Internal NETWORK - no port channel (discovery of chassis policy)

I noticed that I have a link connecting the preference of the group to put anything on my DISCOVERY of the chassis/fex policy

then I noticed that the tab LAN subnet internal, there is no port selected channel.

When I change the policy to 1 link and channel ports and reack chassis, I see 4 ports under the internal LAN port channel.

Is it necessary to change the channel ports policy or can I just leave it to zero?

What would be the difference?

Best practice is to use the port-channel between IOM and FI; (This requires second-generation material for FI (62xx) and IOM (220 x)

If your discovery strategy is set to 1 and you ack frame, it will automatically create a pc of 4 links.

Tags: Cisco DataCenter

Similar Questions

  • See the bandwidth for the Port-Channel on Powerconnect & Force10

    Reference Dell dear community,

    Y at - it a command CLI or GUI to see how much bandwidth result after having done a port channel in some port Powerconnect and Force10? Suppose we have 4 port 1 Gb and do 4 ports with 1 port-channel. So actually in this channel port have a bandwidth of 4 GB.

    In Cisco, with the command show interface port-channel 1, we get the result

    switch #sh po int 1
    Port-channel 1 is up, line protocol is up (connected)
    Material is EtherChannel, address is 0064.4026.739a (bia 0064.4026.739a)
    MTU 1500 bytes, BW 4000000 Kbit, DLY 10 usec,
    reliability 255/255, txload 1/255, rxload 1/255
    Encapsulation ARPA, loopback not set
    KeepAlive set (10 sec)
    Full duplex, 1000 Mbps, link type is auto, media type is unknown
    input stream control is turned off, output flow control is not supported
    Members in this channel: Gi0/1 Gi0/2
    Type of the ARP: ARPA, ARP Timeout 04:00
    Last entry of 00:00:00, 00:04:48 output, output hang never
    Final cleaning of "show interface" counters never
    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0
    Strategy of queues: fifo
    Output queue: 0/40 (size/max)
    5 minute input rate 2000 bps, 3 packets/s
    5 minute output rate 2000 bps, 3 packets/s

    But if we do this command on Powerconnect, the just result inform port that starts from the port-channel.

    Reference Dell #show interfaces port-channel 1 short

    Ch-Type Hash Type Min-links Channel ports local FRP
    -------   ----------------------------- -------- --------- --------- ---------
    PO1 Active: Static disabled people article gi1/0/1, gi1/0/2 7 1 article
    Item in gi1/0/3, item in gi1/0/4

    Type of hashing algorithm
    1 - the source MAC, VLAN, EtherType, source module and port Id
    2 - destination MAC, VLAN, EtherType, module source and port Id
    3 - source IP and TCP/UDP source port
    4 - destination IP and destination TCP/UDP port
    5 source/Destination MAC, VLAN, EtherType, MODID/source port
    6 source/Destination IP and port TCP/UDP source / destination
    7 - improved hash mode

    Can you help us find the answer?

    Thank you

    Kind regards

    Aziz

    The PowerConnect switches do not have the ability to show as much detail as the Force10 can. The RMON tables have an interface use %, what may be the closest we can do on the PowerConnect switch.

    #show rmon statistics

    I've seen some monitoring software which was able to question the switch via SNMP and get some information of bandwidth. However, this can be a bit inconsistent, according to which switch and what software is used.

    The MIBs/OID can be downloaded with the software switch.

    http://www.Dell.com/support/home/us/en/rc959303/products/ser_stor_net/networking/net_fxd_prt_swtchs

  • MDS configuration for port channel

    I tried to put in place the new download FC port channel to a pair of 9124 s MDS, but as I don't know enough on the side MDS, I can't the link to come. Are there references available anywhere say you blow by blow exactly how to set up the side MDS of the channel of the port? Or maybe an example of configuration work?

    Thank you

    I don't think it's possible to configure the fabric of interconnections, FC switch mode that only VAN is based on those. The only mode of switch that is taken in charge and possible to configure is the local network Ethernet switching mode.

    I have configured the week last on a pair of 9124 s MDS and needed to activate the F port trunking and channeling Protocol feature by using this command

    "feature fport-channel-trunk.

    After that, I had to run SAN Port Channeling. Here's a snipit of my configuration:

    npiv functionality
    fport-channel-trunk feature

    interface port-channel 11
    active channel mode
    rate switchport dedicated mode

    interface fc1/1
    port-license purchase
    Channel-Group 11
    no downtime

    interface fc1/2
    port-license purchase
    Channel-Group 11
    no downtime

  • Configuration port-channel, DTP, disabling

    Hi all

    I had a problem on the day where I wanted to attach a pile of 3750 x 2 to the network, the core is a 6500.

