Lost remote access to the internal network after upgarding PIX to 7.0
I improved our box of PIX 515E Cisco to release 6.3 7.0 (5) and lost connectivity outside of the internal servers through a VPN connection. Any ideas as to why or how this happened?
If you use the split tunneling, this is probably the question.
Is the bug id: CSCeh69389
This Bug says:
When you upgrade a PIX 6.x to 7.0, if split tunneling is underway
used for remote access clients, then the conversion of config
process will not convert the list of split tunnel command, because
the ACL of splitting 6.x tunnel was allowed to be of type 'expanded '.
whereas in 7.0 the ACL must be ' standard '.
To solve the problem, take the extended ACL and manually convert it to a
Standard ACL, specifying the networks you want encrypted. Times
the new ACL is in the config, it must be applied under the
Group Policy.
EX:
SplitTunnel list standard access allowed 10.1.1.0 255.255.255.0
internal RemoteAccess group strategy
Group Policy attributes RemoteAccess
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list SplitTunnel
Tags: Cisco Security
Similar Questions
-
Cisco vpn client to connect but can not access to the internal network
Hi all
I have a VPN configured on cisco 5540. My vpn was working fine, but suddenly there is a question that the cisco vpn client to connect but can not access to the internal network
Any help would be much appreciated.
Hi Samir,
I suggest that you go to the ASA and check the configuration to make sure that it complies with the requirements according to the reference below link:
http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805734ae.shtml
(The link above includes split tunneling, but this is just an option.
Please paste the output of "sh cry ipsec his" here so that we can check if phase 2 is properly trained. I would say as you go to IPSEC vpn client on your PC and check increment in packets sent and received in the window 'status '.
Let me know if this can help,
See you soon,.
Christian V
-
VPN client without access to the internal network
Hi all
I try to get IPsec VPN clients talk to my internal network. Can ping the IP address of internal port, but not the bridge beyond the period of INVESTIGATION, or all the resources on the internal network.
Thoughts?
Hello Tony
You need to check on the following things
1. Split tunnel network
2. "no nat" split tunnel network
What is a network or production test (I hope that the customer have the right configuration of bridge)
Also, if possible please post your config for a better understanding
concerning
Harish
-
Cisco ASA 5505 VPN L2TP cannot access the internal network
Hello
I'm trying to configure Cisco VPN L2TP to my office. After a successful login, I can't access the internal network.
Can you jhelp me to find the problem?
I have Cisco ASA:
within the network - 192.168.1.0
VPN - 192.168.168.0 network
I have the router to 192.168.1.2 and I cannot ping or access this router.
Here is my config:
ASA Version 8.4 (3)
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP 198.X.X.A 255.255.255.248
!
passive FTP mode
permit same-security-traffic intra-interface
the net-all purpose network
subnet 0.0.0.0 0.0.0.0
network vpn_local object
192.168.168.0 subnet 255.255.255.0
network inside_nw object
subnet 192.168.1.0 255.255.255.0
outside_access_in list extended access permit icmp any any echo response
outside_access_in list extended access deny ip any any newspaper
pager lines 24
Enable logging
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
IP local pool sales_addresses 192.168.168.1 - 192.168.168.254
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
NAT dynamic interface of net-all source (indoor, outdoor)
NAT (inside, outside) source inside_nw destination inside_nw static static vpn_local vpn_local
NAT (exterior, Interior) source vpn_local destination vpn_local static static inside_nw inside_nw-route search
!
network vpn_local object
dynamic NAT interface (outdoors, outdoor)
network inside_nw object
NAT dynamic interface (indoor, outdoor)
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 198.X.X.B 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
AAA authentication enable LOCAL console
the ssh LOCAL console AAA authentication
AAA authentication http LOCAL console
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
IKEv1 crypto ipsec transform-set my-transform-set-ikev1 esp-3des esp-sha-hmac
transport in transform-set my-transform-set-ikev1 ikev1 crypto ipsec mode
Crypto-map Dynamics dyno 10 set transform-set my-transformation-set-ikev1 ikev1
card crypto 20-isakmp ipsec vpn Dynamics dyno
vpn outside crypto map interface
Crypto isakmp nat-traversal 3600
Crypto ikev1 allow outside
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH 192.168.1.0 255.255.255.0 inside
SSH timeout 30
Console timeout 0
management-access inside
dhcpd address 192.168.1.5 - 192.168.1.132 inside
dhcpd dns 75.75.75.75 76.76.76.76 interface inside
dhcpd allow inside
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal sales_policy group policy
attributes of the strategy of group sales_policy
Server DNS 75.75.75.75 value 76.76.76.76
Protocol-tunnel-VPN l2tp ipsec
user name-
user name-
attributes global-tunnel-group DefaultRAGroup
address sales_addresses pool
Group Policy - by default-sales_policy
IPSec-attributes tunnel-group DefaultRAGroup
IKEv1 pre-shared-key *.
tunnel-group DefaultRAGroup ppp-attributes
ms-chap-v2 authentication
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:5d1fc9409c87ecdc1e06f06980de6c13
: end
Thanks for your help.
You must test with 'real' traffic on 192.168.1.2 and if you use ping, you must add icmp-inspection:
Policy-map global_policy
class inspection_default
inspect the icmp
--
Don't stop once you have upgraded your network! Improve the world by lending money to low-income workers:
http://www.Kiva.org/invitedBy/karsteni -
VPN IS CONNECTED BUT CANNOT ACCESS THE INTERNAL NETWORK
I tried to set up a simple customer vpn using this document
VPN IS CONNECTED BUT CANNOT ACCESS THE INTERNAL NETWORK BEHIND "RA"...
