 5515 and it works fine. Now, I want to activate the url filtering so that I can filter websites such as facebook, youtube, torrents and so on. I don't have the license for filtering url, and in accordance with the document of cisco, he said that we have no need for this from the url filtering license. So how can I block them?

    Hello

    Yes, certainly, please visit this link:

    http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...

    Kind regards

    Aditya

    Please evaluate the useful messages and mark the correct answers.

  • ASA 5510 VPN multiple tunnels through different interfaces

    Is it possible to create VPN tunnels on more than one interface to an ASA (specifically 5510 with 8.4), or I'm doing the impossible?

    We have 2 public interfaces on our ASA connected to 2 different suppliers.

    We must work L2L tunnels of the SAA for remote offices through the interface that is our ISP 'primary' and also used as our default gateway for internet traffic.

    We are trying to install a remote office use our secondary connection for its tunnel (office of high traffic we would prefer separate away from the rest of our internet and VPN traffic).

    I can create the tunnel with the ACL appropriate for traffic tunnel, card crypto, etc., put in place a static route to force ASA to use the secondary interface for traffic destined for the public of the remote gateway IP address, and when I finished, traffic initiated by the remote site will cause the tunnel to negotiate and find - I can see the tunnel in Show crypto ikev1 his as L2L answering machine MM_ACTIVE , Show ipsec his with the right destination and correct traffic local or remote identities for interesting, but the ASA local never tries to send traffic through the tunnel.  If I use tracers of package, it never shows a VPN that is involved in the trafficking of the headquarters in the remote desktop, as if the SAA is not seeing this as for the corresponding VPN tunnel traffic.

    If I take the exact same access and crypo card statements list and change them to use the primary ISP connection (and, of course, change the remote desktop IP connects to), then the connection works as expected.

    What Miss me?

    Here is a sample of the VPN configuration: (PUBLIC_B is our second ISP link, 192.168.0.0/23 is MainOffice 192.168.3.0/24 is FieldOffice)

    permit access list range 192.168.0.0 PUBLIC_B_map 255.255.254.0 192.168.3.0 255.255.255.0

    NAT (Inside, PUBLIC_B) static source MainOffice MainOffice static FieldOffice FieldOffice

    card crypto PUBLIC_B_map 10 corresponds to the address PUBLIC_B_map

    card crypto PUBLIC_B_map 10 set counterpart x.x.x.x

    card crypto PUBLIC_B_map 10 set transform-set ESP-3DES-SHA ikev1

    PUBLIC_B_map PUBLIC_B crypto map interface

    tunnel-group x.x.x.x type ipsec-l2l

    tunnel-group ipsec-attributes x.x.x.x

    IKEv1 pre-shared-key *.

    Route PUBLIC_B x.x.x.32 255.255.255.224 y.y.y.y 1

    If I take this same exact configuration and change it to use PUBLIC (our primary connection) instead of PUBLIC_B, remove the instruction PUBLIC_B route and change the desktop to point to the ip address of the PUBLIC, then everything works, so my access list and crypto map statements must be correct.

    What I don't understand is why the ASA Head Office does not seem to recognize interesting for the tunnel traffic when the tunnel is for the second ISP connection, but works when it is intended for the main ISP.  There is no problem of connectivity with the ISP Internet B - as mentioned previously, the tunnel will come and negotiate properly when traffic is started from the desktop, but the traffic of main office is never sent to the bottom of the tunnel - it's as if the ASA does not think that traffic of 192.168.0.x to 192.168.3.x should pass through the VPN.

    Any ideas?

    Hello

    I think your problem is that there is no route for the actual remote network behind the VPN L2L through ISP B connection

    You could try adding add the following configuration

    card crypto PUBLIC_B_map 10 the value reverse-road

    This should automatically add a static route for all remote networks that are configured in the ACL Crypto, through the interface/link-ISP B.

    If this does not work, you can try to manually add a static route to the ISP B link/interface for all remote networks VPN L2L in question, and then try again.

    The route to the remote VPN peer through the ISP B does not to my knowledge.

    I would like to know if it works for you.

    It may be useful

    -Jouni

  • Filtering on ASA - CX without content license

    Hello

    Please can someone advise if it is possible to configure the URL/content filtering on a box of ASA - CX with an expired license?

    I connected the PRSM onbox, I can't create objects and policies needed to enable filtering.

    Also, I redirect to installation to the CX (for testing purposes), however in the current state (without a license) browsing all watch a 'redirect' screen and nothing happens the message stay here and does not have traffic redirected to the ASA. It is also due to licensing (there is currently no policy in place)

    We are in the process of buying licenses STROKE and WSE, so I just want to check what the expected behaviours should be.

    Thank you very much

    CX is end of sales and new licenses are not sold by Cisco as of August 17, 2015. Reference.