    There was a link configured for the core of the 3750 he had the configuration necessary trunk with BPDUFILTER active

    at the end of the base he had the standard configuration of trunk. The link is on the rise and work.

    Went to get a second battery for the heart link. Decided that DTC must be turned off at the end of the SWITCHPORT NONEGOTIATE battery

    the normal chest on the port configuration on the port channel port joined. Then suddenly the newspapers went crazy and right now, I need

    Spanning tree went crazy and started blocking areas of the network to avoid loops. There is STDS running in the network

    I had similar errors to this % SW_MATM-4-MACFLAP_NOTIF

    I pulled the battery cables and all services affected later came back.

    I know that enable the BPDUFILTER option stops at the port to participate in STP.

    Please could someone confirm due to the incompatibility of the config on these ports it has this problem or is there something I missed here

    Thank you mnay

    The BPDU filter is the root of the problem.

    You can't have two active rising running without creating a loop, unless they run into a PaGP/LACP-EtherChannel configuration. By having one or two links running with a filter BPDU, spanning Protocol tree on the 6500 didn't know that a link had to be in a deadlock state and he was panicked when MAC addresses on the stack of 3750 began to stir between interfaces.

    3750 cross media - stack EtherChannel using LACP, so if you want the resilience of two connections without having to factor in the covering tree branches, it is a good idea to combine the two in a group of channels and have both the 3750 and 6500 treat them as a single logical connection.

    If you want to keep them separated, you will need to remove the filters BPDU these ports and leave spanning tree figure things out properly.

  • Port-channel problem between fabric Interconnect and vPC N7K

    Hi all

    I have a problem with the Port Uplink channel between fabric interconnect with N7K using vPC

    It's my network for the UCS deployment topology

    N7K I configured vPC for red link and green linkto the fabric Interconnect A I has configured the Port-Channel with Member is Port 1 and Port 2, uplink is red link. Interconnection fabric B, I have configured the Port-Channel with Member's Port 1 and Port 2, uplink's green link.

    The interface port-channel on N7K show is good, each port-channel upwards and have all members. But the fabric Interconnnect, when I see in the UCS Manager, the status of the Port-Channel on Fabic A and fabric B dysfunction not more info: no operational Member. Although all the link is a link to the top and I've got the status of the Port Channel is enabled in the UCS Manager. When I see the properties Port 1, Port to Port-Channel 2, I see the number of members status is: individual. This means channel port is not up and no member in this configuration. I want to using the port-channel load balance and more bandwidth for the uplink of 20Gig. I don't understand why?

    Please help me solve this problem, I have to send the screenshot of UCS Manager when I show the status of the Port-Channel and Port-member in port-channel to reach items.

    Can someone help me solve this problem, thanks a lot. References, please include elements for more details on the fault.

    Thank you

    Trung.

    Hello Nguyen,

    Since the two N7k please collect:

    SH cdp nei

    SH run membership in. X int

    SH sum port-chan

    Thank you

    Matthew

  • Fabric Port Channel

    Hello

    Once in production, when the addition of cables in a PortChannel from fabric between the IOM and a FI, first had to be re - ack frame? (so that we will have the chassis package downtime). Or rather, as is a Port-Channel cables are detected automatically, so that it is not necessary to re - ack, and so there is no downtime in all... one that is the correct statement?

    Thank you

    Hello

    Yes, it is possible to have cloth by fabric port channel (A / B) by within an instance of the UCS chassis.

    Option is available under

    Equipment > chassis > chassis X > connectivity strategy

    http://www.Cisco.com/en/us/docs/unified_computing/UCS/SW/GUI/config/Guide/2.0/b_UCSM_GUI_Configuration_Guide_2_0_chapter_01100.html#d106201e585a1635

    HTH

    Padma

  • Setting port channel between UCS - FI and MDS 9124 (Mode F)

    Dear team,

    We tried to create the channel of port between UCS FI and MDS 9124

    But the port channel do not take action in mode F on MDS 9124

    FI is in host FC end Mode

    We have allowed FC uplink on FI trunking

    We have activated NPIV on MDS

    We have activated the MDS trunk

    FI and MDS in default VSAN

    To check that we have changed the way FI FC channels mode and switch port became active, but in E mode

    When we enabled CF trunking of uplink on the port mode FI channels and FC Switching became active in mode TE

    but in both cases above, showflogi database shows WWPN of SAN alone does not have the any fi.

    How to achieve this?

    Have read that no need to change the mode switching mode of CF swicthing and keep FC Endhost way

    SO how to channel ports with mode F MDS and FI (Display Mode as NProxy)

    What is it has nothing to do with the MDS NX - OS version? (https://supportforums.cisco.com/thread/2179129)

    If yes how to put as license for ports came with the camera and we don't have any CAP/PAK or license file as she came

    with license

    Also, we saw 2 files available for download (m9100-s2ek9-kickstart - mz.5.2.8 .bin and m9100-s2ek9 - mz.5.2.8 .bin b b) to use

    Thanks and greetings

    Jose

    Hi Jo Bo.

