Remote access ASA5510
Hello guys,.
I have to configure an ASA 5510 as server of remote access for Windows XP machines. I tried to configure L2TP and IPSec, but not worked. I was referred to a correct document by a member of this forum (appreciated), but it seems that XP machines do not like L2TP and they more readily accept PPTP. Someone can reffer me a document how to configure ASA5510 with PPTP remote access. I checked the unit and see no option to use PPTP instead of L2TP. Guys thank you very much in advance.
Kind regards
RVR
! - Identifies the encryption and hash IPsec algorithms
! - to be used by the game of transformation.
Crypto ipsec transform-set esp-3des esp-md5-hmac TRANS_ESP_3DES_MD5
! - Because the Windows 2000 L2TP/IPsec client uses IPsec transport mode,.
! - define the mode of transport.
! - The default is tunnel mode.
Crypto ipsec transform-set transit mode TRANS_ESP_3DES_MD5
! - Specifies the transformation affects to be used in a dynamic crypto map entry.
Crypto-map dynamic outside_dyn_map 20 game of transformation-TRANS_ESP_3DES_MD5
! - Requires a given crypto map entry to refer to a pre-existing
! - dynamic crypto map.
map outside_map 20-isakmp ipsec crypto dynamic outside_dyn_map
! - Apply a defined encryption card previously set on an external interface.
outside_map interface card crypto outside
crypto ISAKMP allow outside
Crypto isakmp nat-traversal 20
! - Specifies the protocol IKE Phase I parameters of strategy.
crypto ISAKMP policy 10
preshared authentication
3des encryption
md5 hash
Group 2
life 86400
! - Create a group of tunnel with the tunnel-group command, and specifies the local
! - name of the address pool used to assign the IP address to the client.
! - Associated with the AAA (VPN) server with the Group of the tunnel group.
attributes global-tunnel-group DefaultRAGroup
address clientVPNpool pool
Vpn server authentication group
! - Link the name of the group to the default tunnel
! - Tunnel group general attributes mode group.
Group Policy - by default-DefaultRAGroup
! - Use the command of tunnel group ipsec-attributes
! - to enter the mode of configuration of ipsec-attribute.
! - The value of the preshared key.
! - This key must match the key configured on the Windows machine.
IPSec-attributes tunnel-group DefaultRAGroup
pre-shared-key *.
. - Configure the PPP authentication with the type of authentication protocol
! - tunnel ppp-attributes group mode command.
tunnel-group DefaultRAGroup ppp-attributes
No chap authentication
ms-chap-v2 authentication
Tags: Cisco Security
Similar Questions
-
Remote access server problem ASA5510
Hello guys,.
I have a problem with ASA5510 configured as a remote access server. We use the client VPN in Windows XP. Look at the requirements I see no problem, but when I try to connect to the server it doesn't open the negotiation of VPN. I had the problem like this before, but at least I saw the traffic hitting the ASA. Now, I don't see anything hitting the device. I enclose the current configuration of the SAA. The VPN client on my laptop is configured correctly. Thank you in advance!
RVR
Hello
Happy to help and thanks for the note.
This command is not required, but 90% of deployment I've seen has this configured command and is the default value for the SAA. In a Word, what this command is open to IKE and IPSEC ports and also does not check ACL entering ASA for IPSEC traffic.
In case if you do not have this command enabled, you must configure inbound ACL to allow IKE, IPSEC and text clear remote access VPN traffic after IPSEC packets get decrypted on the SAA.
Kind regards
Arul
* Rate pls if it helps *.
-
ODA IP ASA when you browse the web via remote access vpn
Hi all
I was wondering if it is possible to configure an ASA5510 in a way to allow users remote access VPN use external IP of the ASA when browsing the web. So what I'm looking for is a solution to hide my IP address and use the IP address of the ASA, when browsing.
The firmware version of the ASA is 9.1 (6)
Thanks in advance
Hello
What you want to achieve is calles u-turn.
