The VPN log

Hello world

Is there a way I can turn on logging on my ASA5550 so that I can check the time and date (and how long) the VPN users are connected?

Your help is greatly appreciated.

Thank you

Alfred

You can set the ASA to send syslog messages when the user connects and disconnects.

# User vpn connection to syslog message is # 713119 and 611310 syslog:

http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4775678

http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4774637

and to disconnect is syslog # 113019:

http://www.Cisco.com/en/us/docs/security/ASA/asa80/system/message/logmsgs.html#wp4769539

Hope that helps.

Tags: Cisco Security

Similar Questions

  • Attack detected in Journal of the VPN VPN?

    Hello

    I see the King of the messages in the VPN log:

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    4 Mar 15:55:10 2010 VPN Log [Tunnel negotiation Info] > main initiator Mode to send 1 package

    These messages have flooded the page of the newspaper and have the same hour: minute: second

    Is this some kind of attack or back?

    I have a Linksys RV082, firmware 2.0.0.19 - tm

    Thank you very much

    Oliver

    Possible. Is the RV082 on the other side off as well?

  • Establish the VPN connection before the user logged

    Hello world!

    Anyone know if it is possible to run the cisco vpn client and establish the vpn connection before the user logs (Windows 7)? How?

    Thanks in advance!

    You must Anyconnect VPN.

    use start before logon feature you can get the VPN before windows logon.

    There are a lot of configuration guide that you can find in CISOC regarding anyconnect SBL.

  • Unable to connect to the VPN server

    Hello

    I'm on Sierra, iOS macOS 10 and Mac OS Server 5.2 (on a Mac mini).  (All dated September 21, 2016)

    Because PPTP is no longer supported, I am trying to create L2TP.  Unfortunately, when I try to connect to the server, I get the error "the VPN server has failed. Please check the server address and try to reconnect. »

    I do not think it is a problem of networking: back to my Mac is not enabled, the appropriate ports are transmission (UDP 500, 1701, 4500) and server says that the service is accessible.

    When I check the logs from the server after a connection attempt, I find:

    21/09/16 21:08:09.994 raccoon [75993]: can't find configuration.

    21/09/16 21:08:13.285 raccoon [75993]: can't find configuration.

    21/09/16 21:08:16.578 raccoon [75993]: can't find configuration.

    21/09/16 21:08:19.884 raccoon [75993]: can't find configuration.

    Any suggestions?

    Does anyone know where the configuration file is supposed to be on the server, so I can look at?

    Thanks for your help!

    Hi Rick,

    -Check that the folder/etc/racoon exist and the folder contains psk.txt and racoon.conf.

    -Installed with the operating system.

    Cheers, dwbrecovery

  • Why users need to disconnect and reconnect to the VPN to RDP?

    Most of the time our VPN works perfectly, but sporadically users must reconnect to the VPN to use remote desktop. Is that the user can log on to the VPN and access to things like network drives, but not other features like RDP. If they disconnect and then reconnect to the VPN, poof, everything works fine. No matter if it is minutes or hours in the VPN connection, it still requires reconnection. It seems that it is always on the second attempt at the nick of this post point called 'the second time's a charm

    We are using RRAS in SBS 2008 and the problem is multiple users tempting to VPN in XP and Win7 machines. We replaced the switches (now using Dell Powerconnects) and the router (now using Cisco RV042) and the problem persists.

    Suggestions or responses are greatly appreciated.

    Hello

    The question you have posted is related to Technet and would be better suited to the Technet community. Please visit the link below to find a community that will provide the best support.
    http://social.technet.Microsoft.com/forums/en-us/w7itpronetworking/threads

  • RRAS issues! -Unable to connect to the VPN users,

    original title: RRAS issues!

    Hi all, I have some real issues with my RRAS VPN. All of a sudden the users are randomly cannot connect to the VPN. Making mistakes like 619 800 and so on. I activated the GRE (once the problem starts) checked to see if the 1723 port is open. Why is this happening now?

    I use DynDns host name and everything seems fine, fact that there are enough ports available to PPTP on the RRAS.