    A CX unlicensed generally cannot apply, create, or modify policies through its premises PRSM (or he can take an out of area PRSM) if the license for the feature is not present and active (IE out of date). It is further explained in the section User Guide on licensing.

    You must use the power of fire and associated licenses for new deployments.

  • ASA: S2S Tunnel stops with higher traffic

    Hello

    I have no idea where I have to start solving our problem:

    Site A: ASA 5520/9.2 (4) 5 ~ 20 IPsec tunnels

    Site b: ASA 5505/9.2 (4) 5

    When I do a SSH (or HTTP or any other TCP) session from Site A to any Linux on Site B server, I can connect, but when I do something as a "dmesg" or long "ls - al", the session hooked after 10 to 20 lines. Also HTTP sessions (as a site to set up a printer), smaller Web sites are okay (but slow), more big sites stops with a browser timeout.

    This only happens on one site, all other sites work very well (which have the same config, same OS ASA).

    Just to test, I opened the ssh port to the external IP address on the external interface and it works very well, as well as with the traffic through the tunnel going something wrong.

    Any idea, where do I start debugging?

    Gruss ivo

    PS: How is stupid cloudflare, they check this text and do not allow to write the ls command linux less al, but ls space space space less al works!

    You can twist on the SAA mss using this doc and empty the outside df bit as well. Follow the steps described in the section "VPN encryption error."

    Crypto ipsec df - bit clear-df outdoors

    Let us know how it rates.

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • Client VPN und Cisco asa 5505 tunnel work but no traffic

    Hi all

    I am new to this forum and Don t have a lot of experience with Cisco, so I hope I can get help from specialists.

    I have the following problem:

    I installed und konfigured ASA 5505 for use with vpn client. I would like to access the local network from outside through vpn.

    To test, I installed ASA 5505 with ADSL (pppoe) and tried to give access to the internal network.

    Of course whenever I have recive the supplier's different IP address, but it didn't is not a problem reconfigure in the vpn client.

    After the connection is established (vpn tunnel work) I can see my external network packets. But I Don t have any connection to the internal network.

    I erased my setup yesterday and tried to reconfigure ASA again. I didn t tested yesterday, because it was too late. And I know that I Don t have the authorization rule at present by the ACL. But I think I'm having the same problem again. (tunnel but no traffic).

    What I did wrong. Could someone let me know what I have to do today.

    With hope for your help Dimitri.

    ASA configuration after reset and basic configuration: works to the Internet from within the course.

    : Saved

    : Written by enable_15 to the CEDT 20:29:18.909 Sunday, August 29, 2010

    !

    ASA Version 8.2 (2)

    !

    ciscoasa hostname

    activate 2KFQnbNIdI.2KYOU encrypted password

    2KFQnbNIdI.2KYOU encrypted passwd

    names of

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 192.168.1.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    PPPoE client vpdn group home

    IP address pppoe setroute

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    boot system Disk0: / asa822 - k8.bin

    passive FTP mode

    clock timezone THATS 1

    clock to summer time CEDT recurring last Sun Mar 02:00 last Sun Oct 03:00

    DNS domain-lookup outside

    DNS server-group DefaultDNS

    Server name 194.25.0.60

    Server name 194.25.0.68

    DM_INLINE_TCP_1 tcp service object-group

    port-object eq www

    EQ object of the https port

    inside_access_in list extended access permitted udp 192.168.1.0 255.255.255.0 no matter what eq field open a debug session

    inside_access_in list extended access permitted tcp 192.168.1.0 255.255.255.0 any object-group DM_INLINE_TCP_1 open a debug session

    inside_access_in list extended access deny ip any any debug log

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.0.0 255.255.0.0

    permit inside_nat0_outbound to access extended list ip 192.168.10.0 255.255.255.0 192.168.10.0 255.255.255.128

    homegroup_splitTunnelAcl list standard access allowed 192.168.10.0 255.255.255.0

    pager lines 24

    Enable logging

    asdm of logging of information

    Outside 1500 MTU

    Within 1500 MTU

    IP local pool homepool 192.168.10.1 - 192.168.10.100 mask 255.255.255.0

    ICMP unreachable rate-limit 1 burst-size 1

    ASDM image disk0: / asdm-625 - 53.bin

    ASDM location 192.168.0.0 255.255.0.0 inside

    ASDM location 192.168.10.0 255.255.255.0 inside

    don't allow no asdm history

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 1 0.0.0.0 0.0.0.0

    inside_access_in access to the interface inside group

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    Enable http server

    http 192.168.1.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    Telnet timeout 5