You must enable the feature allowed same-security-traffic intra-interface
For the configuration of the asa, here's the Cisco documentation (I don't copy paste on the post):
http://www.Cisco.com/c/en/us/support/docs/security/ASA-5500-x-series-NEX...
Thank you
PS: Please do not forget to rate and score as good response if this solves your problem
-
authentication 802. 1 x on cisco VPN for remote access
I'm on dial-up VPN (mobile VPN) on cisco ASA5510, now, I want to authenticate remote users via Microsoft IAS (Radius Standard) service. However, I couldn't get through the via protocol PEAP authentication process, and it seems that it only supports PAP that isn't safe.
Any suggestion on how to implement PEAP over VPN remote access?
Thank you
Hello
It may be useful.
Best regards.
Massimiliano.
-
Hello
I'm having a problem on the VPN routing.
The VPN client is connected correctly to ASA5510, but cannot access inside ASA and the Internet or another network. What I want to achieve is.
[email protected] / * / -> ASA5520 (public IP)-> Inside (172.16.1.0)
The VPN address pool uses 172.168.10.0 (I also tried 172.16.1.100 - 120 with the same network from the inside).
interface GigabitEthernet0/0
nameif outside
security-level 0
IP address a.a.a.a 255.255.255.0
!
interface GigabitEthernet0/1
nameif inside
security-level 100
IP 172.16.1.1 255.255.255.0
IP local pool vpnpool 192.168.10.1 - 192.168.10.254 mask 255.255.255.0
access extensive list ip 172.16.1.0 inside_nat0_outbound allow 255.255.255.0 192.168.10.0 255.255.255.0
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 1 0.0.0.0 0.0.0.0
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
internal VPNstaff group strategy
attributes of Group Policy VPNstaff
4.2.2.2 DNS server value
Protocol-tunnel-VPN IPSec
type tunnel-group VPNstaff remote access
attributes global-tunnel-group VPNstaff
address vpnpool pool
Group Policy - by default-VPNstaff
IPSec-attributes tunnel-group VPNstaff
pre-shared-key *.
Hello
A quick test, try this.
-Turn on nat - t (if its disable)
Command: crypto isakmp nat-traversal 20
see if it helps.
If not,
-Run a continuous ping from the client to the ASA inside the interface, make sure that you run the command 'management-access to inside' before you start with the ping.
-Time our RESPONSE ICMP or inside the interface... ?
If time-out, then
-Check the number of decrypts using the command "show crypto ipsec his"
If ICMP response to inside interface is received by the VPN client.
-Ping to an internal host behind the ASA.
-"Show crypto ipsec his"
IF you have received responses if first test then here you should see decrypts number increases.
-Apply the catches on the inside of the interface
You can consult the document below
http://www.Cisco.com/en/us/products/ps6120/products_tech_note09186a0080a9edd6.shtml
-If you see the package source as VPN client interface to reach the inside interface for the destination of the host behind the ASA, then its a problem with your routing internal.
In case you have an L3 device connected to the ASA inside the interface, make sure that you have a route for GW subnet 192.168.1.x as ASA inside the interface i.e. 172.16.1.1 score
If his L2 or a dumb device, then as a quic test, make the following statement of the road using the command-line in windows on the host computer behind the asa participant in this test.
route add 192.168.1.0 mask 255.255.255.0 172.16.1.1
Please let me know if it helps.
Concerning
M
-
Remote access VPN users unable to see local lan or internet
We implement an ASA5510. Now our users can connect to the vpn but cannot access the internal Lan or internet.
Here is the config. Any help or idea would be greatly appreciated. Thank you
Cryptochecksum: dd11079f e4fe7597 4a8657ba 1e7b287f
: Saved
: Written by enable_15 at 11:04:57.005 UTC Wednesday, April 22, 2015
!
ASA Version 9.0 (3)
!