    What version of the software if your MDS race?

    On your UCS do connect nxos and show ficelleStringString ficelleT inteface and find the mac address.

    It is possible that you could be hitting the bug below. If this is the case, you may need to update the firmware on your MDS.

    Add MAC YES '002a6a', '8c604f', '00defb' for 5 k/UCS-FI

    http://Tools.Cisco.com/support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId= CSCty04686

    Symptom:

    Link change cannot connect any other Nexus or other Cisco Switch in mode VAN with a port channel F.   Question can be viewed in older versions of 5.1

    5.1.3.N1.1a

    but not later

    5.1.3.N2.1c

    Release. Question is also found in

    5.2 (1) N1 (1)

    and

    6.0 (2) N1 (1)

    and later versions.

    Conditions:

    Nexus configured for the link SAN PortChannels or NPIV Nexus mode connected to the UCS via regular F port channel where UCS VAN VAN edge mode switch: YES switch manufactured FI or another Cisco UCS Port WWN: xx:xx:00:2 has: 6a: xx:xx:xx or xx:xx:8 c: 60:4f:xx:xx:xx

    Workaround solution:

    Turn-off on Nexus 5 k TF-port question link mode does not happen with standard F-PORT SAN to remove Portchannel config

    Other Description of the problem:

    To check question collect please see the flogi-event history internal errors whenever the port is attempted OLS, AMENDMENTS, PBA counters will increment. This can be determined via the following output, view port internal info to see all the internal-historic port of error events

  • ASA 5510 - cannot access or ping internal networks

    Hello

    I can't ping of an internal network (10.1.1.0/24) to another internal network (10.1.2.0/24 and 10.1.3.0/24 and so on).

    The static route is in place and his works fine. I can ping these ASA network but not workstations.

    The error I get on ASA is: refuse packet dropped due to the implicit access list.

    Here is the configuration file:

    :

    ASA Version 8.0 (2)

    !

    host name asa

    test.com domain name

    activate the encrypted password of YLmDtv0bLkbX2VFy

    names of

    DNS-guard

    !

    interface Ethernet0/0

    nameif outside

    security-level 0

    IP address 20x.20x.16.xxx 255.255.255.224

    !

    interface Ethernet0/1

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Ethernet0/2

    nameif dmz

    security-level 50

    IP 172.16.0.254 255.255.255.0

    !

    interface Ethernet0/3

    nameif inside

    security-level 100

    IP 10.1.1.2 255.255.255.0

    !

    interface Management0/0

    nameif management

    security-level 100

    IP 172.16.200.1 255.255.255.248

    management only

    !

    access-list acl_outside note allows outdoor ping (need to enable internal rule of ICMP n ° 3)

    acl_outside list extended access permit icmp any one

    acl_outside list extended access permit tcp any any eq idle ftp

    acl_outside list extended access permit tcp any any object-group inactive DM_INLINE_TCP_1

    Comment from inside_access_in-access list internal nodes access to the outside world (all ports)

    inside_access_in list extended access allowed object-group TCPUDP any object-group everything

    access-list inside_access_in note allows ping within the network to the external network (internet).

    inside_access_in access list extended icmp permitted any any inactive echo

    access-list inside_access_in note allow ping respond both ways - from the inside to the outside and

    Note to inside_access_in list to access the outside inside (nat sound knots)

    inside_access_in list extended access allow DM_INLINE_SERVICE_1 of object-group a

    access-list extended sheep allowed ip 10.1.1.0 255.255.255.0 172.16.100.0 255.255.255.192

    access-list sheep extended permits all ip 172.16.100.0 255.255.255.192

    standard access list group1_splitTunnelAcl allow a

    pager lines 24

    Within 1500 MTU

    management of MTU 1500

    mask IP local VPN-pool 172.16.100.0 - 172.16.100.62 255.255.255.192

    ICMP unreachable rate-limit 1 burst-size 1

    ICMP allow all outside

    ICMP allow any inside

    ASDM image disk0: / asdm - 602.bin

    don't allow no asdm history

    ARP timeout 14400

    Global 1 20x.20x.16.xxx (outside)

    NAT (inside) 0 access-list sheep

    NAT (inside) 1 0.0.0.0 0.0.0.0

    Access-group acl_outside in interface outside

    inside_access_in access to the interface inside group

    Route outside 0.0.0.0 0.0.0.0 20x.20x.16.xxx 1

    Route inside 10.1.2.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.3.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.4.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.7.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.9.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.14.0 255.255.255.0 10.1.1.248 1