    SSH timeout 5

    Console timeout 0

    VPDN group home request dialout pppoe

    VPDN group House localname 04152886790

    VPDN group House ppp authentication PAP

    VPDN username 04152886790 password 1

    dhcpd outside auto_config

    !

    dhcpd address 192.168.1.5 - 192.168.1.36 inside

    dhcpd allow inside

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    TFTP server 192.168.1.5 inside c:/tftp-root

    WebVPN

    Group Policy inner residential group

    attributes of the strategy of group home group

    value of 192.168.1.1 DNS server

    Protocol-tunnel-VPN IPSec

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list homegroup_splitTunnelAcl

    username user01 encrypted password privilege 0 v5P40l1UGvtJa7Nn

    user01 username attributes

    VPN-strategy group home group

    tunnel-group home group type remote access

    attributes global-tunnel-group home group

    address homepool pool

    Group Policy - by default-homegroup

    tunnel-group group residential ipsec-attributes

    pre-shared-key ciscotest

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum:930e6cddf25838e47ef9633dc2f07acb

    : end

    Hello

    Normally, you want a static public IP address on the ASA to allow it to receive connections from VPN clients (avoid to change the IP address all the time).

    If you connect via VPN, check the following:

    1. the tunnel is established:

    HS cry isa his

    Must say QM_IDLE or MM_ACTIVE

    2 traffic is flowing (encrypted/decrypted):

    HS cry ips its

    3. Enter the command:

    management-access inside

    And check if you can PING the inside ASA VPN client IP.

    4. check that the default gateway for the LAN internal ASA within intellectual property (or there is a road to the ASA to send traffic to the VPN clients).

    Federico.

  • An ASA inspect traffic through a VPN?

    The ASA did inspect the traffic through a VPN using the default inspect the rules?

    Hi Justin,

    The SAA can inspect traffic encryption before or after decryption. The ASA cannot inspect encrypted traffic.

    This means that if the VPN tunnel ends on the ASA, ASA can inspect traffic sent through the prior encryption tunnel and could inspect the traffic post decryption when received.

    If the tunnel is not over on the SAA but pass instead through the ASA, ASA cannot inspect traffic encapsulated inside.

    It will be useful.

    Federico.

  • Cisco's ASA IPsec tunnel disconnects after a while

    Hi all

    I've set up an IPsec tunnel between sonicwall pro road and cisco ASA 5510. The well established tunnel and two subnets can access each other.

    I then added a static route to a public ip address on the sonicwall ipsec policy, so that all traffic to this ip address will go through the IPsec tunnel. It also works very well.

    But the problem is aftre tunnel Ipsec sometimes breaks down, and then I need to renegotiate the ipsec on sonicwall to restore the tunnel.

    This happens twice a day. I'm whther fear that this behavior is because of problems with config. I'm pasting my ASA running Setup here. Plese give some advice.