6.3 (5) PIX version
interface ethernet0 car
Auto interface ethernet1
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
activate the encrypted password of VmHKIhnF4Gs5AWk3
VmHKIhnF4Gs5AWk3 encrypted passwd
hostname VOIPLABPIX
domain voicelab.com
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol they 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list 101 permit ip 172.10.2.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 101 permit ip 172.10.1.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 102 permit ip 172.10.2.0 255.255.255.0 172.10.3.0 255.255.255.0
access-list 102 permit ip 172.10.1.0 255.255.255.0 172.10.3.0 255.255.255.0
pager lines 24
Outside 1500 MTU
Within 1500 MTU
IP address outside 208.x.x.11 255.255.255.0
IP address inside 172.10.2.2 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
IP local pool voicelabpool 172.10.3.100 - 172.10.3.254
history of PDM activate
ARP timeout 14400
NAT (inside) - 0 102 access list
Route outside 0.0.0.0 0.0.0.0 208.x.x.11 1
Route inside 172.10.1.0 255.255.255.0 172.10.2.1 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
AAA-server GANYMEDE + 3 max-failed-attempts
AAA-server GANYMEDE + deadtime 10
RADIUS Protocol RADIUS AAA server
AAA-server RADIUS 3 max-failed-attempts
AAA-RADIUS deadtime 10 Server
AAA-server local LOCAL Protocol
Enable http server
http 172.0.0.0 255.0.0.0 inside
http 0.0.0.0 0.0.0.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set esp-aes-256 trmset1, esp-sha-hmac
Crypto-map dynamic map2 10 set transform-set trmset1
map map1 10 ipsec-isakmp crypto dynamic map2
client authentication card crypto LOCAL map1
map1 outside crypto map interface
ISAKMP allows outside
ISAKMP identity address
part of pre authentication ISAKMP policy 10
ISAKMP policy 10 encryption aes-256
ISAKMP policy 10 sha hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
vpngroup address voicelabpool pool cuclab
vpngroup dns 204.x.x.10 Server cuclab
vpngroup cuclab by default-field voicelab.com
vpngroup split tunnel 101 cuclab
vpngroup idle 1800 cuclab-time
vpngroup password cuclab *.
Telnet timeout 5
SSH 208.x.x.11 255.255.255.255 outside
SSH 0.0.0.0 0.0.0.0 outdoors
SSH 172.10.1.2 255.255.255.255 inside
SSH timeout 60
Console timeout 0
username labadmin jNEF0yoDIDCsaoVQ encrypted password privilege 2
Terminal width 80
Cryptochecksum:b03a349e1ac9e6022432523bbb54504b
: end
Try to turn on NAT - T
PIX (config) #isakmp nat-traversal 20
http://www.Cisco.com/en/us/products/ps6120/products_tech_note09186a00807e0aca.shtml#Solution1
HTH
-
After that Windows 7 conclusion "No Internet access" in the wireless network?
I have a USB wireless network card installed in my office. All judging by the "connected network" showed, that he manages to connect to my wireless router, with I can't visit all websites due to "free Internet access". Only if I move my router where (almost) no wall blocking the path between my office and the router, will be solved the problem.
There is no problems surfing the Internet using my laptop (Windows XP) and the iPad, which also connect to the router.
I don't know what "No Internet access" while "Connected network" appears. To understand this, perhaps I should know what Windows 7 draws the conclusion "No Internet access" to the wireless network.
Thank you, everyone. I managed to figure out the problem last night. With this document that I found by Googling, http://www.usb.org/developers/whitepapers/327216.pdf, I tried to disconnect my DVD ROM USB plugged next to my wireless network card and found that this really WORKED, although the DVD ROM is USB 2.0 instead of 3.0.
In addition, as Shawn "Cmdr" Keene [MVP] said, I really need to I ignore the message "connected network". I ran the Ipconfig/all command frequently and found that sometimes the IP address of my wireless network card was no longer * 192.168.0 and the gateway, and the IP addresses of the DNS servers are null, even if the message "Connected network" remained all the time.
Hope this helps others who also have this problem, even though my English is not very good. : )
-
AppPortal error: remote access to the server is not enabled
I'm lost on this one.
Using the full client of AppPortal on a Win7 64 bit machine (version 8.0 of the customer)
Double-click the icon, download authenticated - published applications show, then double click a published application, the end user receives:
Remote access to the server is not enabled.
This happens only on a single computer
From this profile of users on the given computer I can MSTSC on the same server without problem
The error also follows the profiles on the given computer.
I have closed the Antivirus and Windows Firewall and still can not get this to work.
Even uninstalled and reinstalled the client.
From my computer, I can easily log in as this user.
Customers get automatically configured through an XML file.
After installation, I tested this laptop and he always gave the same error.
I ended up him to give me the phone for a few hours.
Uninstalled the version that was there (build 8.0.0.forget) and scoured the Windows Explorer for all left overs (a little here and there in user profiles and delete).
Then scoured the registry for expressions; vWorkspace, Quest Software and Provision Networks and remove all instances
Reinstalled all THE SUCCESS with the new connector to our servers (8.0.306.1427)
Thanks for the help Dave
-
AnyConnect ASA cannot access internet or internal network
After connecting through the client anyconnect 2.5, I can't access to my internal network or on the internet.
My host has address ip of 10.2.2.1/24 & gw:10.2.2.2
Here is the config
ASA Version 8.2 (5)
!
names of
name 172.16.1.200 EOCVLAN198 EOC VLAN 198 description
DNS-guard
!
interface Ethernet0/0
Description of the EOCATT7200-G0/2
switchport access vlan 2
!
interface Ethernet0/1
Description of EOC-Inside
switchport access vlan 198
!
