Remote VPN on ASA5510 - get static IP address of ASA

Hi all

Please, I have configured a remote VPN on cisco ASA 5520 and everythings seems to work very well... DHCP IP have been renting to users who connect to the VPN. but the question is now that our customers want a static IP address to give to a particular user when it connect via VPN.

is this possible?

Hello

You can configure a static IP address in a configuration of "username" users on the SAA. Of course, I want to say that you need to do the LOCAL on the SAA authentication itself for users VPN to use this command

For example

user testuser password testpassword privilege 0 name

user testuser name attributes

VPN-framed-ip-address 10.10.10.2 255.255.255.0

This should make the same IP address in the user always

Hope this helps

-Jouni

Tags: Cisco Security

Similar Questions

  • Remote VPN access - add new internal IP address

    Hello

    I have an existing configuration of Cisco VPN client in ASA 5510 for remote access.

    -------------------------------------

    Name of the Group: ISETANLOT10

    Group password: xxxx
     
    IP pool: lot10ippool, 172.27.17.240 - 172.27.17.245
     
    enycrption: 3DES
    authentication: SHA
    ------------------------------------
    the connection was successful, and I was able to ping to the internal server 172.47.1.10.
    Now, there is demand for remote access VPN even can do a ping to access a new server within LAN, 172.57.1.10 & 172.57.1.20
    But with the same VPN access, I was unable to ping the two new IP.
    How can I add both IP in order to make a ping by using the same configuration of remote access VPN?
    I have attached below existing config (edited version)
     
    ===

    : Saved
    :
    ASA Version 8.0 (4)
    !
    hostname asalot10
    names of
    name 172.17.100.22 NAVNew
    name 172.27.17.215 NECUser
    172.47.1.10 NarayaServer description Naraya server name
    name 62.80.122.172 NarayaTelco1
    name 62.80.122.178 NarayaTelco2
    name 172.57.1.10 IPVSSvr IPVSSvr description
    name 122.152.181.147 Japan01
    name 122.152.181.0 Japan02
    name 175.139.156.174 Outside_Int
    name 178.248.228.121 NarayaTelco3
    name 172.67.1.0 VCGroup
    name 172.57.1.20 IPVSSvr2
    !
    object-group service NECareService
    Description NECareService remote
    the eq https tcp service object
    EQ-ssh tcp service object
    response to echo icmp service object
    inside_access_in deny ip extended access list all Japan02 255.255.255.0
    inside_access_in ip VCGroup 255.255.255.0 allowed extended access list all
    inside_access_in list extended access deny tcp object-group PermitInternet any object-group torrent1
    inside_access_in list extended access allowed object-group ip PermitInternet any newspaper disable
    inside_access_in list any newspaper disable extended access allowed host ip NarayaServer
    inside_access_in list extended access permit ip host IPVSSvr all
    inside_access_in list any newspaper disable extended access allowed host ip NAVNew
    inside_access_in list extended access permit ip host 172.17.100.30 all
    outside_access_in list extended access allow object-group objects NECare a NECareService-group
    outside_access_in list extended access allowed host ip DM_INLINE_NETWORK_1 NarayaServer object-group
    outsidein list extended access permit tcp any host Outside_Int eq https
    outsidein list extended access allowed object-group rdp any host Outside_Int debug log
    outsidein list extended access allowed host tcp object-group DM_INLINE_NETWORK_2 eq Outside_Int 8080
    outsidein list extended access allowed host ip DM_INLINE_NETWORK_3 IPVSSvr object-group
    inside_mpc list extended access allowed object-group TCPUDP any any eq www
    inside_mpc list extended access permit tcp any any eq www
    inside_nat0_outbound list of allowed ip extended access all 172.27.17.240 255.255.255.248
    inside_nat0_outbound list extended access permit ip host NarayaServer Nry_Png object-group
    inside_nat0_outbound list extended access allowed host ip IPVSSvr2 172.27.17.240 255.255.255.248
    outside_cryptomap list extended access permitted ip object-group Naraya_Png-group of objects Nry_Png