CP-ASA-TOR1 hostname
activate m.EmhnDT1BILmiAY encrypted password
names of
local pool CPRAVPN 10.10.60.1 - 10.10.60.40 255.255.255.0 IP mask
!
interface Ethernet0/0
nameif outside
security-level 0
IP 63.250.109.211 255.255.255.248
!
interface Ethernet0/1
nameif inside
security-level 100
10.10.10.254 IP address 255.255.255.0
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
management only
nameif management
security-level 100
IP 192.168.1.1 255.255.255.0
!
passive FTP mode
the local object of net network
10.10.10.0 subnet 255.255.255.0
net remote object network
10.10.1.0 subnet 255.255.255.0
network of the NETWORK_OBJ_10.10.10.0_24 object
10.10.10.0 subnet 255.255.255.0
network of the NETWORK_OBJ_10.10.60.0_26 object
255.255.255.192 subnet 10.10.60.0
Outside_1_cryptomap to access extended list ip 10.10.10.0 allow 255.255.255.0 net object / distance
CPRemoteVPN_splitTunnelAcl list standard access allowed 10.10.10.0 255.255.255.0
pager lines 24
Enable logging
asdm of logging of information
Outside 1500 MTU
Within 1500 MTU
management of MTU 1500
no failover
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm-731 - 101.bin
don't allow no asdm history
ARP timeout 14400
no permit-nonconnected arp
NAT (inside, outside) local static source net net-local destination static net distance net-distance
NAT (inside, outside) static source NETWORK_OBJ_10.10.10.0_24 NETWORK_OBJ_10.10.10.0_24 NETWORK_OBJ_10.10.60.0_26 NETWORK_OBJ_10.10.60.0_26 non-proxy-arp-search of route static destination
!
NAT (inside, outside) source after-service dynamic automatic one interface
Route outside 0.0.0.0 0.0.0.0 63.250.109.209 1
Timeout xlate 03:00
Pat-xlate timeout 0:00:30
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
identity of the user by default-domain LOCAL
Enable http server
http 192.168.1.0 255.255.255.0 management
http 10.10.10.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown warmstart of cold start
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
Crypto ipsec ikev2 ipsec-proposal OF
encryption protocol esp
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 proposal ipsec 3DES
Esp 3des encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES
Esp aes encryption protocol
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 ipsec-proposal AES192
Protocol esp encryption aes-192
Esp integrity sha - 1, md5 Protocol
Crypto ipsec ikev2 AES256 ipsec-proposal
Protocol esp encryption aes-256
Esp integrity sha - 1, md5 Protocol
Crypto ipsec pmtu aging infinite - the security association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
card crypto Outside_map 1 corresponds to the address Outside_1_cryptomap
card crypto Outside_map 1 set pfs Group1
card crypto Outside_map 1 set peer 209.171.34.91
card crypto Outside_map 1 set transform-set ESP-3DES-SHA ikev1
card crypto Outside_map 1 set ikev2 AES256 AES192 AES 3DES ipsec-proposal OF
card crypto Outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
Outside_map interface card crypto outside
trustpool crypto ca policy
IKEv2 crypto policy 1
aes-256 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 10
aes-192 encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 20
aes encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 30
3des encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
IKEv2 crypto policy 40
the Encryption
integrity sha
Group 2 of 5
FRP sha
second life 86400
Crypto ikev1 allow outside
IKEv1 crypto policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
management of 192.168.1.2 - dhcpd address 192.168.1.254
enable dhcpd management
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
internal CPRemoteVPN group strategy
attributes of Group Policy CPRemoteVPN
Server DNS 10.10.10.12 value
L2TP ipsec VPN-tunnel-Protocol ikev1, ikev2
value of Split-tunnel-network-list CPRemoteVPN_splitTunnelAcl
carepath.local value by default-field
Split-dns value carepath.ca
activate dns split-tunnel-all
no method of MSIE-proxy-proxy
the address value CPRAVPN pools
roys jjiV7E.dmZNdBlFQ encrypted password privilege 0 username
roys username attributes
VPN-group-policy CPRemoteVPN
tunnel-group 209.171.34.91 type ipsec-l2l
IPSec-attributes tunnel-group 209.171.34.91
IKEv1 pre-shared-key *.