!
interface Vlan1
Shutdown
No nameif
security-level 100
no ip address
!
interface Vlan2
nameif outside
security-level 0
IP 1.21.24.23 255.255.255.248
!
interface Vlan198
nameif inside
security-level 100
IP 172.16.1.1 255.255.255.0
!
passive FTP mode
clock timezone PST - 8
clock summer-time recurring PDT
DNS server-group DefaultDNS
domain riversideca.gov
outside_acl list extended access permit icmp any interface inside
outside_acl of access allowed any ip an extended list
inside_acl list extended access permit icmp any external interface
inside_acl extended access list allow interface icmp outside of any
inside_acl of access allowed any ip an extended list
access extensive list ip 172.16.1.0 inside_acl allow 255.255.255.0 any
inside_acl to access ip 10.0.0.0 scope list allow 255.0.0.0 all
access-list SHEEP extended ip 10.10.10.0 allow 255.255.255.0 10.2.2.0 255.255.255.0
access-list extended SHEEP allowed ip 10.2.2.0 255.255.255.0 10.10.10.0 255.255.255.0
IP 10.10.86.0 allow Access - list extended SHEEP 255.255.255.0 10.2.2.0 255.255.255.0
access-list extended SHEEP allowed ip 10.2.2.0 255.255.255.0 10.10.86.0 255.255.255.0
IP 10.80.1.0 allow Access - list extended SHEEP 255.255.255.0 10.2.2.0 255.255.255.0
tunnel of splitting allowed access list standard 172.16.1.0 255.255.255.0
allow a standard split-smart access-list
mask 10.2.2.1 - 10.2.2.50 255.255.255.0 IP local pool SSLClientPool
ASDM image disk0: / asdm - 649.bin
Global 1 interface (outside)
NAT (inside) 0 access-list SHEEP
NAT (inside) 1 172.16.1.0 255.255.255.0
NAT (inside) 1 0.0.0.0 0.0.0.0
Access-group outside_acl in interface outside
inside_acl access to the interface inside group
Route outside 0.0.0.0 0.0.0.0 1.21.24.23 1
Route inside 10.0.0.0 255.0.0.0 EOCVLAN198 1
Route inside 192.168.1.0 255.255.255.0 EOCVLAN198 1
Route inside 192.168.100.0 255.255.255.0 EOCVLAN198 1
Route inside 192.168.211.0 255.255.255.0 EOCVLAN198 1
WebVPN
allow outside
SVC disk0:/anyconnect-dart-win-2.5.3055-k9.pkg 1 image
enable SVC
tunnel-group-list activate
internal SSLCLientPolicy group strategy
attributes of Group Policy SSLCLientPolicy
value of 10.10.86.128 DNS server 10.10.86.129
VPN-tunnel-Protocol svc webvpn
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list split-smart value
yourname.tld value by default-field
the address value SSLClientPool pools
test P4ttSyrm33SV8TYp encrypted privilege 15 password username
username admin privilege 15 encrypted password fOGXfuUK21gWxwO6
type tunnel-group SSLClientProfile remote access
attributes global-tunnel-group SSLClientProfile
Group Policy - by default-SSLCLientPolicy
tunnel-group SSLClientProfile webvpn-attributes
enable EOCSSL group-alias
!
Global class-card class
class-map IPS
my class-map-ips-class
class-map test1
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
inspect the amp-ipsec
inspect the http
inspect the pptp
inspect the icmp
Global category
IPS inline fail-closed
class class by default
Decrement-ttl connection set
my-ips-policy policy-map
My ips-category
IPS overcrowding relief
!
global service-policy global_policy
p
ciscoasa # view the journal
Syslog logging: enabled
August 2, 2012 21:34:03: % ASA-6-302014: TCP connection disassembly 60662 for outside:10.2.2.1/62706 to outside:74.125.224.228/443 duration 0: 00:00 0 stream bytes is a loopback (test)
August 2, 2012 21:34:09: % ASA-6-302015: built connection UDP incoming 60664 for outside:10.2.2.1/49768 (10.2.2.1/49768) at inside:10.10.86.128/53 (10.10.86.128/53) (test)
August 2, 2012 21:34:09: % ASA-6-302014: TCP connection disassembly 60665 for outside:10.2.2.1/62706 to outside:74.125.224.228/443 duration 0: 00:00 0 stream bytes is a loopback (test)
August 2, 2012 21:34:10: % ASA-6-302015: built connection UDP incoming 60666 for outside:10.2.2.1/49768 (10.2.2.1/49768) at inside:10.10.86.129/53 (10.10.86.129/53) (test)
August 2, 2012 21:34:11: % 305013-5-ASA: rules asymmetrical NAT matched for flows forward and backward; Connection for tcp src outside:10.2.2.1/62708 dst inside:192.248.248.120/443 refused due to path failure reverse that of NAT
August 2, 2012 21:34:21: % ASA-6-302015: built connection UDP incoming 60668 for outside:10.2.2.1/50715 (10.2.2.1/50715) at inside:10.10.86.128/53 (10.10.86.128/53) (test)
August 2, 2012 21:34:21: % ASA-6-302015: built connection UDP incoming 60669 for outside:10.2.2.1/64333 (10.2.2.1/64333) at inside:10.10.86.128/53 (10.10.86.128/53) (test)
August 2, 2012 21:34:22: % ASA-6-302015: built connection UDP incoming 60670 for outside:10.2.2.1/50715 (10.2.2.1/50715) at inside:10.10.86.129/53 (10.10.86.129/53) (test)
August 2, 2012 21:34:22: % ASA-6-302016: UDP connection disassembly 60474 for outside:10.2.2.1/50367 to inside:10.10.86.128/53 duration 0:02:01 40 bytes (test)
August 2, 2012 21:34:22: % ASA-6-302016: UDP connection disassembly 60475 for outside:10.2.2.1/60325 to inside:10.10.86.128/53 duration 0:02:01 46 bytes (test)
August 2, 2012 21:34:22: % ASA-6-302015: built connection UDP incoming 60671 for outside:10.2.2.1/64333 (10.2.2.1/64333) at inside:10.10.86.129/53 (10.10.86.129/53) (test)
August 2, 2012 21:34:22: % ASA-6-302014: TCP connection disassembly 60672 for outside:10.2.2.1/62713 to outside:74.125.224.228/443 duration 0: 00:00 0 stream bytes is a loopback (test)
August 2, 2012 21:34:23: % ASA-6-302016: UDP connection disassembly 60477 for outside:10.2.2.1/50367 to inside:10.10.86.129/53 duration 0:02:01 40 bytes (test)
August 2, 2012 21:34:23: % ASA-6-302016: UDP connection disassembly 60479 for outside:10.2.2.1/60325 to inside:10.10.86.129/53 duration 0:02:01 46 bytes (test)
ciscoasa # display vpn-sessiondb svc
Session type: SVC
User name: test index: 21
10.2.2.1 assigned IP: public IP address: 76.95.186.82
Protocol: Clientless SSL-Tunnel-DTLS-Tunnel
License: SSL VPN
Encryption: AES128 RC4 hash: SHA1
TX Bytes: 13486 bytes Rx: 136791
Group Policy: Group SSLCLientPolicy Tunnel: SSLClientProfile
Connect time: 21:26:21 PDT Thursday, August 2, 2012
Duration: 0: 00: 08:00
Inactivity: 0 h: 00 m: 00s
Result of the NAC: unknown
Map VLANS: VLAN n/a: no
Tunnel of Split ACL is incorrect, you must add the internal LAN subnets, not pool VPN subnets and also add the correct ACL SHEEP.