    Route inside 10.1.15.0 255.255.255.0 10.1.1.247 1

    Route inside 192.168.1.0 255.255.255.0 10.1.1.248 1

    Route inside 192.168.20.0 255.255.255.240 10.1.1.248 1

    Route inside 192.168.30.0 255.255.255.240 10.1.1.248 1

    Route inside 192.168.40.0 255.255.255.240 10.1.1.248 1

    Route inside 192.168.50.0 255.255.255.240 10.1.1.248 1

    Route inside 192.168.70.0 255.255.255.240 10.1.1.248 1

    Route inside 192.168.80.0 255.255.255.240 10.1.1.248 1

    -------------------------------------

    Any help or advice will be appreciated.

    Thank you

    You need two or three statements

    permit same-security-traffic intra-interface

    access-list sheep extended ip 10.1.2.0 allow 255.255.255.0 10.1.1.0 255.255.255.0

    10.1.3.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.1.0 255.255.255.0

    10.1.4.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.1.0 255.255.255.0

    10.1.7.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.1.0 255.255.255.0

    10.1.9.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.1.0 255.255.255.0

    10.1.14.0 IP Access-list extended sheep 255.255.255.0 allow 10.1.1.0 255.255.255.0

    and so on...

    apply sheep except for inside the interface which you already have (inside) nat 0 access-list sheep

    Concerning

  • WebVPN cannot access internal network on 2821

    Hello, I'm trying to configure WebVPN to my internal network. The client is connected to the router, but I can't ping from my internal network. Also, I've lost ping between hosts on the internal network. I can ping only gateway (192.168.162.0)

    IOS Version 15.1 (4) M9

    webvpn-pool IP local pool 192.168.162.212 192.168.162.218

    IP nat inside source list 1 interface GigabitEthernet0/0 overload

    access-list 1 permit 192.168.162.0 0.0.0.255

    Gateway Gateway-WebVPN-Cisco WebVPN
    address IP X.X.X.X port 1025
    SSL rc4 - md5 encryption
    SSL trustpoint trustpoint-my
    development
    !
    WebVPN context Cisco WebVPN
    Easy VPN title. "
    SSL authentication check all
    !
    list of URLS "rewrite".
    !
    ACL "ssl - acl.
    allow IP 192.168.162.0 255.255.255.0 192.168.162.0 255.255.255.0
    !
    login message "Cisco Secure WebVPN"
    !
    webvpnpolicy political group
    functions compatible svc
    functions required svc
    filter tunnel ssl - acl
    SVC-pool of addresses 'webvpn-pool' netmask 255.255.255.0
    generate a new key SVC new-tunnel method
    SVC split include 192.168.162.0 255.255.255.0
    Group Policy - by default-webvpnpolicy
    AAA authentication list sslvpn
    Gateway Cisco WebVPN bridge
    Max-users 2
    development
    !

    Hello

    I saw the VPN configuration:

    webvpnpolicy political group
    functions compatible svc
    functions required svc
    filter tunnel ssl - acl
    SVC-pool of addresses 'webvpn-pool' netmask 255.255.255.0
    generate a new key SVC new-tunnel method
    SVC split include 192.168.162.0 255.255.255.0
    Group Policy - by default-webvpnpolicy
    AAA authentication list sslvpn
    Gateway Cisco WebVPN bridge
    Max-users 2
    development

    ACL "ssl - acl.
    allow IP 192.168.162.0 255.255.255.0 192.168.162.0 255.255.255.0

    webvpn-pool IP local pool 192.168.162.212 192.168.162.218

    IP nat inside source list 1 interface GigabitEthernet0/0 overload

    access-list 1 permit 192.168.162.0 0.0.0.255

    I recommend the following:

    1 use a local IP pool with a different range that is used in the internal network (routing wise issues)

    2. removed the VPN filter, it is completely useless, since it's the same for which the (Split tunnel is):

    webvpnpolicy political group

    no tunnel ssl - acl filter

    3 use an ACL on the NAT and create the NAT exemption for the network to the IP pool inside local outdoors:

    NAT extended IP access list

    deny ip 192.168.162.0 0.0.0.255 XXXX XXXXX--> network IP of the IP pool

    Licensing ip 192.168.0.0 0.0.0.255 any

    IOverload nat inside source list NAT interface GigabitEthernet0/0 p

    What are the appropriate changes, I recommend you to apply.

    Please don't forget to rate and score as correct the helpful post!

    David Castro,

  • Determine the NIF port used by the HEART when it is configured in a port channel

    I recently saw an excellent video of live Cisco UCS troubleshooting performance that showed how to track traffic network within Cisco UCS. The speaker made a comment however, to determine that NIF is used by a high HEAT when port-channels are used between the FEX and FI there are different commands to run. You will need to determine the outcome of hash-load balancing. Unfortunately, he never entered what were these commands.