type tunnel-group CPRemoteVPN remote access
attributes global-tunnel-group CPRemoteVPN
address CPRAVPN pool
Group Policy - by default-CPRemoteVPN
IPSec-attributes tunnel-group CPRemoteVPN
IKEv1 pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:dd11079fe4fe75974a8657ba1e7b287f: end
Hello
A couple of things set this:
-crypto isakmp nat-traversal 20
-management-access inside
Can you run a packet tracer and attach it here, to see what are the phases that crosses the package.
David Castro,
Concerning
-
Crossed between the remote access client to a remote site at a Site in Tunnel
Here's the scenario: users access remote vpn in ASA5510 with the tunneling split. The ASA has a tunnel from one site to another site. Vpn remote access users must be able to come and then go back devices on this tunnel from site to site. Is it still possible? Most of what I see on crossed is internet access when not to use the tunneling split.
Thank you!
You can do this job. First of all, you should make sure that the command "permit same-security-traffic intra-interface" is configured. You will then want to update your remote access ACL to include accessible subnets via the split tunneling L2L tunnel. In this way, customers will receive a static route routing traffic through the tunnel for remote access. The ACL crypto for the L2L tunnel shall include either a specific or analytical entry to the pool of the VPN client to destination subnets. The corresponding crypto ACL on the far side of the tunnel L2L will need to be updated with a mirror reverse configuration of hub. Finally, if you have configured on the NAT ASA, you will need to include a rule of exemption for the pool of VPN client-> remote subnet traffic flow.
-
Specify remote access interesting traffic?
This is probably a stupid question, but I can't make my vpn remote access traffic decryption. I use an ASA5510 and 5.0 cisco vpn client. I have no problem getting the next tunnel. But traffic 'decrypted' zero rest and increments "ecarte traffic" at all times.
Here is the ASA5510 encryption config:
OK, I guess that this site does not allow to paste text so I have attached the config.
I'm pretty sure that I can't pass the traffic because I was not able to understand how to specify interesting traffic for the vpn connection. Can someone please show me the syntax for this? It seems that it must be a sort of tunnel - group commands.
Am I the only one who thinks that the Cisco documentation is worth anything on it? The ASA configuration guide you give all that you need to configure a tunnel, but has absolutely nothing on the config required to actually pass traffic. This helps a lot.
Hello
If you see the traffic is encrypted by the VPN Client but no return traffic may not be a configuration that is not on the ASA host or destination do not have a good road to the VPN Client or something else.
To my knowledge, if you do not specify this tunnel on the VPN Client connection then EVERYTHING is going to be in the client endpoint VPN tunnel.
If you want to specify what to send to the VPN you are using configurations of the 'group policy '.
VPN-GROUP-POLICY group policy interns
attributes of VPN-GROUP-POLICY-group policy
Split-tunnel-policy tunnelall
OR
standard permit access list TUNNEL of SPLIT
VPN-GROUP-POLICY group policy interns
attributes of VPN-GROUP-POLICY-group policy
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value of SPLIT TUNNEL
- Usually the ACL 'standard' which includes 'permit' statements for all of the network you want to tunnel to the VPN
"Group policy" is then set under configurations "tunnel-group.
It would probably be easier to check when to see the configurations on the ASA. If you are simply testing connectivity ICMP I recommend that you check that you have 'an icmp inspection' configured so that ICMP Echo-reply messages are automatically allowed by the ASA.
-Jouni
-
No remote access VPN traffic of Asa
Hi all
I set up a Vpn on ASA5510 remote access.
When the client connect, receive the ip address of the pool (192.168.55.X) but generates no traffic.
If I type ipconfig on the pc I have only IP and mask but no gateway is not assigned, is this normal?