If you try to access the 172.16.1.0/24 subnet, and then add the following code:
access-list extended SHEEP permit ip 172.16.1.0 255.255.255.0 10.2.2.0 255.255.255.0
Then the distribution next tunnel ACL:
list of access split-chip standard permit ip 172.16.1.0 255.255.255.0
Finally, try to see if you can ping 172.16.1.200 after adding the above.
-
Can connect to the IPSec VPN, but can not see the internal network
I have several users that can connect to our rooms of ussing IPSec VPN on a 5505. I have a user who can connect, but cannot see the internal network. This user is using DSL with a speedstream 4100. However, I have another user with the same configuration that can connect and see the internal network. Newspapers in ASDM show the link, but do not seem to show any errors trying to access internal. Any help will be greatly appreciated. Thank you, Bill.
Add...
ISAKMP nat-traversal crypto
-
A server is now accessible from external network access using the IP and port in browser below http
http://x.x.x.x:8080For the same, we have configured (static NAT) port forwarding in cisco security 1905.
The application is also accessible via IP and the internal network port internal (ie. http://y.y.y.y:8080)
Is there a way I can configure my 1905 Cisco as well as internal network (ie. machine B) I can access the application using the IP and the public port and not with the IP address internal? From now on, I'm not able to do the same.
The current configurations are as follows:
access-list 1 permit y.y.y.0 0.0.0.255
IP nat inside source list 1 interface GigabitEthernet0/0 overload
IP nat inside source tcp static y.y.y.y 8080 interface GigabitEthernet0/0 8080Hello
You can try Domainless Nat.
no nat ip within the source list 1 interface GigabitEthernet0/0 overload
no nat inside source tcp ip static y.y.y.y 8080 interface GigabitEthernet0/0 8080int gig0/0
no nat inside ip
activate nat IPint gig0/1
no nat inside ip
activate nat IPIP nat source list 1 interface GigabitEthernet0/0 overload
interface IP nat source tcp static y.y.y.y 8080 GigabitEthernet0/0 8080RES
Paul
-
I tried to go in advance and choose "Add TimeCapsule to the existing network", but it keeps defaulting to 'add a new network '.
without having to activate the internal networks?
"Add TimeCapsule to the existing network.
You cannot add a TC in an existing network, if there is.
You must configure the TC for the network.
It keeps default back to "add a new network.
So, it's OK... The TC is part of an existing network or makes a new.
You must connect to the TC network... either wireless or ethernet.
However, you can manually configure the TC simply plug ethernet for example.
See, cable using Time Capsule for Mac for backup only.
The same can be done for the wireless... but a TC is really the bad device for backups if you don't have a network... It's cheaper, faster and more reliable by using a USB key.
-
Client remote access VPN gets connected without access to the local network
: Saved
:
ASA 1.0000 Version 2
!
hostname COL-ASA-01
domain dr.test.net
turn on i/RAo1iZPOnp/BK7 encrypted password
i/RAo1iZPOnp/BK7 encrypted passwd
names of
!
interface GigabitEthernet0/0
nameif outside
security-level 0
IP 172.32.0.11 255.255.255.0
!
interface GigabitEthernet0/1
nameif inside
security-level 100
IP 192.9.200.126 255.255.255.0
!
interface GigabitEthernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/4
Shutdown
No nameif
no level of security
no ip address
!
interface GigabitEthernet0/5
nameif failover
security-level 0
192.168.168.1 IP address 255.255.255.0 watch 192.168.168.2
!
interface Management0/0
nameif management
security-level 0
192.168.2.11 IP address 255.255.255.0
!