    I am running Windows 2003 SBS SP2

    Router is a MAKO 6861 with a normal ADSL line

    I see this in the PPP.log:

    [8128] 06-04 10:27:27:794: Recv timeout event received for portid = 288, Id = 5, Protocol c021, fAuth = 0 =
    [8128] 06-04 10:27:27:794:
    [8128] 06-04 10:27:27:794:
    [8128] 10:27:27:794:
    [8128] 10:27:27:794: <06 57="" eb="" 0d="" 3e="" 07="" 02="" 08="" 02="" 0d="" 03="" 06="" 11="" 04="" 06="" 4e="" |.w..="">... N |
    [8128] 10:27:27:794:<13 17="" 01="" b0="" 09="" a5="" e1="" 15="" e6="" 49="" 4f="" 85="" fb="" 7c="" a0="" 15="">
    [8128] 10:27:27:794:

    And some of this:

    [8128] 06-04 10:27:43:325: line before the end event occurred on port 138
    [8128] 10:27:43:325 06-04: FsmDown event is received for Protocol c021 on port 138
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 9, Protocol is c021, EventType = 0, = 0 fAuth
    [8128] 10:27:43:325 06-04: FsmReset called Protocol c021, port = 138 =
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 3, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 7, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 2, fAuth = 0
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 1, = 0 fAuth
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, = 0 protocol, EventType = 4, = 0 fAuth
    [8128] 10:27:43:325 06-04: RemoveFromTimerQ called portid = 288, Id = 0, Protocol is c029, EventType = 0, = 0 fAuth
    [8128] 06-04 10:27:43:325: LcpEnd
    [8128] 06-04 10:27:43:325: line Post event took place on the port 138
    [8128] 06-04 10:27:43:325: NotifyCaller (hPort = 138, dwMsgId = 23)
    [8128] 06-04 10:27:48:043: line-up event took place on the port 138
    [8128] 06-04 10:27:48:043: PortName: VPN3-19
    [8128] 06-04 10:27:48:043: from PPP link with IfType = 0x0, 1p1f = 0 x 0, IPXIf = 0 x 0
    [8128] 10:27:48:043 06-04: RasGetBuffer returned 58 c 2148 to SendBuf
    [8128] 10:27:48:043 06-04: FsmInit called Protocol c021, port = 138 =
    [8128] 06-04 10:27:48:043: ConfigInfo = 80260
    [8128] 06-04 10:27:48:043: available APs = 2
    [8128] 10:27:48:043 06-04: FsmReset called Protocol c021, port = 138 =

    Hello

    Your question of Windows Server is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public.

    Please ask your question in the Technet Windows Server General category.
    http://social.technet.Microsoft.com/forums/en-us/winservergen/threads

  • SRA 4600 - users to limit who can connect to the VPN

    We have a SRA 4600 and wishes to restrict access to the VPN to only a handful of our users active directory.  that is when they visit the Web page for the SRA and try to logon, once that they connection they told you they have VPN access.  That, or else they are simply limited to be able to open a session.

    How we would accomplish this?

    Since you are using AD, you can create local groups on your device and then restrict access to specific ad groups.  The way I work is that a domain has several groups assigned to him, and whenever someone logs in, they show some bookmarks are in the group that they have access to (Yes, it works if you are in more than one group).

    If you don't want people to connect at all, make sure that they are not member of the ad groups that access.

    You can find the setting under user-> groups-> Edit-> ad groups.  This tab appears only if the group is assigned to an AD domain (under portals-> fields).

    NetExtender may be restricted in the same way - just make it is available only for groups you want to have.

  • Download connection for VPN log

    Logging and diagnostics of the VPN connection are a total waste of time - even after clearing logs and the connection that once, there are tens of thousands of lines of newspapers. Diagnose insists, of course, that everything is fine. By clicking Help, takes you as usual, a totally independent place - I got 30 results for "troubleshooting." What has to do with VPN, I guess Microsoft could say.

    Can I get a simple log that shows the protocols and parameters that were considered along with the results? As the old modem component logs?

    Seems they were too advanced a feature for the Member States to implement in a bare back and compact OS like Win 7... / sarcasm

    PS That is him go with not being able to open the settings window? Or connect to two connections at the same time? Or check the status of the underlying network when connecting? Fever of the modal dialog again?