    Global interface 10 (external)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 10 0.0.0.0 0.0.0.0
    static (inside, outside) interface tcp 8080 8080 NarayaServer netmask 255.255.255.255
    static (inside, outside) tcp 3389 3389 NAVNew netmask 255.255.255.255 interface
    public static tcp (indoor, outdoor) interface ssh IPVSSvr2 ssh netmask 255.255.255.255
    Access-group outsidein in external interface
    inside_access_in access to the interface inside group
    Route outside 0.0.0.0 0.0.0.0 175.139.156.173 1
    Route inside 172.17.100.20 255.255.255.255 172.27.17.100 1
    Route inside NAVNew 255.255.255.255 172.27.17.100 1
    Route inside 172.17.100.30 255.255.255.255 172.27.17.100 1
    Route inside NarayaServer 255.255.255.255 172.27.17.100 1
    Route inside 172.47.1.11 255.255.255.255 172.27.17.100 1


    Route inside VCGroup 255.255.255.0 172.27.17.100 1

    Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs
    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define security association lifetime 28800 seconds
    cryptographic kilobytes 4608000 life of the set - the association of security of the 65535 SYSTEM_DEFAULT_CRYPTO_MAP of the dynamic-map
    card crypto outside_map 1 match address outside_cryptomap
    card crypto outside_map 1 set 218.x.x.105 counterpart
    card crypto outside_map 1 set of transformation-ESP-3DES-SHA
    outside_map map 1 lifetime of security association set seconds 28800 crypto
    card crypto outside_map 1 set security-association life kilobytes 4608000
    outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 30
    preshared authentication
    3des encryption
    md5 hash
    Group 2
    life 86400

    internal ISETANLOT10 group policy
    ISETANLOT10 group policy attributes
    value of server DNS 172.27.17.100
    Protocol-tunnel-VPN IPSec l2tp ipsec
    username, password nectier3 dPFBFnrViJi/LGbT encrypted privilege 0
    username nectier3 attributes
    VPN-group-policy ISETANLOT10
    username password necare encrypted BkPn6VQ0VwTy7MY7 privilege 0
    necare attributes username
    VPN-group-policy ISETANLOT10
    naraya pcGKDau9jtKgFWSc encrypted password username
    naraya attribute username
    VPN-group-policy ISETANLOT10
    type of nas-prompt service
    type tunnel-group ISETANLOT10 remote access
    attributes global-tunnel-group ISETANLOT10
    address lot10ippool pool
    Group Policy - by default-ISETANLOT10
    IPSec-attributes tunnel-group ISETANLOT10
    pre-shared-key *.
    tunnel-group 218.x.x.105 type ipsec-l2l
    218.x.x.105 group of tunnel ipsec-attributes
    pre-shared-key *.
    type tunnel-group ivmstunnel remote access
    tunnel-group ivmstunnel General-attributes
    address lot10ippool pool
    ivmstunnel group of tunnel ipsec-attributes
    pre-shared-key *.
    !

    =====

    Remote VPN access must allow the connection, but I'm guessing that your ASA does not know how to get to the two new destinations.

    You have a name and a static route to the job to 172.47.1.10 Server:

    name 172.47.1.10 NarayaServer description Naraya Server

    route inside NarayaServer 255.255.255.255 172.27.17.100 1

    .. but no equivalent for the two new hosts. As a result, all traffic of ASA destiny for them will attempt to use the default route (via the external interface).

    If you add:

    route inside 172.57.1.10 255.255.255.255 172.27.17.100

    route inside 172.57.1.20 255.255.255.255 172.27.17.100

    (assuming this is your correct entry), it should work.

  • Can VPN site-to-site with just 1 static IP address in PIX?

    Hi all

    Can I use pix for VPN with just 1 static IP address as follows:

    LAN-A---PIX1---INTERNET---PIX2---LAN-B

    Just PIX1 has static IP, PIX2 use DHCP from ISP. I have the config this type of VPN with another brand equipment. But the use of PIX, I just VPN config with both ends have a static IP and I can't find any information in the web site. Because when config VPN site-to-site I have to use the command 'same game '.

    Can someone tell me how can I do with PIX? Thank you!

    Best regards

    Teru Lei

    You just need to set up a dynamic encryption on PIX 1 card and a card standard encryption with a peer 'set' on 2 PIX. Here is an example configuration:

    http://www.Cisco.com/warp/public/110/dynamicpix.html

    Note that it also has VPN connection clients in 1 PIX (Lion), so forget all orders of "vpngroup" that you see in his configuration cause, they are not necessary for your scenario.