passive FTP mode
DNS server-group DefaultDNS
domain dr.test.net
network of the RAVPN object
192.168.0.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.168.200.0_24 object
192.168.200.0 subnet 255.255.255.0
network of the NETWORK_OBJ_192.9.200.0_24 object
192.9.200.0 subnet 255.255.255.0
the inside_network object-group network
object-network 192.9.200.0 255.255.255.0
external network object-group
host of the object-Network 172.32.0.25
Standard access list RAVPN_splitTunnelAcl allow 192.9.200.0 255.255.255.0
access-list extended test123 permit ip host 192.168.200.1 192.9.200.190
access-list extended test123 permit ip host 192.9.200.190 192.168.200.1
access-list extended test123 allowed ip object NETWORK_OBJ_192.168.200.0_24 192.9.200.0 255.255.255.0
192.9.200.0 IP Access-list extended test123 255.255.255.0 allow object NETWORK_OBJ_192.9.200.0_24
pager lines 24
management of MTU 1500
Outside 1500 MTU
Within 1500 MTU
failover of MTU 1500
local pool RAVPN 192.168.200.1 - 192.168.200.254 255.255.255.0 IP mask
no failover
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 66114.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside, outside) source Dynamics one interface
NAT (it is, inside) static static source NETWORK_OBJ_192.9.200.0_24 destination NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.9.200.0_24
Route outside 0.0.0.0 0.0.0.0 172.32.0.2 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
the ssh LOCAL console AAA authentication
Enable http server
http 0.0.0.0 0.0.0.0 outdoors
http 0.0.0.0 0.0.0.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
Crypto ca trustpoint ASDM_TrustPoint0
Terminal registration
name of the object CN = KWI-COL-ASA - 01.dr.test .net, C = US, O = KWI
Configure CRL
Crypto ikev1 allow outside
IKEv1 crypto policy 10
authentication crack
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 20
authentication rsa - sig
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 30
preshared authentication
aes-256 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 40
authentication crack
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 50
authentication rsa - sig
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 60
preshared authentication
aes-192 encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 70
authentication crack
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 80
authentication rsa - sig
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 90
preshared authentication
aes encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 100
authentication crack
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 110
authentication rsa - sig
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 120
preshared authentication
3des encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 130
authentication crack
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 140
authentication rsa - sig
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 150
preshared authentication
the Encryption
sha hash
Group 2
life 86400
IKEv1 crypto policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet 192.9.200.0 255.255.255.0 inside
Telnet timeout 30
SSH 0.0.0.0 0.0.0.0 management
SSH 0.0.0.0 0.0.0.0 outdoors
SSH 66.35.45.128 255.255.255.192 outside
SSH 0.0.0.0 0.0.0.0 inside
SSH timeout 30
SSH version 2
Console timeout 0
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
allow outside
AnyConnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
AnyConnect enable
tunnel-group-list activate
attributes of Group Policy DfltGrpPolicy
internal RAVPN group policy
RAVPN group policy attributes
value of server WINS 192.9.200.164
value of 66.35.46.84 DNS server 66.35.47.12
VPN-filter value test123
Ikev1 VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value test123
Dr.kligerweiss.NET value by default-field
username test encrypted password xxxxxxx
username admin password encrypted aaaaaaaaaaaa privilege 15
vpntest Delahaye of encrypted password username
type tunnel-group RAVPN remote access
attributes global-tunnel-group RAVPN
address RAVPN pool
Group Policy - by default-RAVPN
IPSec-attributes tunnel-group RAVPN
IKEv1 pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
Review the ip options
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory 2
Subscribe to alert-group configuration periodic monthly 2
daily periodic subscribe to alert-group telemetry
aes encryption password
Cryptochecksum:b001e526a239af2c73fa56f3ca7667ea
: end
COL-ASA-01 #.
Here is a shot made inside interface which can help as well, I've tried pointing the front door inside the interface on the target device, but I think it was a switch without ip route available on this subject I think which is always send package back to Cisco within the interface
Test of Cape COLLAR-ASA-01 # sho | in 192.168.200
25: 23:45:55.570618 192.168.200.1 > 192.9.200.190: icmp: echo request
29: 23:45:56.582794 192.168.200.1.137 > 192.9.200.164.137: udp 68
38: 23:45:58.081050 192.168.200.1.137 > 192.9.200.164.137: udp 68
56: 23:45:59.583176 192.168.200.1.137 > 192.9.200.164.137: udp 68
69: 23:46:00.573517 192.168.200.1 > 192.9.200.190: icmp: echo request
98: 23:46:05.578110 192.168.200.1 > 192.9.200.190: icmp: echo request
99: 23:46:05.590057 192.168.200.1.137 > 192.9.200.164.137: udp 68
108: 23:46:07.092310 192.168.200.1.137 > 192.9.200.164.137: udp 68
115: 23:46:08.592468 192.168.200.1.137 > 192.9.200.164.137: udp 68
116: 23:46:10.580795 192.168.200.1 > 192.9.200.190: icmp: echo request
COL-ASA-01 #.
Any help or pointers greatly appreciated, I have do this config after a long interval on Cisco of the last time I was working it was all PIX so just need to expert eyes to let me know if I'm missing something.
And yes I don't have a domestic network host to test against, all I have is a switch that cannot route and bridge default ip helps too...
Hello
The first thing you should do to avoid problems is to change the pool VPN to something else than the current LAN they are not really directly connected in the same network segment.
You can try the following changes
attributes global-tunnel-group RAVPN
No address RAVPN pool
no mask RAVPN 192.168.200.1 - 192.168.200.254 255.255.255.0 ip local pool
local pool RAVPN 192.168.201.1 - 192.168.201.254 255.255.255.0 IP mask
attributes global-tunnel-group RAVPN
address RAVPN pool
no nat (it is, inside) static source NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 static destination NETWORK_OBJ_192.9.200.0_24 NETWORK_OBJ_192.9.200.0_24
In the above you first delete the VPN "tunnel-group" Pool and then delete and re-create the VPN pool with another network and then insert the same "tunnel-group". NEX will remove the current configuration of the NAT.
the object of the LAN network
192.168.200.0 subnet 255.255.255.0
network of the VPN-POOL object
192.168.201.0 subnet 255.255.255.0
NAT (inside, outside) 1 static source LAN LAN to static destination VPN-VPN-POOL
NAT configurations above adds the correct NAT0 configuration for the VPN Pool has changed. It also inserts the NAT rule to the Summit before the dynamic PAT rule you currently have. He is also one of the problems with the configurations that it replaces your current NAT configurations.
You have your dynamic PAT rule at the top of your NAT rules currently that is not a good idea. If you want to change to something else will not replace other NAT configurations in the future, you can make the following change.