    SonicWALL publicip 1.1.1.2 192.168.10.0 subnet

    Cisco ASA publicip 1.1.1.1 subnet 192.168.5.0

    ciscoasa # sh run
    : Saved
    :
    ASA Version 8.2 (1)
    !
    ciscoasa hostname
    domain default.domain.invalid
    activate 8Ry2YjIyt7RRXU24 encrypted password
    2KFQnbNIdI.2KYOU encrypted passwd
    names of
    !
    interface Ethernet0/0
    Speed 100
    full duplex
    nameif outside
    security-level 0
    IP 1.1.1.1 255.255.255.248
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    192.168.5.1 IP address 255.255.255.0
    !
    interface Ethernet0/2
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    nameif management
    security-level 100
    IP 192.168.1.1 255.255.255.0
    management only
    !
    passive FTP mode
    DNS domain-lookup outside
    DNS lookup field inside
    DNS server-group DefaultDNS
    Server name 66.28.0.45
    Server name 66.28.0.61
    domain default.domain.invalid
    permit same-security-traffic inter-interface
    permit same-security-traffic intra-interface
    object-group service rdp tcp
    EQ port 3389 object
    object-group service tcp OpenVPN
    port-object eq 1194
    access list outside extended permit icmp any any echo response
    access list outside extended permit tcp any host # eq pptp
    outside allowed extended access will list any host #.
    list of extended outside access permit udp any any eq 1701
    extended outdoor access allowed icmp a whole list
    access list outside extended permit tcp any host # eq ftp
    access list outside extended permit tcp any host # eq ssh
    list of extended outside access permit tcp any host # object - group rdp
    turn off journal
    access list outside extended permit tcp any host 1.1.1.1 object - group Open
    VPN
    access-list sheep extended ip 192.168.5.0 allow 255.255.255.0 192.168.5.0 255
    . 255.255.0
    access-list sheep extended ip 192.168.5.0 allow 255.255.255.0 192.168.10.0 255
    . 255.255.0
    L2L 192.168.5.0 ip extended access-list allow 255.255.255.0 192.168.10.0 255.2
    55.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    management of MTU 1500
    IP local pool ippool 192.168.5.131 - 192.168.5.151 mask 255.255.255.0
    IP local pool l2tppool 192.168.5.155 - 192.168.5.200 mask 255.255.255.0
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 621.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (outside) 1 192.168.10.0 255.255.255.0
    NAT (outside) 1 192.168.5.0 255.255.255.0
    NAT (inside) 0 access-list sheep
    NAT (inside) 1 192.168.5.0 255.255.255.0
    outside access-group in external interface
    Route outside 0.0.0.0 0.0.0.0 38.106.51.121 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-registration DfltAccessPolicy
    the ssh LOCAL console AAA authentication
    AAA authentication LOCAL telnet console
    Enable http server
    http 192.168.1.0 255.255.255.0 management
    http 192.168.5.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto-map dynamic dynmap 5 the value reverse-road
    Crypto easyvpn dynamic-map 10 transform-set RIGHT
    Crypto-map dynamic easyvpn 10 reverse-drive value
    card crypto mymap 10 correspondence address l2l
    card crypto mymap 10 set peer 1.1.1.2
    card crypto mymap 10 transform-set RIGHT
    map mymap 30000-isakmp ipsec crypto dynamic easyvpn
    mymap outside crypto map interface
    crypto isakmp identity address
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400
    crypto ISAKMP policy 20
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Crypto isakmp nat-traversal 3600
    Telnet 192.168.5.0 255.255.255.0 inside
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 5
    Console timeout 0
    Hello to tunnel L2TP 10
    management of 192.168.1.2 - dhcpd address 192.168.1.254
    enable dhcpd management
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    WebVPN
    internal DefaultRAGroup group strategy
    attributes of Group Policy DefaultRAGroup
    value of 66.28.0.45 DNS server 66.28.0.61
    Protocol-tunnel-VPN IPSec l2tp ipsec
    field default value cisco.com
    attributes of Group Policy DfltGrpPolicy
    internal band easyvpn strategy
    attributes of the strategy of band easyvpn
    value of 66.28.0.45 DNS server 66.28.0.61
    Protocol-tunnel-VPN IPSec
    enable IPSec-udp
    Split-tunnel-policy tunnelall
    the address value ippool pools
    VPN-group-policy DefaultRAGroup
    attributes global-tunnel-group DefaultRAGroup
    address l2tppool pool
    Group Policy - by default-DefaultRAGroup
    IPSec-attributes tunnel-group DefaultRAGroup
    pre-shared-key *.
    tunnel-group DefaultRAGroup ppp-attributes
    No chap authentication
    ms-chap-v2 authentication
    tunnel-group 1.1.1.2 type ipsec-l2l
    1.1.1.2 tunnel-group ipsec-attributes
    pre-shared-key *.
    tunnel-group easyvpn type remote access
    tunnel-group easyvpn General attributes
    Group Policy - by default-easyvpn
    easyvpn group tunnel ipsec-attributes
    pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the netbios
    inspect the tftp
    inspect the pptp
    !
    global service-policy global_policy
    context of prompt hostname
    Cryptochecksum:5542615c178d2803f764c9b8f104732b
    : end

    I guess you have typo in the configuration of the ASA?

    L2L 192.168.5.0 ip extended access-list allow 255.255.255.0 192.168.10.0 255.255.255.0
    list access extended extended permitted host ip voip pubic ip 192.168.10.0 255.255.255.0

    Can you confirm that you have configured instead the following:

    access-list l2l extended permitted host ip voip pubic ip 192.168.10.0 255.255.255.0

    Moreover, even if the crypto map tag says easyvpn; peer address is correct to point 1.1.1.2

    In addition, don't know why you have the following configuration (but if it is not necessary I suggest to be removed and 'clear xlate' after the withdrawal):

    NAT (outside) 1 192.168.10.0 255.255.255.0

    Finally, pls turn off keepalive to SonicWall.

    If the foregoing still don't resolve the issue, can you try to remove the card dynamic encryption of the ASA (no map mymap 30000-isakmp ipsec crypto dynamic easyvpn), release the tunnel and try to open the tunnel between the ASA and SonicWall and take the exit of "show the isa cry his ' and ' show cry ipsec his» I'm curious to see why he is always referred to the easyvpn crypto map. When you remove the dynamic encryption card, dynamic vpn lan-to-lan of remote access client does not work.