  • Tunnel VPN remote Internet and VPN remote VPN from Site to Site traffic?

    Hello

    We try to remote traffic from our users VPN tunnel through our ASA 5510 as well as to allow the only access for remote user VPN traffic to the other end of the all our VPN site-to-site connected to the same ASA. Basically, we who want to VPN in the network in order to access all of our networks business. We try to get away with this without using split Tunneling.

    I can currently get internal traffic from the remote user VPN to reach all other vpn site-to-site tunnels without the internet in tunnel. The problem is when I add the following statement to the NAT:

    NAT (outside) 1 10.10.19.0 255.255.255.0 * 10.10.19.0 is the address of the remote VPN Client

    Internet traffic to the remote VPN starts to get in the tunnel, but I lose the opportunity to reach one of the other tunnels from site to site by the remote VPN tunnel.

    I also begin to receive the following errors in the journal of the ASA

    3 July 1, 2009 12:34:18 305005 10.10.19.255 137 no group of translation not found for udp src outside:10.10.19.3/137 dst outside:10.10.19.255/137

    Any help with how NAT statements must be defined for this work would be appreciated.

    Thank you

    Will be

    Will,

    the link of this post for your scenario of vpn hub & speak reference, you problem may be on exempt nat rules.

    Have a second look at your sheep rules.

    Be sure to eliminate tunnel rules related to rheumatoid arthritis, as appropriate, to not let him get in the way of splitting.

    http://forums.Cisco.com/eForum/servlet/NetProf?page=NetProf&Forum=security&topic=firewalling&TopicId=.ee6e1fa&fromOutline=true&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc2e0f6/4

    If always emits discribe topology for l2ls and info logic RA and sanatized hub config asa... but I think if you look at the thread above, you should be able to solve.

    Concerning

  • Routing of a VPN from Site to site to remote VPN users

    Hello

    We have a site and remote vpn site configured in the same interface in ASA 5520 (software version 8.3). When the remote vpn users try to connect to the computers located at the far end of the site to site VPN, their request has failed. I tried No.-Nat between remote vpn IP private to the private IP address of remote site, also said the same split tunneling. I can't find even the tracert, ping has also expired.

    Is there any solution to make this live thing.

    Shankar.

    There are a few things that need to be added to make it work:

    (1) on the SAA where remote vpn users connect to, you must add "permit same-security-traffic intra-interface"

    (2) you mention that you have added the LAN of remote site-to-site in the list of split tunnel, so that's good.

    (3) on the SAA ending the vpn for remote access, you must also add the following text:

    -Crypto ACL for the site to site VPN must include the following:

    permit ip access list

    (4) on the ASA site to remote site, you must add:

    -Crypto ACL for the site to site VPN must include the following:

    permit ip access list

    -No - Nat: ip access list allow

  • A remote VPN (link source and destination ip peer)

    Hi all

    I can access my thought of networking Office RAS VPN I have a static ip address on my home modem, now I want to create an access list, so I should be able to access to my office network through this static ip address only, I tried with given below ACL on my desktop firewall, but it did not work for me.

    Example access-list 101 permit interface host 10.0.0.1 udp outside eq 500

    access-list 101 permit interface host 10.0.0.1 esp outdoors

    Access-group 101 in external interface

    Any idea,

    Thank you inadvance

    Concerning

    Tash

    Hello guys,.

    Tash, so say you now you have purchased a static IP address for your home, and now you want your ASA to accept than intellectual property. you use the Cisco VPN Client right?

    Amatahen, you have reason sysopt connection permit VPN will allow encrypted traffic to bypass the access-group, but is not encrypted but the traffic of negotiation, because it's we´re AM going to use 3 packets (UDP 500, but if any side is at the origin of the package NAT #2 and #3 will move to UDP 4500 instead of 500)

    Filter access group by-the-box traffic is NOT employment traffic so to achieve, you need to create a group of access to your home IP but the thing, it is that your group access must be configured with the keyword for control-plane at the end., you'll also need to allow ssh, https, etc., depending on the services you run on this device.

    Kind regards

  • How to use ACS 5.2 to create a static ip address user for remote access VPN

    Hi all

    I have the problem. Please help me.