No source (indoor, outdoor) nat Dynamics one interface
NAT source auto after (indoor, outdoor) dynamic one interface
NOTICE! PAT dynamic configuration change above temporarily interrupt all connections for users on the local network as you reconfigure the dynamic State PAT. So if you make this change, make sure you that its ok to still cause little reduced in the current internal users connections
Hope this helps
Let me know if it works for you
-Jouni
-
Need help to access the internal network via VPN on ASA5505 8.4 (1)
Recently, I upgraded my ASA5055 from 8.02 to 8.4 and since I have updated to the new version I can access my home network is no longer through the VPN. I can connect to the VPN with no problems however I can no longer ping or you connect to my network of 10.0. Someone would be kind enough to look at my config and tell me what needs to be added to make it work? In my old config, I had a statement of NAT for VPN that is no longer here.
I also wanted to configure WebVPN to work as well, and this is something that I've never been able to understand. Is it also possible that I can be on my 20.0 network and connect to the VPN and access 10.0 as well? When it is connected to my network of 20.0 I'm not received credentials to connect to the VPN. I would be grateful if someone can help out me. The major part of this is the first part of this question.
My configuration:
ASA Version 8.4 (1)
!
ASA5505 hostname
domain xxxxxxxx.dyndns.org
enable encrypted password xxxxxxxxxxxx
xxxxxxxxxxxxxxx encrypted passwd
names of
nameserver 192.168.10.2
Office of name 192.168.10.3
name Canon 192.168.10.5
name 192.168.10.6 mvix
name 192.168.10.7 xbox
name 192.168.10.8 dvr
name 192.168.10.9 bluray
name 192.168.10.10 lcd
name 192.168.10.11 mp620
name 192.168.10.12 kayla
name 192.168.1.1 asa5505
name 192.168.1.2 ap1
name 192.168.10.4 mvix2
name 192.168.10.13 lcd2
name 192.168.10.14 dvr2
!
interface Vlan1
nameif management
security-level 100
IP address asa5505 255.255.255.248
management only
!
interface Vlan2
0050.8db6.8287 Mac address
nameif outside
security-level 0
IP address dhcp setroute
!
interface Vlan10
nameif private
security-level 100
IP 192.168.10.1 255.255.255.224
!
interface Vlan20
nameif Public
security-level 100
IP 192.168.20.1 255.255.255.224
!
interface Ethernet0/0
Description pointing to WAN
switchport access vlan 2
!
interface Ethernet0/1
Uplink port Linksys 12 description
switchport access vlan 10
!
interface Ethernet0/2
Description Server 192.168.10.2/27
switchport access vlan 10
!
interface Ethernet0/3
Uplink Eth1 management description
!
interface Ethernet0/4
switchport access vlan 30
!
interface Ethernet0/5
switchport access vlan 30
!
interface Ethernet0/6
switchport access vlan 30
!
interface Ethernet0/7
Description of Cisco 1200 Access Point
switchport trunk allowed vlan 1,10,20
switchport trunk vlan 1 native
switchport mode trunk
!
Banner motd users only, all others must disconnect now!
boot system Disk0: / asa841 - k8.bin
passive FTP mode
clock timezone PST - 8
clock summer-time recurring PDT
DNS server-group DefaultDNS
domain xxxxxxx.dyndns.org
network object obj - 192.168.50.0
192.168.50.0 subnet 255.255.255.0
Server network objects
host 192.168.10.2
network object obj - 192.168.10.0
192.168.10.0 subnet 255.255.255.224
network object obj - 192.168.20.0
subnet 192.168.20.0 255.255.255.224
network server-01 object
host 192.168.10.2
network server-02 object
host 192.168.10.2
xbox network object
Home 192.168.10.7
xbox-01 network object
Home 192.168.10.7
xbox-02 network object
Home 192.168.10.7
xbox-03 network object
Home 192.168.10.7
xbox-04 network object
Home 192.168.10.7
network server-03 object
host 192.168.10.2
network server-04 object
host 192.168.10.2
network server-05 object
host 192.168.10.2
Desktop Network object
host 192.168.10.3
kayla network object
Home 192.168.10.12
Home_VPN_splitTunnelAcl list standard access allowed 192.168.10.0 255.255.255.224
outside_access_in list extended access permit tcp any any eq 3389
outside_access_in list extended access permit tcp any any eq 2325
outside_access_in list extended access permit tcp any eq ftp server object
outside_access_in list extended access permit tcp any any eq 5851
outside_access_in list extended access udp allowed any any eq 5850
outside_access_in list extended access permit tcp any any eq pptp
outside_access_in list extended access udp allowed any any eq syslog
outside_access_in list extended access udp allowed any any eq 88
outside_access_in list extended access udp allowed any any eq 3074
outside_access_in list extended access permit tcp any any eq 3074
outside_access_in list extended access permit tcp any any eq field
outside_access_in list extended access udp allowed any any eq field
outside_access_in list extended access permitted tcp everything any https eq
outside_access_in list extended access permit tcp any eq ssh server object
outside_access_in list extended access permit tcp any any eq 2322
outside_access_in list extended access permit tcp any any eq 5900
outside_access_in list extended access permit icmp any any echo response
outside_access_in list extended access permit icmp any any source-quench
outside_access_in list extended access allow all unreachable icmp
outside_access_in list extended access permit icmp any one time exceed
outside_access_in list extended access udp allowed any any eq 5852
KaileY_splitTunnelAcl list standard access allowed 192.168.10.0 255.255.255.224
pager lines 24
Enable logging
timestamp of the record
exploitation forest-size of the buffer of 36000
logging warnings put in buffered memory
recording of debug trap
asdm of logging of information
address record [email protected] / * /
exploitation forest-address recipient [email protected] / * / level of errors
Management Server host forest
MTU 1500 management
Outside 1500 MTU
MTU 1500 private
MTU 1500 Public
local pool IPPOOL 192.168.50.2 - 192.168.50.10 255.255.255.0 IP mask
local pool VPN_POOL 192.168.100.2 - 192.168.100.10 255.255.255.0 IP mask
no failover
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow all outside
ASDM image disk0: / asdm - 641.bin
don't allow no asdm history
ARP timeout 14400
!