    If you watched to where newspapers to find errors?

    http://Windows.Microsoft.com/en-us/Windows7/open-Event-Viewer

    http://Windows.Microsoft.com/en-us/Windows7/what-information-appears-in-event-logs-Event-Viewer

    You or the VPN server admins looked at the logs from the server using VPN?

    If it is a PPTP VPN connection?

    Don't forget you must forward/open the TCP 1723 Port through the firewall or the router, the server behind. The firewall or the router also need to be able to pass traffic GRE protocol 47. This is sometimes called PPTP pass through or VPN Pass Through or is configured automatically when the TCP 1723 Port is open on the firewall or the router.

    Test the VPN path using the PPTP Ping and VPN traffic sections on this page...

    http://TechNet.Microsoft.com/en-us/library/bb877965.aspx

    http://Windows.Microsoft.com/en-us/Windows7/why-am-I-having-problems-with-my-VPN-connection

    Troubleshooting VPN connections...

    http://blogs.technet.com/b/rrasblog/archive/2009/08/12/troubleshooting-common-VPN-related-errors.aspx

    Troubleshooting Vista VPN page that may be of little help...

    http://blogs.technet.com/b/rrasblog/archive/2007/04/08/troubleshooting-Vista-VPN-problems.aspx

    Additional help in TechNet Windows 7 Pro forums...

    http://social.technet.Microsoft.com/forums/en/w7itpronetworking/threads

    .. .or the appropriate instance of Windows Server...

    http://social.technet.Microsoft.com/forums/en/category/WindowsServer/

  • Routing problem between the VPN Client and the router's Ethernet device

    Hello

    I have a Cisco 1721 in a test environment.

    A net 172.16.0.0/19 simulates the Internet and a net 192.168.1.0/24 simulates the net, the VPN tunnel must go to (intranet).

    The net 172.16.0.0 depends on the router 0 FastEthernet, Intranet (VPN) hangs on Ethernet 0.

    The configuration was inspired form the sample Configuration

    "Configuring the Client VPN Cisco 3.x for Windows to IOS using Local extended authentication"

    and the output of the ConfigMaker configuration.

    Authentication and logon works. Client receives an IP address from the pool. But there's a routing problem

    side of routers. Ping client-side - do not work (the VPN client statistics that count encrypt them packets, but not to decrypt).

    Ping the router works too, but decrypt and encrypt customer statistics in VPN packets count progressive

    (customer has a correct route and return ICMP packets to the router).

    The question now is:

    How to route packets between the Tunnel and an Ethernet device (Ethernet 0)?

    conf of the router is attached - hope that's not too...

    Thanks & cordially

    Thomas Schmidt

    -.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.- snipp .-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.

    !

    version 12.2

    horodateurs service debug uptime

    Log service timestamps uptime

    encryption password service

    !

    !

    host name * moderator edit *.

    !

    enable secret 5 * moderator edit *.

    !

    !

    AAA new-model

    AAA authentication login userauthen local

    AAA authorization groupauthor LAN

    !

    ! only for the test...

    !

    username cisco password 0 * moderator edit *.

    !

    IP subnet zero

    !

    audit of IP notify Journal

    Max-events of po verification IP 100

    !

    crypto ISAKMP policy 3

    3des encryption

    preshared authentication

    Group 2

    !

    ISAKMP crypto client configuration group 3000client

    key cisco123

    pool ippool

    !

    ! We do not want to divide the tunnel

    ! ACL 108

    !

    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT

    !

    Crypto-map dynamic dynmap 10

    Set transform-set RIGHT

    !

    map clientmap client to authenticate crypto list userauthen

    card crypto clientmap isakmp authorization list groupauthor

    client configuration address map clientmap crypto answer

    10 ipsec-isakmp crypto map clientmap Dynamics dynmap

    !

    interface Ethernet0

    no downtime

    Description connected to VPN

    IP 192.168.1.1 255.255.255.0

    full-duplex

    IP access-group 101 in

    IP access-group 101 out

    KeepAlive 10

    No cdp enable

    !

    interface Ethernet1

    no downtime

    address 192.168.3.1 IP 255.255.255.0

    IP access-group 101 in

    IP access-group 101 out

    full-duplex

    KeepAlive 10

    No cdp enable

    !

    interface FastEthernet0

    no downtime

    Description connected to the Internet

    IP 172.16.12.20 255.255.224.0

    automatic speed

    KeepAlive 10

    No cdp enable

    !