    Initially, I use ACS 4.2 to create the static ip address for VPN remote access user, it's easy, configuration simply to the user defined > address assignment IP Client > assign the static IP address, but when I use ACS 5.2 I don't ' t know how to do.

    I'm trying to add the IPv4 address attribute to the user to read "how to use 5.2 ACS", it says this:

    1Ajouter step to attribute a static IP address to the user attribute dictionary internal:

    Step 2select System Administration > Configuration > dictionaries > identity > internal users.

    Step 3click create.

    Static IP attribute by step 4Ajouter.

    5selectionnez users and identity of the stage stores > internal identity stores > users.

    6Click step create.

    Step 7Edit static IP attribute of the user.

    I just did, but this isn't a job. When I use EasyVPN client to connect to ASA 5520, user could the success of authentication but will not get the static IP I set up on internal users, so the tunnel put in place failed. I'm trying to configure a pool of IP on ASA for ACS users get the IP and customer EasyVPN allows you to connect with ASA, everything is OK, the user authenticates successed.but when I kill IP pool coufigurations and use the "add a static IP address to the user 'configurations, EzVPN are omitted.

    so, what should I do, if anyboby knows how to use ACS 5.2 to create a user for ip address static for remote access VPN, to say please.

    Wait for you answer, no question right or not, please answer, thank you.

    There are a few extra steps to ensure that the static address defined for the user is returned in the Access-Accept. See the instuctions in the two slides attached

  • ASA static IP Addressing for IPSec VPN Client

    Hello guys.

    I use a Cisco ASA 5540 with version 8.4.
    I need to assign a static IP address to a VPN client. I saw in the documentation Cisco that this can be done to validate the user against the local ASA and in the user account database, you assign a dedicated IP address, or using the vpn-framed-ip-address CLI command.
    The problem is that the customer never gets this address and it always gets one of the pool in the political group. If I delete this pool, the client can't get any address.
    No idea on how to fix this or how can I give this static IP address to a specific VPN client?
    Thank you.

    Your welcome please check the response as correct and mark.

    See you soon

  • static ip address to the remote client asa 5500

    Hi all

    I am trying to configure static ip on the remote client side of the user, I use the following as an example doc, but I don't get the ip address which I am mentiong the user.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a0080a7afb2.shtml

    my version of the asa is 8.2 (1)

    Thank you

    Cyril

    Great to hear. Pls kindly marks the message as answered while others may learn from your post. Thank you...

  • Static IP address with VPN

    I'm doing research using VSphere our Organization and that you can't find the answer to an important question:

    If you have 2 VM using the Hot Standby how do you deal with the fact that the VM active must have the same static IP address, since it is the only address our VPN router will allow our remote users to access?

    For clarity:

    VMServer 1 @ 1.1.1.1 (where the 1.1.1.1. is the only address the VPN will allow a user to do) switches to a Hot Standby Server VMServer2

    After switching to the VMServer 2 needs to be 1.1.1.1 so that the VPN will continue to let the remote users work with the machine.

    Sorry if it's a simple question, but it's at the top of the list "should be able"!

    Thanks for any answers

    See:

    http://ITKnowledgeExchange.TechTarget.com/virtualization-Pro/masters-Guide-to-VMware-fault-tolerance/

    also

    http://KB.VMware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalID=1013428

    FT is large, but also imposes constraints on the virtual machine. I wouldn't think that all virtual machines will be decent candidates for pi... Make sure you that understand the use cases and limitations before implementing FT.

  • Computers with static IP address, get addresses (169.254) APIPA

    There are several posts on my network configured with static IP addresses. To go to sleep or restart (warm), they will get an APIPA 169.254.x.x. address I found that there are three ways to solve this case temporarily:

    1. Shut the computer down (cold) and back on the power.
    2. Disable and re-enable the adapter.
    3. Disconnect and reconnect the network cable.

    I had some success with affecting the NETWORK 100 Mbit/s/Full Duplex card AND the port of the switch to match. This seems like a solution of cloogy. Updated the drivers of the card toward the newer versions does not help. The problem exists on many brands adapter, including Intel, Broadcom and Marvell. Nothing useful is in the event logs. Our switching infrastructure is Cisco all if it matters.

    Can anyone help?