Server network objects
NAT (private, foreign) static tcp ftp 5851 service interface
network object obj - 192.168.10.0
NAT (private, foreign) dynamic interface
network object obj - 192.168.20.0
NAT (outside) dynamic public interface
network server-01 object
NAT (private, outside) interface static 2325 2325 tcp service
network server-02 object
NAT (private, outside) interface static udp syslog syslog service
xbox network object
NAT (private, outside) interface static service udp 88 88
xbox-01 network object
NAT (private, outside) interface static service udp 3074-3074
xbox-02 network object
NAT (private, outside) interface static service tcp 3074-3074
xbox-03 network object
NAT (private, outside) interface static tcp domain domain service
xbox-04 network object
field of the udp NAT (private, foreign) of the static interface function
network server-03 object
NAT (private, outside) interface static tcp https https service
network server-04 object
Static NAT (private, outside) interface service tcp ssh 2322
network server-05 object
NAT (private, outside) interface static 5900 5900 tcp service
Desktop Network object
NAT (private, outside) interface static service tcp 3389 3389
kayla network object
NAT (private, outside) interface static service udp 5852 5852
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
AAA authentication enable LOCAL console
AAA authentication http LOCAL console
the ssh LOCAL console AAA authentication
AAA authentication LOCAL telnet console
Enable http server
http 192.168.1.0 255.255.255.248 management
redirect http outside 80
location of SNMP server on the Office floor
SNMP Server contact [email protected] / * /
Community SNMP-server
Server enable SNMP traps snmp authentication linkup, linkdown cold start
No vpn sysopt connection permit
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto-map dynamic outside_dyn_map pfs set 20 Group1
Crypto-map dynamic outside_dyn_map 20 set transform-set ESP-3DES-SHA ikev1
life together - the association of security crypto dynamic-map outside_dyn_map 20 28800 seconds
Crypto-map dynamic outside_dyn_map 20 kilobytes of life together - the association of safety 4608000
map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map
outside_map interface card crypto outside
Crypto ikev1 allow outside
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH 192.168.1.0 255.255.255.248 management
SSH 0.0.0.0 0.0.0.0 outdoors
SSH timeout 30
Console timeout 30
access to administration management
dhcpd dns 24.205.1.14 66.215.64.14
dhcpd ping_timeout 750
dhcpd field xxxxxxxx.dyndns.org
dhcpd outside auto_config
!
dhcpd manage 192.168.1.4 - 192.168.1.5
dhcpd enable management
!
dhcpd address private 192.168.10.20 - 192.168.10.30
enable private dhcpd
!
dhcpd 192.168.20.2 public address - 192.168.20.30
dhcpd enable Public
!
a basic threat threat detection
statistical threat detection port
Statistical threat detection Protocol
Statistics-list of access threat detection
no statistical threat detection tcp-interception
Server NTP 192.43.244.18
Server NTP 129.6.15.28
WebVPN
internal Home_VPN group strategy
attributes of Group Policy Home_VPN
value of 8.8.8.8 DNS Server 4.2.2.2
Ikev1 VPN-tunnel-Protocol without ssl-client
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list Home_VPN_splitTunnelAcl
value by default-field www.xxxxxx.com
the address value IPPOOL pools
WebVPN
the value of the URL - list ClientlessBookmark
political group internal kikou
group attributes political kikou
value of 8.8.8.8 DNS Server 4.2.2.2
Ikev1 VPN-tunnel-Protocol
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list KaileY_splitTunnelAcl
XXXXXXX.dyndns.org value by default-field
username scottrog encrypted password privilege 0 xxxxxxxxxxxxxx
user_name john encrypted password privilege 0 xxxxxxxxxxxxxxx
username joek encrypted password privilege 0 xxxxxxxxxxxx
eostrike encrypted xxxxxxxxxxxx privilege 15 password username
username almostsi encrypted password privilege 0 xxxxxxxxxxxxxx
username ezdelarosa password xxxxxxxxxxxxxxencrypted privilege 0
type tunnel-group Home_VPN remote access
attributes global-tunnel-group Home_VPN
IPPOOL address pool
LOCAL authority-server-group
authorization-server-group (outside LOCAL)
Group Policy - by default-Home_VPN
authorization required
IPSec-attributes tunnel-group Home_VPN
IKEv1 pre-shared-key *.
type tunnel-group SSLClientProfile remote access
tunnel-group SSLClientProfile webvpn-attributes
enable SSLVPNClient group-alias
tunnel-group type ClientLESS remote access
tunnel-group kanazoé type remote access
attributes global-tunnel-group kanazoé
address VPN_POOL pool
by default-group-policy kikou
tunnel-group KaileY ipsec-attributes
IKEv1 pre-shared-key *.
by default-group Home_VPN tunnel-Group-map
!
!
context of prompt hostname
call-home
Profile of CiscoTAC-1
no active account
http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
email address of destination [email protected] / * /
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory
monthly periodicals to subscribe to alert-group configuration
daily periodic subscribe to alert-group telemetry
Cryptochecksum:438ed6084bb3dc956574b1ce83f52b86
: end
ASA5505 #.
Here are the declarations of NAT for your first question:
network object obj - 192.168.100.0
255.255.255.0 subnet 192.168.100.0
NAT (private, foreign) source static obj - 192.168.10.0 obj - 192.168.10.0 destination static obj - 192.168.50.0 obj - 192.168.50.0
NAT (private, foreign) source static obj - 192.168.10.0 obj - 192.168.10.0 destination static obj - 192.168.100.0 obj - 192.168.100.0
And 'clear xlate' after the above and that should fix your first question.
I would check your second question and get back to you shortly.