    ! This access group is also only for test cases!

    !

    no access list 101

    access list 101 ip allow a whole

    !

    local pool IP 192.168.10.1 ippool 192.168.10.10

    IP classless

    IP route 0.0.0.0 0.0.0.0 172.16.12.20

    enable IP pim Bennett

    !

    Line con 0

    exec-timeout 0 0

    password 7 * edit from moderator *.

    line to 0

    line vty 0 4

    !

    end

    ^-^-^-^-^-^-^-^-^-^-^-^-^- snapp ^-^-^-^-^-^-^-^-^-^-^-^-^-^-

    Thomas,

    Can't wait to show something that might be there, but I don't see here. You do not have the card encryption applied to one of the interfaces, perhaps it was not copied. Assuming your description you do it, or should it be, applied to the fa0 and you are connected. Try how you ping? Since the router or a device located on E0? If you ping the router, you will need to do an extended ping of E0 to the ip address of the client has been assigned. If your just ping the router without the extension, you will get sales and decrypts that you declare on the client. Have you tried to ping from the client to interface E0? Your default route on the router is pointing to fa0? You have a next hop to affect? You have several NIC on the client pc? Turn off your other network cards to check that you don't have a problem with routing on the client if you have more than one.

    Kurtis Durrett

  • ASA Anyconnect VPN do not work or download the VPN client

    I have a Cisco ASA 5505 that I try to configure anyconnect VPN and thought, I've changed my setup several times but trying to access my static public IP address of the external IP address to download the image, I am not able to. Also when I do a package tracer I see he has been ignored through the acl when the packets from side to the ASA via port 443, it drops because of the ACL. My DMZ so will he look like something trying to access the ASA via the VPN's going to port 443. Here is my config