If I ping a host of pc to all hosts on the local network 192.168.0.X in the logs I have:
"3 14 July 2012 16:15:50 305005 192.168.0.10 no group translation found for icmp src FASTWEB:192.168.55.1 dst (type 8, code 0) LAN:192.168.0.10 '
NAT could be a problem but I do not understand how to do it.
That's my piece of config:
standard access list test_splitTunnelAcl allow Net_R_Dmz 255.255.255.224
standard access list test_splitTunnelAcl allow Net_R_Server 255.255.255.0
standard access list test_splitTunnelAcl allow Net_R_Client 255.255.255.0
standard access list test_splitTunnelAcl allow Net_V_VoIP 255.255.255.0
standard access list test_splitTunnelAcl allow Net_V_Lan 255.255.255.0
test_splitTunnelAcl list standard access allowed 192.168.0.0 255.255.255.0
permit access ip 192.168.0.0 scope list Lan_nat0_outbound 255.255.255.0 Net_R 255.255.255.0
permit access ip 192.168.0.0 scope list Lan_nat0_outbound 255.255.255.0 Network_V object-group
permit access ip 192.168.0.0 scope list Lan_nat0_outbound 255.255.255.0 Net_R_Client 255.255.255.0
permit access ip 192.168.0.0 scope list Lan_nat0_outbound 255.255.255.0 Net_R_Server 255.255.255.0
permit access ip 192.168.0.0 scope list Lan_nat0_outbound 255.255.255.0 Net_R_Dmz 255.255.255.224
Lan_nat0_outbound ip Net_VpnClient 255.255.255.0 allowed extended access list all
Fastweb_access_in ip Net_R_Client 255.255.255.0 allowed extended access list all
Fastweb_access_in ip Net_R_Server 255.255.255.0 allowed extended access list all
Fastweb_access_in ip Net_R 255.255.255.0 allowed extended access list all
Fastweb_access_in ip Net_VpnClient 255.255.255.240 allowed extended access list all
permit access ip 192.168.0.0 scope list Lan_access_in 255.255.255.0 any
mask 192.168.55.1 - 192.168.55.10 255.255.255.240 IP local pool Vpn_Pool
Global (FASTWEB) 1 interface
NAT (LAN) 0-list of access Lan_nat0_outbound
NAT (LAN) 1 192.168.0.0 255.255.255.0
Access-group Fastweb_access_in in interface FASTWEB
Lan_access_in access to the LAN interface group
Route FASTWEB 0.0.0.0 0.0.0.0 93.x.x.x 1
internal group R10M strategy
attributes of R10M group policy
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list test_splitTunnelAcl
tunnel-group R10M type remote access
attributes global-tunnel-group R10M
address pool Vpn_Pool
Group Policy - by default-R10M
IPSec-attributes tunnel-group R10M
pre-shared-key *.
Thank you.
M.
Hi Marco,.
see this:
Phase: 7
Type: NAT
Subtype:
Result: ALLOW
Config:
NAT (LAN) 1 192.168.0.0 255.255.255.0
LAN ip 192.168.0.0 match FASTWEB 255.255.255.0 any
dynamic translation of hen 1 (93.x.x.x.x [Interface PAT])
translate_hits = 267145, untranslate_hits = 18832
Additional information:
Definition of dynamic 192.168.0.10/0 to 93.x.x.x.x/18070 using subnet mask 255.255.255.255
do not hit the exemption from the rule,
Please add this to your nat 0 access-list:
Lan_nat0_outbound line 1 scope ip allow any 192.168.55.0 255.255.255.0
and let me know how it goes.
Good luck.
Mohammad.
-
This is my first post on this site. Hi all!
I have not really set up ASAs or VPN on Cisco devices before. Currently, I'm trying to configure a dial-up VPN between ASA devices, a 5505 and a 5510. The 5510 is supposed to be the server and the 5505 is supposed to be the easyvpn customer. The reason why I'm opting for remote access instead of site to site is that I much 5505 s on the remote I need to set up in the future, and they will be moving around a bit (I prefer not to have to follow the configs to site to site). The 5510 is not mobile. The ASA devices are able to ping to 8.8.8.8 as ping each other in the face of public IP address.