    This issue is beyond the scope of this site and must be placed on Technet or MSDN

    http://social.technet.Microsoft.com/forums/en-us/home

    http://social.msdn.Microsoft.com/forums/en-us/home

  • Cannot get internet static IP address

    Hi, I put several new Win7 PC in an office that replace Win XP PC. I need to use static IP addresses on all of the PCs, as it is required to access the Unix server. Start of the new PC with internet access very well, but when I assign static IP addresses, they have more internet. My IP address, DNS server, gateway, etc. are all correct and identical to what is plugged into the PC XP (except IP address of course). Even if the new PC do not have internet access, they can connect with the Unix server and other PCs on the working group. When I diagnose the problem I get the answer: "your computer seems to be configured correctly, but the device or resource (DNS server) is not responding." All the XP computers using the static IP address and have the internet very well. Yes, I already tried to clear the DNS cache.

    Hello

    As you work on a domain network, the question would be better suited on the TechNet support forum.

    I suggest you to check with TechNet support for more information.

    http://social.technet.Microsoft.com/forums/en-us/newThread?category=&Forum

  • "Error: failed to get the IP address of the destination virtual machine running the converter to assistance server." with a static IP address

    Hi all

    I'm trying to p2v linux 6.4. It fails with the following message is displayed:

    Error: Cannot get the IP address of the virtual destination machine running the converter assistance server.

    I have seen discussions on this message, but they all refer to dynamic IP address, taken from DHCP, as in my case, I use static IP address.

    In the meantime the p2v (which then breaks down...) I open console support machine and saw a message:


    eth0 is not a recognized interface.

    Can someone tell me what is happening?

    Hello

    I assume you are using converter 5.5. There is a new feature that allows the selection of the network card. However, it works well in the case of Linux P2V. If you have changed the type of adapter, use 'e1000' or 'auto' and try again.

    HTH

    Plamen

  • Weird, NIC is not getting an IP address from the DHCP server, but when you set a static IP address of works...

    Someone at - it will meet it before? Of course it is in a LAB environment, but what a Win 2012R2 VM is simply not cooperate... lol

    I tried to vMotion there something hot but even. Other virtual machines, 2008 R2 can obtain a static IP address fine as well as works fine. It is the only 2012R2 VM in the LABORATORY.

    No 'ghosts' NIC or whatever it is. It's a new generation of machine virtual Windows.

    Thank you

    EDIT:

    I use the VMXNET3 card.

    Figured it out. Someone added an IP in DHCP address range rule "out for delivery" and they used the whole range of... lol

  • VPN on ASA5510

    We have 2 sites with ASA5510 and want to configure VPN tunnel for data.  At this moment we have mpls that we love to get rid of.

    I see in our configuration, there are already configured VPN tunnels, but it does not work.  Because we have stoped mpls and data between both parties cease to operate.

    Here's the configs et among the ASA5510, please let me know if you see VPN configured... I'm new on the firewall...

    Help, please...

    ASA Version 8.0 (3)
    !
    host House name
    domain none.com
    names of

    name 10.10.10.10 Exchange2010
    1.1.1.1.1 Exchange2010outside name
    DNS-guard
    !
    interface Ethernet0/0
    Speed 100
    full duplex
    nameif outside
    security-level 0
    address IP Exchange2010outside 255.255.255.248
    !
    interface Ethernet0/1
    nameif inside
    security-level 100
    IP 10.10.10.2255.255.255.0
    !
    interface Ethernet0/2
    nameif mpls
    security-level 100
    10.10.10.2 IP address 255.255.255.240
    !
    interface Ethernet0/3
    nameif temp
    security-level 0
    no ip address
    !
    interface Management0/0
    Shutdown
    nameif management
    security-level 100
    no ip address
    management only
    !