-
Access to the internal mail (Exchange) by centimeters remote VPN server
Hi all
I have a problem in the configuration of ASA 5510 to access my internal mail (Exchange) through remote access VPN server
one... I have set up my D-Link ADSL router to port before the SMPTP (25) & POP3 (110) to the external interface of ASA 5510 (192.168.5.101 255.255.255.0)
b. How can I configure ASA 5510 (using ASDM) to portforward (SMTP POP3 110 25) to my internal mail server with IP 192.168.50.2 255.255.255.0
c. my internal LAN network (192.168.50.0 255.255.255.0) is coordinated at 10.1.1.0 255.255.255.224 for vpn clients
d. my IP of mail server (192.168.50.2 255.255.255.0) will also be translated while clients are accessing content through remote VPN access
e.What IP (Exchange of IP of the server (192.168.50.2) do I have to set up in Microsoft Outlook (incoming & outgoing mail server), vpn clients receive using a NAT IP 10.1.1.10
Here's my configuration details of access remote vpn
: Saved
: Written by enable_15 at 13:42:51.243 UTC Thursday, November 27, 2008
!
ASA Version 7.0 (6)
!
hostname xxxx
domain xxxx
enable the encrypted password xxxxx
XXXXX encrypted passwd
names of
DNS-guard
!
interface Ethernet0/0
nameif outside
security-level 0
IP 192.168.5.101 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
IP 192.168.50.101 255.255.255.0
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
!
interface Management0/0
nameif management
security-level 100
management only
IP 192.168.1.1 255.255.255.0
!
passive FTP mode
list of access inside the _nat0_outbound extended permits all ip 10.1.1.0 255.255.255.224
allow a standard vpn access list
outside_cryptomap_dyn_20 list of allowed ip extended access any 10.1.1.0 255.255.255.224
vpn-ip-pool 10.1.1.10 mask - 255.255.255.0 IP local pool 10.1.1.25
Global interface 10 (external)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 10 0.0.0.0 0.0.0.0
Route outside 0.0.0.0 0.0.0.0 192.168.5.1 (D-Link ADSL router LAN IP) 1
internal vpn group policy
attributes of vpn group policy
Split-tunnel-policy excludespecified
Split-tunnel-network-list value vpn
WebVPN
xxxxx xxxx of encrypted password privilege 0 username
attributes of username xxxxx
Strategy-Group-VPN vpn
WebVPN
ASDM image disk0: / asdm - 508.bin
don't allow no asdm history
ARP timeout 14400
Enable http server
http 192.168.1.0 255.255.255.0 management
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set ESP-3DES-SHA edes-esp esp-sha-hmac
Crypto-map dynamic outside_dyn_map 20 the value transform-set ESP-3DES-SHA
card outside_map 655535-isakmp ipsec crypto dynamic outside_dyn_map
outside_map interface card crypto outside
ISAKMP allows outside
part of pre authentication ISAKMP policy 10
ISAKMP policy 10 3des encryption
ISAKMP policy 10 sha hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
tunnel vpn ipsec-ra group type
VPN tunnel-group general attributes
ip vpn-pool address pool
Group Policy - by default-vpn
Tunnel vpn ipsec-attributes group
pre-shared-key *.
Telnet timeout 5
SSH timeout 5
Console timeout 0
management of 192.168.1.2 - dhcpd address 192.168.1.254
dhcpd lease 3600
dhcpd ping_timeout 50
enable dhcpd management
!
Policy-map global_policy
class inspection_default
inspect the dns-length maximum 512
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
!
global service-policy global_policy
: end
So can someone help me, how can I configure these tasks
You can without problem
-
ASA5505 can transfer clients to remote VPN access to the local network
I have currently ASA 5505 and 2911-router and I am trying to configure the VPN topology.
Can ASA5505 you transmit to remote VPN access clients LAN operated by another router?
These two cases are possible? :
(1) ASA 5505 and 2911-router are separate WAN interfaces, each connected directly to the ISP. But so can I connect an other interfaces LAN of ASA 5505 in a switch managed by 2911 router customers to distance-SSL-VPN to inject into the local network managed by the router?
(2) ASA 5505 is behind router-2911. May 2911 router address public ip or public ip address VPN-access attempts have directly be sent to ASA 5505 when there is only a single public ip address address available?
Long put short, ASA 5505 can inject its clients to remote-access-VPN as one of the hosts on the local network managed by 2911-router?
Thank you.I could help you more if you can explain the purpose of this configuration and connectivity between the router and ASA.
You can activate the reverse route on the dynamic plane on the SAA. The ASA will install a static route to the customer on the routing table. You can use a routing protocol to redistribute static routes to your switch on the side of LAN of the SAA.
Maybe you are looking for
-
When I try to view a PDF file, at the start, I get a transparent box and as soon as I expanded it, it turns into a solid black rectangle. I wonder if there are any add-on which will fix this problem. If I use IE, I have no problem.
-
Tecra Z50-to-17 t constantly freezes during shutdown
My new Toshiba Tecra Z50-to-17 t constantly crashes on shutdown. At first I thought that it could connect to the Cisco all lie, as it appeared in the event viewer several times.After I deleted it went well for a while, but now the problem occurred ag
-
Several problems with my computer crashing and virus infections.
E-mail address is removed from the privacy *. Problems of SOOOOOOOOOmany. VIRUS crashed all THE services of persons with DISABILITIES. I paid for Advancced SystemCare PRO 95) but it apparently not yet downloadable or EXPLOIT (AVANGATE iobig.com HEL
-
My email is hacked I have to delete it and the password
My email has been hacked. I installed a new account. You need to remove the old one and other relevant details that I must.
-
(Redirected) Disconnected and nothing solved... once again
It started about 3 months ago with Dell, trying to get my data I recorded using their software. They followed a few times with me to let me know, they had not been able to resolve the issue again, but then they just stopped to communicate. It's bee