Neither SAA can ping IP private of other ASA (this part makes sense), and I am unable to SSH from a client on the side 5510 for internal interface (192) of the 5505. I wonder if someone more experienced in the remote VPN ASA than me is able to see something wrong with my setup? I glued sterilized configs of two ASAs below.
Thanks a lot for any assistance!
ASA 5510 (server)
ASA Version 8.0 (4)
!
hostname ASA5510
domain name
activate the
password encrypted passwd
encrypted names of
!
interface Ethernet0/0
nameif outside
security-level 0
IP 48.110.3.220 255.255.255.192
!
interface Ethernet0/1
nameif inside
security-level 100
IP 192.168.191.252 255.255.252.0
!
interface Ethernet0/2
Shutdown
No nameif
no level of security
no ip address
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
Shutdown
No nameif
no level of security
no ip address
!
passive FTP mode
DNS server-group DefaultDNS
domain name
permit same-security-traffic intra-interface
permit NONAT_VPN to access extended list ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0
VPN_REMOTE_IPS note EZ VPN REMOTE IP access-list VARIES
permit VPN_REMOTE_IPS to access extended list ip 192.168.0.0 255.255.0.0 192.168.0.0 255.255.0.0
pager lines 24
Outside 1500 MTU
Within 1500 MTU
ICMP unreachable rate-limit 1 burst-size 1
ASDM image disk0: / asdm - 613.bin
don't allow no asdm history
ARP timeout 14400
NAT (inside) 0-list of access NONAT_VPN
Route outside 0.0.0.0 0.0.0.0 48.110.3.193 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
Enable http server
http 192.168.0.0 255.255.0.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-aes-192 TestVPN, esp-sha-hmac
86400 seconds, duration of life crypto ipsec security association
Crypto ipsec kilobytes of life - safety 4608000 association
Crypto dynamic-map DYNAMIC - map 5 game of transformation-TestVPN
86400 seconds, crypto dynamic-card DYNAMIC-map 5 the duration value of security-association
cryptographic kilobytes 4608000 life of the set - the association of the DYNAMICS-Dynamics-card card 5 security
outside_map card crypto 86400 seconds, 1 lifetime of security association set
card crypto outside_map 1 set security-association life kilobytes 4608000
card crypto S2S - VPN 100 set security-association second life 86400
card crypto S2S - VPN 100 set security-association kilobytes of life 4608000
card crypto OUTSIDE_MAP 65530-isakmp ipsec DYNAMIC-map Dynamics
OUTSIDE_MAP interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
aes-192 encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 1
SSH 192.168.0.0 255.255.0.0 inside
SSH timeout 15
Console timeout 30
management-access inside
priority-queue outdoors
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
internal EZVPN_GP group policy
EZVPN_GP group policy attributes
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list VPN_REMOTE_IPS
allow to NEM
username
password encrypted privilege 3 username
password encrypted privilege 15 type tunnel-group EZVPN_TUNNEL remote access
attributes global-tunnel-group EZVPN_TUNNEL
Group Policy - by default-EZVPN_GP
IPSec-attributes tunnel-group EZVPN_TUNNEL
pre-shared key
!
class-map inspection_default
match default-inspection-traffic
VOICE-CLASS class-map
match dscp ef
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map PRIORITY_POLICY
class CLASS VOICE
priority
matches of the QOS-TRAFFIC-OUT strategies
class class by default
average of form 154088000
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
inspect the icmp
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:10156ad7ab988ae7ed66c4b6d0b4712e
: end
ASA 5505 (Client)
ASA Version 8.2 (5)
!