    passive FTP mode
    DNS server-group DefaultDNS
    domain none.com
    permit same-security-traffic inter-interface
    object-group Protocol TCPUDP
    object-protocol udp
    object-tcp protocol
    access-list 101 extended permit icmp any any echo response
    access-list 101 extended permit icmp any any source-quench
    access-list 101 extended allow all unreachable icmp
    access-list 101 extended permit icmp any one time exceed
    access-list 101 extended allow tcp no matter what interface outside eq 3390
    access-list 101 extended allow tcp no matter what interface outside eq 3391
    access-list 101 extended allow tcp no matter what interface outside eq 3392
    access-list 101 extended allow tcp no matter what interface outside eq 3393
    access-list 101 extended allow tcp no matter what interface outside eq 3394
    access-list 101 extended allow tcp no matter what external interface Equalizer 3395
    access-list 101 extended allow tcp no matter what interface outside eq 3396
    access-list 101 extended allow tcp no matter what interface outside eq 3397
    access-list 101 extended allow tcp no matter what interface outside eq 3398
    access-list 101 extended allow tcp no matter what interface outside eq 3399
    Note access-list 101 OWA 2010
    access-list 101 extended permit tcp any host Exchange2010outside eq 3389
    access-list 101 extended permit tcp any host Exchange2010outside eq www
    access-list 101 extended permit tcp host 64.92.220.155 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.156 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.157 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.158 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.159 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.160 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.161 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.162 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.163 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.164 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.165 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 64.92.220.166 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.85 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.86 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.87 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.88 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.89 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.90 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.91 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.82.145.92 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.245 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.246 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.247 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.248 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.249 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.250 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.251 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp host 208.78.240.252 Exchange2010outside
    EQ smtp
    access-list 101 extended permit tcp 64.18.0.0 255.255.240.0 host Exchange2010out
    on the side of eq smtp
    access-list 101 extended permit tcp any host Exchange2010outside eq https
    access-list 101 extended allow object-group TCPUDP any host Exchange2010 eq www

    Home-list of allowed remote access ip 10.10.10.0 255.255.255.0 10.10.11.0 255.255
    . 255.0
    Home-list of allowed remote access ip 10.10.10.0 255.255.255.0 10.10.12.0 255.255
    . 255.0
    Home-list of allowed remote access ip 10.10.10.0 255.255.255.0 10.10.13.0 255.255
    . 255.0
    Home-list of allowed remote access ip 10.10.10.0 255.255.255.0 10.10.14.0 255.255
    . 255.0
    course access-list extended permit tcp any eq 3391 everything
    course access-list extended permit tcp any eq 3394 everything
    Home-remoteNONAT extended 10.10.10.0 ip access list allow 255.255.255.0 10.10.11.0 25
    5.255.255.0
    Home-remoteNONAT extended 10.10.10.0 ip access list allow 255.255.255.0 10.10.12.0 25
    5.255.255.0
    Home-RemoteNONAT access list extended 10.10.10.0 allowed ip 255.255.255.0 10.10.13.0 25
    5.255.255.0
    Home-RemoteNONAT access list extended 10.10.10.0 allowed ip 255.255.255.0 10.10.14.0 25
    5.255.255.0
    access-list extended plastique1 permit tcp any any eq smtp
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    MPLS MTU 1500
    temp of MTU 1500
    management of MTU 1500
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 613.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0 list access home-RemoteNONAT
    NAT (inside) 1 10.10.1.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.2.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.3.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.4.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.5.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.6.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.7.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.8.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.9.0 255.255.255.0 50 20 tcp
    NAT (inside) 1 10.10.10.0 255.255.255.0 50 20 tcp

    public static (inside, outside) tcp smtp smtp Exchange2010 netmask 255.255.255 interface

    .255
    public static tcp (indoor, outdoor) interface https Exchange2010 https netmask 255.255.2
    55.255