    Then when we have pinned port-channel instead of HIFs and NIFs veths, what commands will indicate which way is used?

    Matt,

    You can use this command:

    B (nxos) # sh port-channel - balance load< this="" will="" tell="" you="" the="" load="" balance="" method="">

    If you use source-dest-ip as in my case, you can use this command:

    B (nxos) # sh port-channel - the balance of the charge-transfer interface port-channel ID vlan ID x.x.x.x y.y.y.y dst - ip, src - ip and it will show you something like this:

    Lack of params will be substituted by 0.

    Algorithm to balance the load on the switch: source-dest-ip
    crc8_hash: 109 port id coming out: EthernetX / Y  < this="" is="" what="" you="" are="" looking="" for="">
    Param (s) used to balance the load to calculate:
    DST - ip: y.y.y.y
    SRC - ip: x.x.x.x
    DST - mac: 0000.0000.0000
    CBC - mac: 0000.0000.0000

    For the blade, depends on which the active vNIC is, for the FEX, depends on pinning, based on the server is located in the blade slot.  Strange servers go through odd links and same servers through the same ports.

    Remember to rate helpful answers.

    -Kenny

  • SH cdp neighbors port-channel command

    Hello

    I have a strange problem with the command sh cdp neighbors port-channel on my 3750 and 4500switches.

    When I execute the command ' sh cdp neighbors port-channel. I don't see my say on this interface.

    The command 'sh cdp nei' with the port-channel works very well and shows all my neighbors.

    switch #sh cdp neighbors port-channel 1

    Ability code: R - router, T - bridge Trans, B - road Source bridge
    S switch, H - host, I - IGMP, r - Repeater, P - phone.
    D / remote, C - AEVC, M - two port Mac relay

    Device ID Local Intrfce Holdtme Port platform capability ID

    switch #sh ether summary
    Flags: - Low P - D bundled in port-channel
    I have - autonomous s - suspended
    H Eve (LACP only)
    R - Layer 3 S - Layer2
    U - running f - cannot allocate an aggregator

    M - don't use, minimum contacts not satisfied
    u - unfit to tied selling
    w waiting to be aggregated
    d default port

    Number of channels: 1

    Number of aggregators: 2

    Protocol for the Port-Channel port group
    ------+-------------+-----------+-----------------------------------------------
    1 Po1 (SU) LACP Gi1/0/1 (P) article gi1/0/2 P)

    I tried the command on multiple versions of IOS, but always the same question. When I try the command on a 6506-E, it works fine...

    This ordering platform is connected?

    SWITCH2 # sh etherchannel summary
    Flags: - Low P - D bundled in port-channel
    I have - autonomous s - suspended
    H Eve (LACP only)
    R - Layer 3 S - Layer2
    U - N running - is not in service, no aggregation
    f cannot allocate an aggregator

    M not in use, no aggregation due to minimum links has not met
    m don't use, port do not associate due to not meeting minimum links
    u - unfit to tied selling
    d default port

    w waiting to be aggregated
    Number of channels: 7
    Number of aggregators: 7

    Protocol for the Port-Channel port group
    ------+-------------+-----------+-----------------------------------------------
    1 Po1 (SU) LACP Gi1/1 (P) Gi1/2 (P)
    ...

    SWITCH2 #sh cdp nei port-channel 1
    Ability code: R - router, T - bridge Trans, B - road Source bridge
    S switch, H - host, I - IGMP, r - Repeater, P - phone

    Device ID Local Intrfce Holdtme Port platform capability ID
    switch to Gig 1 / 2 123 S I Gig 1/0/1
    switch to Gig 1 / 1 123 S I Gig 1/0/2

    Thank you

    Best regards

    Joris

    Hi Joris,

    It is a known problem and is documented as a cosmetic bug internal. Logically speaking, CDP is not supported on etherchannel interfaces and 'sh cdp port-channel' command should not be available.

    The platform of 6500, although the "port channel show cdp neighbor" returns the result, it's just for convenience and does not mean that the CDP is supported on the port channels. In fact, if you try to enable CDP on port-channel on 6500, it generates an error:

    PO1 #int 6500 (config)

    6500(Config-if) #cdp en

    % CDP is not supported on this interface, or for this encapsulation

    If you run "debug cdp events", you can see the packets exchanged on the physical interface rather than on the port-channel. Correct way is to check the neighborship of the cdp on the physical interfaces.

    See you soon,.

    Shashank

    Please rate if you find the content useful

  • Configure the public traffic network IP inside the internal network itself and not to the external network

    A server is now accessible from external network access using the IP and port in browser below http
    http://x.x.x.x:8080

    For the same, we have configured (static NAT) port forwarding in cisco security 1905.