    XXXX # sh run
    : Saved
    :
    ASA Version 8.4 (3)
    !
    hostname XXXX
    search for domain name
    activate pFTzVNrKdD9x5rhT encrypted password
    zPBAmb8krxlXh.CH encrypted passwd
    names of
    !
    interface Ethernet0/0
    Outside-interface description
    switchport access vlan 20
    !
    interface Ethernet0/1
    Uplink DMZ description
    switchport access vlan 30
    !
    interface Ethernet0/2
    switchport access vlan 10
    !
    interface Ethernet0/3
    switchport access vlan 10
    !
    interface Ethernet0/4
    Ganymede + ID description
    switchport access vlan 10
    switchport monitor Ethernet0/0
    !
    interface Ethernet0/5
    switchport access vlan 10
    !
    interface Ethernet0/6
    switchport access vlan 10
    !
    interface Ethernet0/7
    Description Wireless_AP_Loft
    switchport access vlan 10
    !
    interface Vlan10
    nameif inside
    security-level 100
    IP 192.168.10.1 255.255.255.0
    !
    interface Vlan20
    nameif outside
    security-level 0
    IP address x.x.x.249 255.255.255.248
    !
    Vlan30 interface
    no interface before Vlan10
    nameif dmz
    security-level 50
    IP 172.16.30.1 255.255.255.0
    !
    boot system Disk0: / asa843 - k8.bin
    passive FTP mode
    DNS lookup field inside
    DNS domain-lookup outside
    DNS domain-lookup dmz
    DNS server-group DefaultDNS
    Name-Server 8.8.8.8
    Server name 8.8.4.4
    search for domain name
    network obj_any1 object
    subnet 0.0.0.0 0.0.0.0
    network of the Webserver_DMZ object
    Home 172.16.30.8
    network of the Mailserver_DMZ object
    Home 172.16.30.7
    the object DMZ network
    172.16.30.0 subnet 255.255.255.0
    network of the FTPserver_DMZ object
    Home 172.16.30.9
    network of the Public-IP-subnet object
    subnet x.x.x.248 255.255.255.248
    network of the FTPserver object
    Home 172.16.30.8
    network of the object inside
    192.168.10.0 subnet 255.255.255.0
    network of the VPN_SSL object
    10.101.4.0 subnet 255.255.255.0
    outside_in list extended access permit tcp any newspaper object Mailserver_DMZ eq www
    outside_in list extended access permit tcp any newspaper EQ 587 Mailserver_DMZ object
    outside_in list extended access permit tcp any newspaper SMTP object Mailserver_DMZ eq
    outside_in list extended access permit tcp any newspaper of the Mailserver_DMZ eq pop3 object
    outside_in list extended access permit tcp any newspaper EQ 2525 Mailserver_DMZ object
    outside_in list extended access permit tcp any newspaper of the Mailserver_DMZ eq imap4 object
    outside_in list extended access permit tcp any newspaper EQ 465 Mailserver_DMZ object
    outside_in list extended access permit tcp any newspaper EQ 993 Mailserver_DMZ object
    outside_in list extended access permit tcp any newspaper EQ 995 object Mailserver_DMZ
    outside_in list extended access permit tcp any newspaper EQ 5901 Mailserver_DMZ object
    outside_in list extended access permit tcp any newspaper Mailserver_DMZ eq https object
    Note access list ACL for VPN Tunnel from Split vpn_SplitTunnel
    vpn_SplitTunnel list standard access allowed 192.168.10.0 255.255.255.0
    pager lines 24
    Enable logging
    timestamp of the record
    exploitation forest-size of the buffer to 8192
    logging trap warnings
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    MTU 1500 dmz
    local pool VPN_SSL 10.101.4.1 - 10.101.4.4 255.255.255.0 IP mask
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 647.bin
    don't allow no asdm history
    ARP timeout 14400
    NAT (inside, outside) static source inside inside static destination VPN_SSL VPN_SSL
    NAT (exterior, Interior) static source VPN_SSL VPN_SSL
    !
    network obj_any1 object
    NAT static interface (indoor, outdoor)
    network of the Webserver_DMZ object
    NAT (dmz, outside) static x.x.x.250
    network of the Mailserver_DMZ object
    NAT (dmz, outside) static x.x.x.. 251
    the object DMZ network
    NAT (dmz, outside) static interface
    Access-group outside_in in external interface
    Route outside 0.0.0.0 0.0.0.0 x.x.x.254 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    AAA-server protocol Ganymede HNIC +.
    AAA-server host 192.168.10.2 HNIC (inside)
    Timeout 60
    key *.
    identity of the user by default-domain LOCAL
    Console HTTP authentication AAA HNIC
    AAA console HNIC ssh authentication
    Console AAA authentication telnet HNIC
    AAA authentication secure-http-client
    http 192.168.10.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ca trustpoint localtrust
    registration auto
    Configure CRL
    Crypto ca trustpoint VPN_Articulate2day
    registration auto
    name of the object CN = vpn.articulate2day.com
    sslvpnkey key pair
    Configure CRL
    Telnet 192.168.10.0 255.255.255.0 inside
    Telnet timeout 30
    SSH 192.168.10.0 255.255.255.0 inside
    SSH timeout 15
    SSH version 2
    Console timeout 0
    No vpn-addr-assign aaa

    DHCP-client update dns
    dhcpd dns 8.8.8.8 8.8.4.4
    dhcpd outside auto_config
    !
    dhcpd address 192.168.10.100 - 192.168.10.150 inside
    dhcpd allow inside
    !
    dhcpd address dmz 172.16.30.20 - 172.16.30.23
    dhcpd enable dmz
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    authenticate the NTP
    NTP server 192.168.10.2
    WebVPN
    allow outside
    AnyConnect image disk0:/anyconnect-linux-64-3.1.06079-k9.pkg 1
    AnyConnect enable
    tunnel-group-list activate
    internal VPN_SSL group policy
    VPN_SSL group policy attributes
    value of server DNS 8.8.8.8
    client ssl-VPN-tunnel-Protocol
    Split-tunnel-policy tunnelspecified
    value of Split-tunnel-network-list vpn_SplitTunnel
    the address value VPN_SSL pools
    WebVPN
    activate AnyConnect ssl dtls
    AnyConnect Dungeon-Installer installed
    AnyConnect ssl keepalive 15
    AnyConnect ssl deflate compression
    AnyConnect ask enable
    ronmitch50 spn1SehCw8TvCzu7 encrypted password username
    username ronmitch50 attributes
    type of remote access service
    type tunnel-group VPN_SSL_Clients remote access
    attributes global-tunnel-group VPN_SSL_Clients
    address VPN_SSL pool
    Group Policy - by default-VPN_SSL
    tunnel-group VPN_SSL_Clients webvpn-attributes
    enable VPNSSL_GNS3 group-alias
    type tunnel-group VPN_SSL remote access
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    Review the ip options
    inspect esmtp
    !
    global service-policy global_policy
    context of prompt hostname
    no remote anonymous reporting call
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:d41d8cd98f00b204e9800998ecf8427e
    : end

    XXXX #.