ASA5505 hostname
activate the
password encrypted passwd
encrypted names of
!
interface Ethernet0/0
!
interface Ethernet0/1
switchport access vlan 2
!
interface Ethernet0/2
Shutdown
!
interface Ethernet0/3
Shutdown
!
interface Ethernet0/4
Shutdown
!
interface Ethernet0/5
Shutdown
!
interface Ethernet0/6
Shutdown
!
interface Ethernet0/7
Shutdown
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.19.1 255.255.255.192
!
interface Vlan2
nameif outside
security-level 0
IP 174.161.76.217 255.255.255.248
!
passive FTP mode
pager lines 24
Within 1500 MTU
Outside 1500 MTU
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Route outside 0.0.0.0 0.0.0.0 174.161.76.222 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
the ssh LOCAL console AAA authentication
Enable http server
http 192.168.0.0 255.255.0.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
No encryption isakmp nat-traversal
Telnet timeout 5
SSH 192.168.0.0 255.255.0.0 inside
SSH 48.110.3.220 255.255.255.255 outside
SSH timeout 5
Console timeout 0
management-access inside
vpnclient Server 48.110.3.220
vpnclient mode network-extension-mode
vpnclient EZVPN_TUNNEL vpngroup password
vpnclient username
password a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
username
password encrypted privilege 15 !
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
Review the ip options
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
call-home
Profile of CiscoTAC-1
no active account
destination http address
https://Tools.Cisco.com/its/service/odd... DCEService
email address of destination
destination-mode http transport
Subscribe to alert-group diagnosis
Subscribe to alert-group environment
Subscribe to alert-group monthly periodic inventory
monthly periodicals to subscribe to alert-group configuration
daily periodic subscribe to alert-group telemetry
Cryptochecksum:bd465cea07c060a409a2eade03b487dc
: end
Please follow this link to create a dynamic L2L Remote Server on ASA5510.
Here is a link for you to create the Site to Site vpn tunnel and the tunnel can be customer above tunnel dynamic L2L Server.
http://www.Cisco.com/en/us/products/ps5855/products_configuration_example09186a0080a9a7a3.shtml
Hope that helps.
If you have any questions, please ask.
Thank you
Rizwan James
-
Homekit remote access does not
Hello.
I have a Schlage door sense block 100% functional when connected by bluetooth with my iphone (ios 10) either when I m with the sense or Homekit app it management.
The problem starts when I try to work remotely.
Yes:
(1) my 3rd generation Apple TV (Maj) is connected with the same iCloud account that I use in my other devices, including my iPhone
(2) Apple TV shows as 'connected' when I check my hub within the Homekit app status
(3) Apple TV is "always on."
(4) I tried to connect a disconnect in icloud again several times.
Need help please!
I chose this lock exclusively to access remote homekit.
Thank you!
It seems that the fault is in schlage's recent firmware update. They have posted the following on their web site about seven 18, 2016:
Some clients of Schlage sense suffered a loss of access remotely through the 3rd generation Apple TV after update of their lock to the version of the firmware 3.42.
We are aware of the problem and are working quickly to resolve.
In the meantime, you can learn more details about how to set up an Apple TV and iPad for remote access and automation of your Schlage lock and other accessories HomeKit.
http://Unlock.schlage.com/blog/unlock-Schlage/Schlage-sense-and-remote-access-th rough-apple-tv
-
My Mac has been hacked, abrupt configured mailboxes. Remote access?
Yesterday on my Mac a sudden notice appeared saying Exchange mail has been added. It was my old College e-mail although it should no longer be valid. Then a pop up says something invalid certificate and a person is faking d'[email protected]... Etc. Who is my former college. Then I tried to print something, and he says he can't trust my local printer and it took forever to print a document. Then 2 pop ups asking if I don't mind garguillo and other netbios to receive s of incoming connection, which I refused. I unplugged and changed the password of my iCloud. I don't have on the sharing options and I never configured this old email on my new Mac Pro retina. Is it possible, he had remote access? What could have happened? What are the main precautions to be safe on Apple devices? Can someone list them? I'm really worried. I have kaspersky from App Store download.