    The application is also accessible via IP and the internal network port internal (ie. http://y.y.y.y:8080)

    Is there a way I can configure my 1905 Cisco as well as internal network (ie. machine B) I can access the application using the IP and the public port and not with the IP address internal? From now on, I'm not able to do the same.

    The current configurations are as follows:
    access-list 1 permit y.y.y.0 0.0.0.255
    IP nat inside source list 1 interface GigabitEthernet0/0 overload
    IP nat inside source tcp static y.y.y.y 8080 interface GigabitEthernet0/0 8080

    Hello

    You can try Domainless Nat.

    no nat ip within the source list 1 interface GigabitEthernet0/0 overload
    no nat inside source tcp ip static y.y.y.y 8080 interface GigabitEthernet0/0 8080

    int gig0/0
    no nat inside ip
    activate nat IP

    int gig0/1
    no nat inside ip
    activate nat IP

    IP nat source list 1 interface GigabitEthernet0/0 overload
    interface IP nat source tcp static y.y.y.y 8080 GigabitEthernet0/0 8080

    RES

    Paul

  • ASA 5505 - remote access VPN to access various internal networks

    Hi all

    A customer has an ASA 5505 with a remote access vpn. They are moving their internal network to a new regime and that you would be the users who come on the vpn to access the existing and new networks. Currently can only access the existing. When users connect to access remote vpn, the asa gave them the address 192.168.199.x. The current internal network is 200.190.1.x and that they would reach their new network of 10.120.110.x.

    Here is the config:

    :

    ASA Version 8.2 (5)

    !

    ciscoasa hostname

    enable encrypted password xxx

    XXX encrypted passwd

    names of

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 200.190.1.15 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    IP address 255.255.255.0 xxxxxxx

    !

    exec banner the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED

    connection of the banner the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED

    banner asdm the ACCESS NOT AUTHORIZED IS STRICTLY PROHIBITED

    passive FTP mode

    access extensive list ip 200.190.1.0 inside_access_in allow 255.255.255.0 any

    outside_access_in list extended access permit icmp any external interface

    access extensive list ip 192.168.199.0 outside_access_in allow 255.255.255.192 host 10.120.110.0

    Standard access list MD_IPSEC_Tun_Gp_splitTunnelAcl allow 200.190.1.0 255.255.255.0

    MD_IPSEC_Tun_Gp_splitTunnelAcl list standard access allowed host 10.120.110.0

    access extensive list ip 200.190.1.0 inside_nat0_outbound allow 255.255.255.0 192.168.199.0 255.255.255.192

    inside_nat0_outbound list extended access allowed host ip 10.120.110.0 192.168.199.0 255.255.255.192

    pager lines 24

    Enable logging

    asdm of logging of information

    Within 1500 MTU

    Outside 1500 MTU

    mask 192.168.199.10 - 192.168.199.50 255.255.255.0 IP local pool Remote_IPSEC_VPN_Pool

    IP verify reverse path to the outside interface

    ICMP unreachable rate-limit 1 burst-size 1

    ICMP allow any inside

    ICMP allow all outside

    don't allow no asdm history

    ARP timeout 14400

    Global 1 interface (outside)

    NAT (inside) 0-list of access inside_nat0_outbound

    NAT (inside) 1 200.190.1.0 255.255.255.0

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Route outside 0.0.0.0 0.0.0.0 190.213.43.1 1

    Route inside 10.120.110.0 255.255.255.0 200.190.1.50 1

    Route inside 192.168.50.0 255.255.255.0 200.190.1.56 1

    Route inside 192.168.60.0 255.255.255.0 200.190.1.56 1

    Timeout xlate 03:00

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    http server enable 10443

    http server idle-timeout 5

    Server of http session-timeout 30

    HTTP 200.190.1.0 255.255.255.0 inside

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown cold start

    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac

    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac

    life crypto ipsec security association seconds 28800

    Crypto ipsec kilobytes of life - safety 4608000 association

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP

    outside_map interface card crypto outside

    Crypto ca trustpoint _SmartCallHome_ServerCA

    Configure CRL

    Crypto ca certificate chain _SmartCallHome_ServerCA

    certificate ca 6ecc7aa5a7032009b8cebcf4e952d491

    (omitted)

    quit smoking

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    Crypto isakmp nat-traversal 3600

    Telnet timeout 5

    SSH 200.190.1.0 255.255.255.0 inside

    SSH timeout 5

    SSH version 2

    Console timeout 5

    dhcpd outside auto_config

    !