    Access-group 101 in external interface
    Route outside 0.0.0.0 0.0.0.0 111.111.11.111 1 (note side 111.111.11.111 seems gateway isp)
    Route inside 10.10.4.0 255.255.255.0 10.10.4.1 1
    Route inside 10.10.5.0 255.255.255.0 10.10.5.1 1
    Route inside 10.10.6.0 255.255.255.0 10.10.6.1 1
    Route inside 10.10.7.0 255.255.255.0 10.10.7.1 1
    Route inside 10.10.8.0 255.255.255.0 10.10.8.1 1
    Route inside 10.10.9.0 255.255.255.0 10.10.9.1 1
    Mpls route 10.10.11.0 255.255.255.0 10.10.20.1 1
    Mpls route 10.10.12.0 255.255.255.0 10.10.20.1 1
    Mpls route 10.10.13.0 255.255.255.0 10.10.20.1 1
    Mpls route 10.10.14.0 255.255.255.0 10.10.20.1 1
    Mpls route 10.10.21.0 255.255.255.0 10.10.20.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout, uauth 0:05:00 absolute
    dynamic-access-policy-registration DfltAccessPolicy
    Enable http server
    http 0.0.0.0 0.0.0.0 outdoors
    http 10.10.11.0 255.255.255.0 inside
    http 10.10.10.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-aes-256 Home_Tunnel, esp-sha-hmac
    maptoREMOTE card crypto 10 matches the home address / remote
    card crypto maptoREMOTE 10 game of transformation-Home_Tunnel
    maptoREMOTE interface card crypto outside
    crypto isakmp identity address
    crypto ISAKMP allow outside
    crypto ISAKMP policy 11
    preshared authentication
    aes-256 encryption
    sha hash
    Group 2
    lifetime 28800
    crypto ISAKMP policy 30
    preshared authentication
    aes encryption
    sha hash
    Group 2
    life 86400
    Crypto isakmp nat-traversal 30
    Telnet 10.10.10.0 255.255.255.0 inside
    Telnet 10.10.11.0 255.255.255.0 inside
    Telnet timeout 60
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH 0.0.0.0 0.0.0.0 inside
    SSH timeout 60
    Console timeout 0
    a basic threat threat detection
    threat detection statistics
    username admin privilege 15 encrypted password id6XqXzHqVdjWpuR
    tunnel-group 38.1.1.1 type ipsec-l2l (note aside it's remote ip address asa)
    IPSec-attributes tunnel-group 38.1.1.1 (note aside it's remote ip address asa)
    pre-shared-key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    class-map-port pptp
    match eq pptp tcp port
    !
    !
    type of policy-card inspect dns migrated_dns_map_1
    parameters
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the migrated_dns_map_1 dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Policy-map pptp_policy
    class-port pptp
    inspect the pptp
    pptp-policy policy-map
    class-port pptp
    inspect the pptp
    !
    global service-policy global_policy
    service-policy pptp_policy outside interface
    context of prompt hostname

    Hi Gurpreet,

    Yes, depending on the vpn configuration will work:

    card crypto outside_map 20 set pfs
    peer set card crypto outside_map 20 64.1.1.1

    tunnel-group 64.1.1.1 type ipsec-l2l
    IPSec-attributes tunnel-group 64.1.1.1
    pre-shared-key *.

    -Now in the above configuration, we are missing remote vpn access list defines interesting traffic, for this you need to identify the interesting traffic (probably) by checking the configuration of endpoint, and it applies here. We must apply the encryption card interface. So the complete vpn config should look like this:

    outside_map card crypto 20 is the address

    card crypto outside_map 20 set pfs
    peer set card crypto outside_map 20 64.1.1.1

    tunnel-group 64.1.1.1 type ipsec-l2l

    IPSec-attributes tunnel-group 64.1.1.1

    pre-shared key

    outside_map interface card crypto outside

    See you soon,.

    Christian V

Maybe you are looking for

  • I need BIOS for Satellite A660 PSAW3E was last updated

    Hello world I have laptopModel A660 - 17 MVersion PSAW3E-06P00WARVersion of the BIOS 2.30 And every time I run the program more agent bios it shows me that there is a new bios updateand when I check drivers Toshiba it show me the same bios update tha

  • Get automatically disconnected Windows XP

    Looking for general help. Bought a Satellite MX30X at Christmas. When I used it on the internet for the first time downloaded window updates to day (I think), talked to some friends on MSN (got a virus or 20 along the way) and then the next time I tu

  • Compac CQ58: CQ58 BIOS password does not

    Laptop is asking to specify a password for the system.  I tried the password only I have ever used and it does not work.  After three attempts, it gives me disable the code 78503941. Help, please

  • Visual effects in Windows Media Center displays white screen

    Earlier, when I want to play music from Windows Media Center, I was able to select the Visual effects and had a view that would go with the music (Alchemy, scratches & waves, battery) then I ran a Windows Update, which included an update for Media Ce

  • should what download I use to open TIF files /cad files/map files?

    I need to open a tif file. I'm interested in maps of the city. I go to a website and click on the list. I get the error that I don't have the right software to open and I would like to find on the internet? I have XP. Is there a download here, I can