A
The first step and perhaps the only necessary one, is to get rid of your software "anti-virus". All these software are worse than useless on a Mac, and it may well be the cause of the problem, or make the problem worse.
Please remove "Kaspersky Security" by following the instructions on this page. If you have a different version of the product, the steps may be different. The product includes a Safari extension which may not be revoked by the uninstaller.
Back up all data before making any changes. Never install a software "anti-virus" or "anti-malware" again.
B
Verify that the date (including year) and the time indicated by your system clock is correct.
-
remote access MacMini... MOM help
Question: how to set up remote access to the computer of my mother, so that I can address any technical questions she has?
I have an iMac end 2013 with El Capitan 10.11.5.
My mother's computer is a mac mini upgraded to 8 MG of RAM and also with El Capitan (do not know if there were other updates since I was there last).
I would like to be able to connect to the remote computer in order to see its screen and be able to help in updates remotely.
I heard that El Capitan was the built-in ability, but I wanted to know how to put in place.
Thanks in advance for your help.
MOM help
-
Hello!
I read the articles on access distance to another mac, but what I need is to remote access to files on airport time capsule without a great second computer mac at home.
Only Mac... Mac you will use for remote access to files on the Time Capsule... is necessary.
-
alternatives to LogMeIn Pro for remote access?
Greetings. Currently, we have systems in the United States, Switzerland and the Mexico that I supported via remote access using LogMeIn Pro. We paid for a subscription before free LMI Pro has been abandoned even to appreciate the characteristics of LMI Pro. But as LMI has eliminated this free service, it seems their subscription rate more than doubled each year. We currently need remote access to 3 Macs and 2 units of Windows (ew).
Last year, we paid $174. for the annual subscription in support of these 5 systems. I just checked on the price of renewal and it shows $349.00 for renewal. This is getting too expensive!
Last year, I invested in ARD to support my mother MacBook and the MacBook from an old friend, rather than pay LMI for a subscription in support of these systems. ARD was a good alternative for these systems, but it is not a realistic alternative to remote systems for charity I help support. Partly because of the PC, also because what it requires port forwarding in the router and finally because I have to be at my computer to use ARD to access those other systems. LMI offers the possibility to access systems through an iOS app and can be used by other members of the team of charity, anywhere in the world everyone is physically located. That's why we have maintained the LMI Pro subscriptions for a number of years.
But with the perennial increase rate of LMI ridiculous (I think they can take their pricing of Obamacare), I'm on my eternal quest for an alternative to remote access.
Can anyone offer advice?
Thank you very much for your review,
Dee Dee in Florida
There are:
-Apple Back to My Mac
Set up and use Back to My Mac - Apple Support
-Team Viewer free for non-commercial and paid for commercial use.
-GoToMyPC, it also works with Mac
Maybe you are looking for
-
Could I get a free replacement for the phone that was diagnosed with the liquid damage clause?
Hello It's Vincent of the India. My iPhone 5 exploded randomly while I was listening to music, about 2 weeks back. Don't turn on since. The inspection service center claimed to have found traces of liquids on "residents" of the device and thus were c
-
I don't know how screwy this will sound, but my iPhone is not synchronize photos correctly on my external hard drive. I have a MacBook Pro and transferred my library iPhoto for external hard drive to save space on the laptop. Recently, when I plug in
-
In the Device Manager settings, how to fix the sign (!) beside the network controller and the Realtek drivers for the card to operate wireless? in win xp for HP slimline free? Please indicate where to get a free package of download and installation,
-
Trying to read an external drive "Xcraft", by chance the power supply cable was disconnected. I ' v ereconnected the cable and try to remove the device using the ' renove safely» The unit is not stopped after selection and | I get the message 'the' d
-
Hi all - when I got this - Rockin '-mobile initially I could put my own power plans without problem. Now it won't save my new powerschemes. I try to create one, to complete the last step, and then the power mode is not in the drop-down list. I rea