    a basic threat threat detection

    scanning-threat shun threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    allow outside

    internal MD_SSL_Gp_Pol group strategy

    attributes of Group Policy MD_SSL_Gp_Pol

    VPN-tunnel-Protocol webvpn

    WebVPN

    list of URLS no

    disable the port forward

    hidden actions no

    disable file entry

    exploration of the disable files

    disable the input URL

    internal MD_IPSEC_Tun_Gp group strategy

    attributes of Group Policy MD_IPSEC_Tun_Gp

    value of banner welcome to remote VPN

    VPN - connections 1

    VPN-idle-timeout 5

    Protocol-tunnel-VPN IPSec webvpn

    Split-tunnel-policy tunnelspecified

    value of Split-tunnel-network-list MD_IPSEC_Tun_Gp_splitTunnelAcl

    the address value Remote_IPSEC_VPN_Pool pools

    WebVPN

    value of the RDP URL-list

    attributes of username (omitted)

    VPN-group-policy MD_IPSEC_Tun_Gp

    type of remote access service

    type tunnel-group MD_SSL_Profile remote access

    attributes global-tunnel-group MD_SSL_Profile

    Group Policy - by default-MD_SSL_Gp_Pol

    type tunnel-group MD_IPSEC_Tun_Gp remote access

    attributes global-tunnel-group MD_IPSEC_Tun_Gp

    address pool Remote_IPSEC_VPN_Pool

    Group Policy - by default-MD_IPSEC_Tun_Gp

    IPSec-attributes tunnel-group MD_IPSEC_Tun_Gp

    pre-shared key *.

    !

    !

    context of prompt hostname

    : end

    The following ACL and NAT exemption ACL split tunnel is incorrect:

    MD_IPSEC_Tun_Gp_splitTunnelAcl list standard access allowed host 10.120.110.0

    inside_nat0_outbound list extended access allowed host ip 10.120.110.0 192.168.199.0 255.255.255.192

    It should have been:

    Standard access list MD_IPSEC_Tun_Gp_splitTunnelAcl allow 10.120.110.0 255.255.255.0

    access extensive list ip 10.120.110.0 inside_nat0_outbound allow 255.255.255.0 192.168.199.0 255.255.255.192

    Then 'clear xlate' and reconnect with the VPN Client.

    Hope that helps.

  • AnyConnect users can access internal network

    Hello!

    Just sat up a new Anyconnect VPN solution for a customer. It works almost perfect.

    Anyconnect users can reach the internal network storage. The anyconnect users can access the internet, but nothing on the network internal.

    (Deleted all the passwords and public IP addresses)

    ASA 4,0000 Version 1

    !

    ciscoasa hostname

    names of

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    IP 192.168.9.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    IP address

    !

    passive FTP mode

    DNS domain-lookup outside

    DNS server-group DefaultDNS

    Server name 213.80.98.2

    Server name 213.80.101.3

    network obj_any object

    subnet 0.0.0.0 0.0.0.0

    access-list SHEEP extended ip 192.168.9.0 allow 255.255.255.0 192.168.9.0 255.255.255.0

    AnyConnect_Client_Local_Print deny ip extended access list a whole

    AnyConnect_Client_Local_Print list extended access permit tcp any any eq lpd

    Note AnyConnect_Client_Local_Print of access list IPP: Internet Printing Protocol

    AnyConnect_Client_Local_Print list extended access permit tcp any any eq 631

    print the access-list AnyConnect_Client_Local_Print Note Windows port

    AnyConnect_Client_Local_Print list extended access permit tcp any any eq 9100

    access-list AnyConnect_Client_Local_Print mDNS Note: multicast DNS protocol

    AnyConnect_Client_Local_Print list extended access permit udp any host 224.0.0.251 eq 5353

    AnyConnect_Client_Local_Print of access list LLMNR Note: link Local Multicast Name Resolution protocol

    AnyConnect_Client_Local_Print list extended access permit udp any host 224.0.0.252 eq 5355

    Note access list TCP/NetBIOS protocol AnyConnect_Client_Local_Print

    AnyConnect_Client_Local_Print list extended access permit tcp any any eq 137

    AnyConnect_Client_Local_Print list extended access udp allowed any any eq netbios-ns

    pager lines 24

    Enable logging

    logging of debug asdm

    Within 1500 MTU

    Outside 1500 MTU

    mask 192.168.9.50 - 192.168.9.80 255.255.255.0 IP local pool SSLClientPool

    ICMP unreachable rate-limit 1 burst-size 1

    don't allow no asdm history

    ARP timeout 14400

    NAT (inside, outside) source Dynamics one interface

    !

    network obj_any object

    NAT dynamic interface (indoor, outdoor)