  • ASA url registration

    Hello

    I try to make our ASA journal URL and I'm getting some successes. However, the present output IP address instead of the real domain, for example, when you browse on imdb, he is recorded as:

    November 16, 2009 14:12:35: % ASA-5-304001: 30.30.30.30 consulted the URL 209.85.229.148:/ad

    j/imdb2. Consumer.homepage /; TILE = 2; SZ = 468 x 60, 728 x 90, 1008 x 150, 9 x 1; p = t; s = 32; o RD = 99

    73051011677648

    instead of imdb.com. (or something like that happens to be).

    How the ASA to log the area rather than the corresponding IP address?

    http://www.Cisco.com/en/us/products/ps6128/products_configuration_example09186a0080ac2fda.shtml#related

    says the ASA needs to run to 8.0.4.24 or later, our 8.2 (1).

    Thank you

    Scott

    Well, I spoke too soon. Here's a way to connect all of the query, with host and URI. I found this on CCIE_Security Archives of the mailing list. Basically, define you a regular expression to match the sites that you want to open a session. I used a simple point "." to match anything.

    regex matchall "."
    !
    class-map type regex match-any DomainLogList
    match regex matchall
    class-map type inspect http match-all LogDomainsClass
    match request header host regex class DomainLogList
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    policy-map type inspect http http_inspection_policy
    parameters
    class LogDomainsClass
      log

    Then check your record:

    20 Nov 09:27:08 10.19.30.10 asa % ASA-5-304001: 192.168.200.2 URL Accessed 157.166.255.19:http://cnn.com/
    20 Nov 09:27:08 10.19.30.10 asa % ASA-5-304001: 192.168.200.2 URL Accessed 157.166.226.26:http://www.cnn.com/
    20 Nov 09:27:08 10.19.30.10 asa % ASA-5-304001: 192.168.200.2 URL Accessed 198.78.220.126:http://i.cdn.turner.com/cnn/.element/css/3.0/common.css
    20 Nov 09:27:08 10.19.30.10 asa % ASA-5-304001: 192.168.200.2 URL Accessed 198.78.220.126:http://i.cdn.turner.com/cnn/.element/css/3.0/main.css

    Caution - This saves each HTTP request that sees the ASA. I have no idea how much charge this implies an ASA with the important HTTP traffic. As described in the post of the related mailing list, you can create more specific lists of regex to match specific hosts and/or URIs and can take measures other than logging, including blocking/resetting.

  • Between Cisco ASA VPN tunnels with VLAN + hairpin.

    I have two Cisco ASA (5520 and 5505) both with version 9.1 (7) with Over VPN and Security Plus licenses. I try to understand all the internet a traffic tunnel strategy VLAN especially on the 5520 above the 5505 for further routing to the internet (such as a hair/u-turn hairpin). A few warnings:

    1. The 5505 has a dynamically assigned internet address.
    2. The 5505 has sometimes no device turned on behind her, bringing interfaces down to the inside (which can cause problems from site to site).
    3. The 5520 cannot be a client of ezvpn due to its current role as a server of webvpn (anyconnect).

    Let me know if I need to post my current config. Basically, I'm starting from scratch after several attempts.

    Thank you!

    1. The 5505 has a dynamically assigned internet address.

    You can use the following doc to set up the VPN and then this document to configure Hairping/U tuning

    2. the 5505 has sometimes no device turned on behind her, bringing interfaces down to the inside (which can cause problems from site to site).

    Make sure that the interface is connected to a switch so that it remains all the TIME.

    3. 5520 the may not be a ezvpn customer due to she has current as one role anyconnect webvpn ()) server.

    You can use dynamic VPN with normal static rather EZVPN tunnel.

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • ASA between tunnel from site to site

    Hello

    I have a site to tunnel between 2 ASAs. An ASA is behind the University and another in our data center. Unversity offers Internet services and they have the ASA that controls incoming traffic. We used to have problems of tunnel where the stale SAs were inactive and deleted in the center of data due to timeout or other unknown reasons. Subsequently discovered that ASA9.1.5 behind the University had the bug do not remove obsolete entries. After decommissioning of the code to 8.4.6 version we don't see any problems. And not work as usual. Unversity guy said that he added some ACL on the external interface to allow our Datacenter IP to forward VPN traffic.

    https://Quickview.cloudapps.Cisco.com/QuickView/bug/CSCup37416

    My Question even before adding these tunnels ACLs works but was not remove obsolete entries. I think that, after upgrade, it became stable. Unversity guys said after the addition of the ACL, it may have stabilized the question.

    Can anyone can highlight here what's happening?

    Thanks in advance.

    Hi Vishnu,

    Adding the ACL on the external interface doesn't have any report with the entries in table ASP for VPN traffic.

    ASP duplicate entries are caused from crypto ACL and interesting traffic.

    ASP table displayed duplicate entries ASP and traffic hit an entry ASP.
    that is out of date and the traffic on ITS special is blackholed which led to the interruption of the VPN traffic.