    You do not have this configuration:

     object network DMZ nat (dmz,outside) static interface

    Try and take (or delete):

     object network DMZ nat (dmz,outside) dynamic interface

  • Connection to the VPN Client 5.0.07 returns error 443 (activity included)

    I got the Cisco VPN Client to work on my windows 8.1 box, but my windows 10 box gives me some issues.

    I am trying to connect to a Cisco VPN using Cisco VPN Client 5.0.07.0290. 10 Windows.  The first Cisco VPN would not install and I discovered that I had to install Citrix DNE before installing Cisco VPN. I did it and now the Cisco VPN client installs fine.

    Now, I get an error 443 with the following log information when I try to connect:

    ---

    Config files directory: C:\Program Files (x 86) \Cisco Systems\VPN Client\
     
    1 20:31:03.517 23/07/15 Sev = WARNING/2 CVPND/0xA3400017
    Download key failed.
     
    2 20:31:03.517 23/07/15 Sev = WARNING/3 IKE/0xE3000002
    Function download_key_entry failed with the error code of 0 x 00000000(ISAWIN:346)
     
    3 20:31:03.518 23/07/15 Sev = WARNING/3 IKE/0xE3000050
    Failed to load IPsec keys
     
    4 20:31:03.518 23/07/15 Sev = WARNING/2 IKE/0xE30000A7
    SW unexpected error during the processing of negotiator fast Mode:(Navigator:2263)
     
    5 20:31:03.533 23/07/15 Sev = WARNING/2 IPSEC/0xE3700003
    Function CniMemRealloc() failed with the error code of 0 x 00000000 (IPSecDrvBSafeMem:152)
    ---
     
    in the event logs, I see the following error message:

    Service Service VPN from Cisco Systems, Inc. is marked as an interactive service. However, the system is configured to not allow interactive services. This service may not function properly.

    ----
    Things I've tried:
     
    I took the SSL certificate to my computer that works (windows 8.1) and installed on my machine Windows 10 and ensured that it was valid. I then imported it in the Cisco client. It did not work.
     
    I checked the registry to ensure there was incorrect data in the DisplayName value, and that works.
     
    Any thoughts on what I might try next?

    Hello Onimallar,

    I had this same problem with my Windows 64-bit 10.  But on my 32-bit Windows 10 VM the Client VPN Cisco worked OK.  So I looked into the differences.  It seems that Setup 64-bit VPN client cannot change the network settings to add the network client 'DNE light filter' required for the properties of the network adapter.

    I tried the Citrix DNE update, and while that helped Cisco VPN Client install successfully on my 64-bit machine, it would not establish a connection.

    Using the differences, I removed the two of the DNE Updater and Cisco VPN Client, and then installed 64-bit Dell SonicWall VPN Client, as this has been installed in my VM 32 bits (the 32-bit version).  This added the workstation network DNE filter of my 64-bit machine.  I reinstalled the Cisco VPN Client successfully and was able to connect to a remote site with success.

    It worked for me.

    You can download the SonicWall VPN Client from:

    https://support.software.Dell.com/SonicWALL-Global-VPN-client/Windows%20...

  • In the VPN 3000 concentrators network access problem

    Hello

    I created a group user ID, allowing simultaneously 3 session of this particular ID, when I am session VPN initating this particular ID, I can connect to a single session with any problem, and I can access the internal network. simulatneously trying another session from another machine using the same user ID, I get the ip address of the VPN server's internal network, but I can't ping internal LAN server and perform operations .only I get the IP address. But I'm nt problem in first session created, they problem arrive for the second session

    Are the next two sessions of the clients that are behind a NAT/firewall device? Try to create a second group ID and log in to the second client and the second. If you still have the problem is not a problem of "simultaneous session."