    Route outside 0.0.0.0 0.0.0.0 1

    Timeout xlate 03:00

    Pat-xlate timeout 0:00:30

    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00

    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00

    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    Floating conn timeout 0:00:00

    dynamic-access-policy-registration DfltAccessPolicy

    identity of the user by default-domain LOCAL

    AAA authentication enable LOCAL console

    AAA authentication http LOCAL console

    LOCAL AAA authentication serial console

    the ssh LOCAL console AAA authentication

    AAA authentication LOCAL telnet console

    Enable http server

    http 192.168.9.0 255.255.255.0 inside

    http 0.0.0.0 0.0.0.0 inside

    http 0.0.0.0 0.0.0.0 outdoors

    No snmp server location

    No snmp Server contact

    Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start

    Telnet timeout 5

    SSH timeout 5

    SSH group dh-Group1-sha1 key exchange

    Console timeout 0

    dhcpd outside auto_config

    !

    dhcpd address 192.168.9.2 - 192.168.9.33 inside

    dhcpd ip interface 192.168.9.1 option 3 inside

    !

    a basic threat threat detection

    Statistics-list of access threat detection

    no statistical threat detection tcp-interception

    WebVPN

    allow outside

    AnyConnect image disk0:/anyconnect-win-2.5.3046-k9.pkg 1

    AnyConnect enable

    tunnel-group-list activate

    internal SSLClitentPolicy group strategy

    internal SSLClientPolicy group strategy

    attributes of Group Policy SSLClientPolicy

    value of server DNS 192.168.9.5

    client ssl-VPN-tunnel-Protocol

    the address value SSLClientPool pools

    attributes of Group Policy DfltGrpPolicy

    VPN-tunnel-Protocol ikev1, ikev2 ssl clientless ssl ipsec l2tp client

    VPN Tunnel-group type remote access

    type tunnel-group SSLClientProfile remote access

    attributes global-tunnel-group SSLClientProfile

    Group Policy - by default-SSLClientPolicy

    tunnel-group SSLClientProfile webvpn-attributes

    enable SSLVPNClient group-alias

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    type of policy-card inspect dns preset_dns_map

    parameters

    maximum message length automatic of customer

    message-length maximum 512

    Policy-map global_policy

    class inspection_default

    inspect the preset_dns_map dns

    inspect the ftp

    inspect h323 h225

    inspect the h323 ras

    inspect the rsh

    inspect the rtsp

    inspect esmtp

    inspect sqlnet

    inspect the skinny

    inspect sunrpc

    inspect xdmcp

    inspect the sip

    inspect the netbios

    inspect the tftp

    Review the ip options

    !

    global service-policy global_policy

    context of prompt hostname

    no remote anonymous reporting call

    Cryptochecksum:6a58e90dc61dfbf7ba15e059e5931609

    : end

    Looks like you got the permit vpn sysopt disable to enable:

    Sysopt connection permit VPN

    Also remove the dynamic NAT depending on whether you have already configured under the NAT object:

    No source (indoor, outdoor) nat Dynamics one interface

    Then 'clear xlate' once again and let us know if it works now.

  • VPN client without access to the internal network

    Hi all

    I try to get IPsec VPN clients talk to my internal network.  Can ping the IP address of internal port, but not the bridge beyond the period of INVESTIGATION, or all the resources on the internal network.

    Thoughts?

    Hello Tony

    You need to check on the following things

    1. Split tunnel network

    2. "no nat" split tunnel network

    What is a network or production test (I hope that the customer have the right configuration of bridge)

    Also, if possible please post your config for a better understanding

    concerning

    Harish

Maybe you are looking for

  • DVD player has stopped writing DVD on my Satellite 5200 801

    Quick question that I hope someone knows the answer to. My DVD player stopped earlier for DVD writing (several relocations of system have proved that it is the reader and not a pilot/conflict error) so I put the hand on another drive. Fitting was eas

  • How do components look as a whole instead composed of several elements?

    Here's what I mean. For example, I select CMOS 4011 and I offer myself to place 4 elements separate nand. Is there a way to show the entire 'body '?

  • LabVIEW 9.0f2

    Installation of LabVIEW 9.0 software in the third quarter of 2009 was a success and I was able to run any version of LabVIEW v7.1 for v8.6.1 and new version 9.0.  I installed the software from the fourth quarter of 2009 and the f2 software and now I

  • HP Envy 17-J005tx

    I had the laptop for a little more, perhaps less than a year and around left hand side of the laptop where the hinge is for the screen, when I open and close the laptop, only the lower part of the open tire case. It seems to be around the vent GFX ca

  • Cisco ASA 5505 VPN Site to Site

    Hi all First post on the forums. I have worked with Cisco ASA 5505 for a few months and I recently bought a 2nd ASA to implement tunnel VPN Site to Site. It seems so simple in the number of videos watched on the internet. But when I did he surprise i