    It has no connection with the ACL interface.

    Hope it meets your request.

    Kind regards

    Aditya

    Please evaluate the useful messages.

  • Transfer between Cisco ASA VPN Tunnels

    Hi Experts,

    I have a situation where I need to set up the transfer between two VPN Tunnels completed in the same box ASA. A VPN Tunnel will incoming traffic and that traffic should be sent to the bottom of the other VPN Tunnel to the ASA. The two VPN Tunnels are from the Internet and speak with the same IP address of the ASA peers.

    Retail

    Tunnel A

    Source: 192.168.1.0/25

    Destination: 10.1.1.0/25

    Local counterpart: 170.252.100.20 (ASA in question)

    Remote peer: 144.36.255.254

    Tunnel B

    Source: 192.168.1.0/25

    Destination: 10.1.1.0/25

    Local peer IP: 170.252.100.20 (box of ASA in question)

    Distance from peer IP: 195.75.75.1

    Can this be achieved? what configurations are needed in the ASA apart cryptographic ACL entries?

    Thanks in advance for your time.

    Believed that, in this case your config is good, and you can avoid using routes on your asa since it must route based on its default gateway, make sure you have good sheep in place rules and the inter-to interface same-security-interface allowed return you will need.

  • ASA 5505 Tunnel No. traffic

    Hi all

    I am new to the forums and the configuration of the SAA.

    I have two 5505 we currently setup the wizard of ipsec.

    One of them is our main office and is able to communicate with other ASA configured for it.

    The tunnel is up, but we are not able to communicate on networks the.

    I have had to deal with this for two days and out of ideas.

    Network (hand): 192.168.1.0/24

    Network 192.168.3.0/24 B:

    A running of the network configuration

    : Saved

    :

    ASA Version 8.2 (1)

    !

    ciscoasa hostname

    activate the password

    passwd

    names of

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 192.168.1.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    static IP from ISP 255.255.255.248

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    passive FTP mode

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    outside_access_in list extended access permit icmp any one

    outside_access_in list extended access permit tcp any interface outside eq 3389

    outside_access_in list extended access permit tcp any interface outside eq ftp

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.3.0 255.255.255.0

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.4.0 255.255.255.0

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.5.0 255.255.255.0

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.6.0 255.255.255.0

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.2.0 255.255.255.0

    inside_nat0_outbound to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.7.0 255.255.255.0

    outside_1_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.3.0 255.255.255.0

    outside_2_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.3.0 255.255.255.0

    outside_3_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.4.0 255.255.255.0

    outside_4_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.5.0 255.255.255.0

    outside_5_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.6.0 255.255.255.0

    outside_6_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.7.0 255.255.255.0

    outside_7_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.3.0 255.255.255.0

    outside_8_cryptomap to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.3.0 255.255.255.0

    access-list no. - NAT allowed extended ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

    inside_access_in of access allowed any ip an extended list

    111 extended access-list allow ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0

    pager lines 24

    Enable logging

    recording of debug console

    monitor debug logging

    debug logging in buffered memory

    logging of debug asdm

    recording of debug messages

    Within 1500 MTU

    Outside 1500 MTU

    IP audit name IP_Attack attack action fall

    Check IP alarm action info IP_Information

    verification of IP within the IP_Information interface

    verification of IP within the IP_Attack interface

    interface IP outside the IP_Information check

    interface IP outside the IP_Attack check

    disable signing verification IP 2000

    disable signing verification IP 2004

    ICMP unreachable rate-limit 1 burst-size 1

    ICMP allow any inside

    ICMP allow all outside

    don't allow no asdm history

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) - 0 111 access list

    NAT (inside) 1 0.0.0.0 0.0.0.0

    public static interface 3389 192.168.1.4 (indoor, outdoor) tcp 3389 netmask 255.255.255.255

    public static tcp (indoor, outdoor) interface ftp 192.168.1.4 netmask 255.255.255.255 ftp

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 (Gateway ISP)

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-registration DfltAccessPolicy

    Enable http server

    http 0.0.0.0 0.0.0.0 inside

    http 0.0.0.0 0.0.0.0 outdoors

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    card crypto outside_map 1 match address outside_1_cryptomap

    card crypto outside_map 1 set pfs Group1

    outside_map game 1 card crypto peer network C

    card crypto outside_map 1 set of transformation-ESP-3DES-SHA

    card crypto outside_map 2 match address outside_2_cryptomap

    card crypto outside_map 2 pfs Group1 set

    crypto outside_map 2 peer network D E network card game

    card crypto outside_map 2 game of transformation-ESP-3DES-SHA

    card crypto outside_map 3 match address outside_3_cryptomap

    card crypto outside_map pfs Group1 3 set

    set outside_map 3 card crypto peer network F

    card crypto outside_map 3 game of transformation-ESP-3DES-SHA

    card crypto 4 correspondence address outside_4_cryptomap outside_map

    card crypto outside_map pfs Group1 4 set

    peer set network card crypto outside_map 4 G

    card crypto outside_map 4 game of transformation-ESP-3DES-SHA

    card crypto outside_map 5 match address outside_5_cryptomap

    card crypto outside_map pfs Group1 5 set

    crypto 5 peer network: outside_map card game

    card crypto outside_map 5 the value transform-set ESP-3DES-SHA

    card crypto outside_map 6 correspondence address outside_6_cryptomap

    card crypto outside_map pfs Group1 6 set

    card crypto outside_map 6 set peer network I

    card crypto outside_map 6 game of transformation-ESP-3DES-SHA

    card crypto outside_map 7 match address outside_7_cryptomap

    card crypto outside_map pfs Group1 7 set

    outside_map 7 peer Network J crypto card game

    card crypto outside_map 7 game of transformation-ESP-3DES-SHA

    card crypto outside_map 8 correspondence address outside_8_cryptomap

    card crypto outside_map pfs set 8 Group1

    crypto outside_map 8 peer network K card game

    card crypto outside_map 8 game of transformation-ESP-3DES-SHA

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    crypto ISAKMP policy 30

    preshared authentication

    the Encryption

    sha hash

    Group 1

    life 86400

    Telnet 0.0.0.0 0.0.0.0 inside

    Telnet timeout 30

    SSH 0.0.0.0 0.0.0.0 inside

    SSH 0.0.0.0 0.0.0.0 outdoors

    SSH timeout 30

    Console timeout 0

    management-access inside

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    attributes of Group Policy DfltGrpPolicy

    value of VPN-filter 111

    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn

    OMIS

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    inspect the pptp

    !

    global service-policy global_policy

    context of prompt hostname

    Cryptochecksum:2b13e2781cf6be80bd5d7c2998d78bdf

    : end

    don't allow no asdm history

    and it's B network running config:

    : Saved

    :

    ASA Version 8.2 (5)

    !

    ciscoasa hostname

    activate the password

    names of

    Trinity name 192.168.1.0

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    address 192.168.3.1 IP 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    static IP from ISP 255.255.255.0

    !

    passive FTP mode

    DNS lookup field inside

    DNS server-group DefaultDNS

    Server name 68.105.28.16

    Server name 68.105.29.16

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    outside_1_cryptomap to access extended list ip 192.168.3.0 allow Trinity 255.255.255.0 255.255.255.0

    inside_nat0_outbound to access extended list ip 192.168.3.0 allow Trinity 255.255.255.0 255.255.255.0

    inside_access_in of access allowed any ip an extended list

    outside_access_in list extended access permit icmp any one

    outside_access_in list extended access permit tcp any interface outside eq 3389

    outside_access_in list extended access permit tcp any interface outside eq ftp

    pager lines 24

    Enable logging

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) - 0 111 access list

    NAT (inside) 1 0.0.0.0 0.0.0.0

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 70.168.245.161 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    Enable http server

    http 192.168.3.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    card crypto outside_map 1 match address outside_1_cryptomap

    card crypto outside_map 1 set pfs Group1

    card crypto outside_map 1 set of peer main office

    card crypto outside_map 1 set of transformation-ESP-3DES-SHA

    outside_map interface card crypto outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    crypto ISAKMP policy 30

    preshared authentication

    the Encryption

    sha hash

    Group 1

    life 86400

    Telnet timeout 5

    SSH timeout 5

    Console timeout 0

    dhcpd outside auto_config

    !

    dhcpd address 192.168.3.5 - 192.168.3.254 inside

    dhcpd dns 68.105.28.16 68.105.29.16 interface inside

    dhcpd allow inside

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    attributes of Group Policy DfltGrpPolicy

    Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn

    Office main tunnel-group type ipsec-l2l

    tunnel-group office main ipsec-attributes

    pre-shared key *.

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:cd079382c64a4046125089b766c0334f

    : end

    ASDM location 255.255.255.0 inside Trinity

    don't allow no asdm history

    Thank you

    Mike

    Hello Mike,.

    outside_1_cryptomap to access extended list ip 192.168.3.0 allow 255.255.255.0 192.168.1.0 255.255.255.0

    local ident (addr, mask, prot, port): (192.168.3.0/255.255.255.0/0/0)

    Remote ident (addr, mask, prot, port): (trinity/255.255.255.0/0/0)

    current_peer:xx.XX.XX.170

    #pkts program: 106, #pkts encrypt: 106, #pkts digest: 106

    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0

    If no package received!

    Site main do not encrypt or send the traffic via another card Crypto (see Jounni)

    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0

    #pkts decaps: 101, #pkts decrypt: 101, #pkts check: 101

    Excellent work of Jounni,

    mark it as answered so future users can pull of this

    For more information about Core and network security, follow my Web site at http://laguiadelnetworking.com

    Any questions contact me at the [email protected] / * /

    See you soon,.

    Julio Segura Carvajal

  • ASA L2L Tunnel 8.3 NAT helps

    I read all the messages that I could find, every bit of documentation, I could find and still cannot get my head around how I have to configure this new ASA to meet the requirements.  My client's implementation of a new data center and going to migrate to this new domain controller.  They currently have an old PIX-515E clocked 6.3 to their existing data center.  I need to imitate the configuration on a new ASA 8.3 running.  I think I got all the NAT static etc, but I'm stuck on the configuration of their two tunnels they use.  The relevent to the old PIX configuration is pasted below. I don't get the ACL, etc. in full as there are a lot of old tunnels, etc. which do not pass.  Only the parts that are relevant to these two tunnels are below.  Also, many of the elements from the old configuration do not make sense and I don't know what is actually happening.

    Global 1 interface (outside)
    NAT (inside) - 0 100 access list
    NAT (inside) 1 0.0.0.0 0.0.0.0 0 0

    public static 172.30.6.65 (Interior, exterior) 10.0.0.130 netmask 255.255.255.255 0 0

    allowed for line of the access list 100 11 ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0 (hitcnt = 80740)

    allowed for line of the access list 100 39 host ip 10.0.0.130 2.9.37.0 255.255.255.0 (hitcnt = 13531)

    outside_cryptomap_220 list of allowed access host ip 10.0.0.130 2.9.37.0 255.255.255.0
    outside_cryptomap_220 ip 172.30.6.64 access list allow 255.255.255.248 2.9.37.0 255.255.255.0

    access-list 181 allow ip 10.0.0.0 255.0.0.0 10.0.26.0 255.255.255.0

    gersmap 220 ipsec-isakmp crypto map

    card crypto gersmap 220 correspondence address outside_cryptomap_220

    peer set card crypto gersmap 220 64.87.28.38

    card crypto gersmap 220-transform-set-3DES-SHA

    gersmap 241 ipsec-isakmp crypto map

    correspondence address card crypto gersmap 241 181

    card crypto gersmap 241 counterpart set 74.238.28.7

    card crypto gersmap 241 transform-set dblsecure3

    gersmap interface card crypto outside

    ISAKMP allows outside

    Here are some configuration information that was sent to the customer to the company remote.

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-margin : 0 ; mso-para-marge-bottom : .0001pt ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : « Times New Roman » ; mso-bidi-theme-font : minor-bidi ;}

    Fort-ASA01 # sh crypto ipsec peer of his FLOO1

    peer address: FLOO1

    Tag crypto map: toVPNClients, seq num: 17, local addr: 64.87.28.38

    2.9.37.0 IP Access-list extended floo1 255.255.255.0 allow 172.30.6.64 255.255.255.248

    local ident (addr, mask, prot, port): (2.9.37.0/255.255.255.0/0/0)

    Remote ident (addr, mask, prot, port): (172.30.6.64/255.255.255.248/0/0)

    current_peer: FLOO1

    Thank you for any assistance in getting this set up correctly

    You're absolutely perfect.

    This is the correct instruction of NAT, IE: 10.0.0.130 will be coordinated to 172.30.6.65 when the destination is 2.9.37.0/24.

Maybe you are looking for

  • My iPod touch shows that usb cable/iTunes on the screen logo

    I went to update the software on my iPod touch girls.  At halfway iTunes came back and said that there is an error with the download.   Now, the iPod primer not completely and has a black screen showing the usb cable and iTunes logo.  I tried to make

  • Can I save systemstatebackup on remote folder?

    Hello Can I save systemstatebackup on remote folder? I have windows 2008 server OS family. I used the following command to take systemstatebackup C:\wbadmin start systemstatebackup-backuptarget:------(remotefolder). I couldn't able to store the syste

  • Setting the resolution for S1931 LCD screens

    Installed S1931 monitor has a maximum resolution of 1366 X 768 at 60 hz.  My XP system will be higher in 1024 X 768.  Image is stretched and round objects are oval.  Is it possible to improve the resolution? Or is it not compatible with my computer?

  • applying files. Look in first Pro CC

    I use the first Pro CC (2015.3) in the effects box, under Lumetri looks like, there are presets to play with to change the color scheme, however I also found place online where you can download files is to add more options in Premiere Pro. An example

  • How to add "Behance" to publish the services in Lightroom?

    HelloI have Face book and Flickr to publish services, how can you add "Behance"? As an Adobe product, you would think it would be a simple task?