    If you see the problem either, and your customers are both behind the same NAT device, have your clients connect from different locations or enable NAT traversal.

  • The VPN client user authentication

    When users connect to our network remotely via VPN user name field is already filled with the last person who logged. I know that they just delete the username and enter their own, but is there a way the client can be configured to where the username field will be always empty for all those who want access to the network via VPN? We have an ASA 5510 with version 7.0 (8) and a windows 2003 with IAS server for windows authentication. Thank you!

    Hello

    In FCP, you can configure a single line is not editable by the user (or the vpn client).

    Simply insert an attack! Like this

    ! Username =

    ! SaveUserPassword = 0

    ! UserPassword =

    ! enc_UserPassword =

    Subsequently the vpn client will not save registrations for these settings more.

  • Impossible to pass traffic through the VPN tunnel

    I have an ASA 5505 9.1 running.   I have the VPN tunnel connection, but I am not able to pass traffic. through the tunnel. Ping through the internet works fine.

    Here is my config

    LN-BLF-ASA5505 > en
    Password: *.
    ASA5505-BLF-LN # sho run
    : Saved
    :
    : Serial number: JMX1216Z0SM
    : Material: ASA5505, 256 MB RAM, 500 MHz Geode Processor
    :
    ASA 5,0000 Version 21
    !
    LN-BLF-ASA5505 hostname
    domain lopeznegrete.com
    activate the password
    volatile xlate deny tcp any4 any4
    volatile xlate deny tcp any4 any6
    volatile xlate deny tcp any6 any4
    volatile xlate deny tcp any6 any6
    volatile xlate deny udp any4 any4 eq field
    volatile xlate deny udp any4 any6 eq field
    volatile xlate deny udp any6 any4 eq field
    volatile xlate deny udp any6 any6 eq field
    passwd
    names of
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 192.168.116.254 255.255.255.0
    OSPF cost 10
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP 50.201.218.69 255.255.255.224
    OSPF cost 10
    !
    boot system Disk0: / asa915-21 - k8.bin
    passive FTP mode
    DNS server-group DefaultDNS
    domain lopeznegrete.com
    network obj_any object
    subnet 0.0.0.0 0.0.0.0
    the LNC_Local_TX_Nets object-group network
    Description of internal networks Negrete Lopez (Texas)
    object-network 192.168.1.0 255.255.255.0
    object-network 192.168.2.0 255.255.255.0
    object-network 192.168.3.0 255.255.255.0
    object-network 192.168.4.0 255.255.255.0
    object-network 192.168.5.0 255.255.255.0
    object-network 192.168.51.0 255.255.255.0
    object-network 192.168.55.0 255.255.255.0
    object-network 192.168.52.0 255.255.255.0
    object-network 192.168.20.0 255.255.255.0
    object-network 192.168.56.0 255.255.255.0
    object-network 192.168.59.0 255.255.255.0
    object-network 10.111.14.0 255.255.255.0
    object-network 10.111.19.0 255.255.255.0
    the LNC_Blueleaf_Nets object-group network
    object-network 192.168.116.0 255.255.255.0
    access outside the permitted scope icmp any4 any4 list
    extended outdoor access allowed icmp a whole list
    outside_1_cryptomap list extended access permitted ip object-group LNC_Blueleaf_Nets-group of objects LNC_Local_TX_Nets
    inside_nat0_outbound list extended access permitted ip object-group LNC_Blueleaf_Nets-group of objects LNC_Local_TX_Nets
    LNC_BLF_HOU_VPN list extended access permitted ip object-group LNC_Blueleaf_Nets-group of objects LNC_Local_TX_Nets
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    no failover
    ICMP unreachable rate-limit 1 burst-size 1
    ASDM image disk0: / asdm - 741.bin
    don't allow no asdm history
    ARP timeout 14400
    no permit-nonconnected arp
    !
    network obj_any object
    NAT dynamic interface (indoor, outdoor)
    outside access-group in external interface
    !
    router ospf 1
    255.255.255.255 network 192.168.116.254 area 0
    Journal-adj-changes
    default-information originate always
    !
    Route outside 0.0.0.0 0.0.0.0 50.201.218.94 1
    Timeout xlate 03:00
    Pat-xlate timeout 0:00:30
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    Floating conn timeout 0:00:00
    dynamic-access-policy-registration DfltAccessPolicy
    identity of the user by default-domain LOCAL
    the ssh LOCAL console AAA authentication
    AAA authentication enable LOCAL console
    Enable http server
    http 192.168.2.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA esp - esp-sha-hmac
    Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA aes - esp esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-esp - aes esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-AES-128-SHA-TRANS-aes - esp esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-128-MD5-TRANS-aes - esp esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-esp-3des esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transit
    Crypto ipsec transform-set ikev1 esp ESP-DES-MD5-esp-md5-hmac
    Crypto ipsec transform-set ikev1 ESP-DES-SHA-TRANS esp - esp-sha-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transit
    Crypto ipsec transform-set ikev1 ESP-DES-MD5-TRANS esp - esp-md5-hmac
    Crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transit
    Crypto ipsec pmtu aging infinite - the security association
    card crypto outside_map 1 match address outside_1_cryptomap
    peer set card crypto outside_map 1 50.201.218.93
    card crypto outside_map 1 set transform-set ESP-3DES-SHA ikev1
    outside_map interface card crypto outside
    Crypto ca trustpoint _SmartCallHome_ServerCA
    no use of validation
    Configure CRL
    trustpool crypto ca policy
    Crypto ca certificate chain _SmartCallHome_ServerCA
    certificate ca 6ecc7aa5a7032009b8cebcf4e952d491
    308204 4 a0030201 d 308205ec 0202106e cc7aa5a7 032009b 8 cebcf4e9 52d 49130
    010105 05003081 09060355 04061302 55533117 ca310b30 0d 864886f7 0d06092a
    30150603 55040 has 13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
    13165665 72695369 676e2054 72757374 204e6574 776f726b 313 has 3038 06035504
    0b 133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
    20617574 7a 656420 75736520 6f6e6c79 31453043 06035504 03133c 56 686f7269
    65726953 69676e20 436c 6173 73203320 5075626c 69632050 72696 72792043 61 d
    65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31
    30303230 38303030 3030305a 170d 3230 30323037 32333539 35395a 30 81b5310b
    30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
    496e632e 311f301d 06035504 0b 131656 65726953 69676e20 54727573 74204e65
    74776f72 6b313b30 5465726d 20757365 20617420 73206f66 39060355 040b 1332
    68747470 7777772e 733a2f2f 76657269 7369676e 2e636f6d 2f727061 20286329
    302d 0603 55040313 26566572 69536967 61737320 33205365 6e20436c 3130312f
    63757265 20536572 76657220 20473330 82012230 0d06092a 864886f7 4341202d
    010101 05000382 010f0030 82010 0d has 02 b187841f 82010100 c20c45f5 bcab2597
    a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10
    9c688b2e 957b899b 13cae234 34c1f35b f3497b62 d188786c 83488174 0253f9bc
    7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b
    15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845
    1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8 63cd
    18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced
    4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f
    81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 01 has 38201 02030100 df308201
    082b 0601 05050701 01042830 26302406 082 b 0601 db303406 05050730 01861868
    7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1 d 130101
    ff040830 02010030 70060355 b 200469 30673065 060, 6086 480186f8 1 d 060101ff
    45010717 03305630 2806082b 06010505 07020116 1 c 687474 70733a2f 2f777777
    2e766572 69736967 6e2e636f 6d2f6370 73302 has 06 082 b 0601 05050702 02301e1a
    1 c 687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406
    03551d1f 042d302b 3029 has 027 a0258623 68747470 3a2f2f63 726c2e76 65726973
    69676e2e 636f6d2f 2d67352e 70636133 63726c 30 0e060355 1d0f0101 ff040403
    02010630 6d06082b 06010505 07010c 59305730 55160969 5da05b30 04 61305fa1
    6 d 616765 2f676966 3021301f 2b0e0302 30070605 1a04148f e5d31a86 ac8d8e6b
    c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973
    69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30
    1 b 311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301D 0603
    445 1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355 c 1604140d 551d0e04
    1 230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300 d 0609 d
    2a 864886 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80 f70d0101
    4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e
    b2227055 d9203340 3307c 265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a
    99 c 71928 8705 404167d 1 273aeddc 866d 24f78526 a2bed877 7d494aca 6decd018
    481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16
    b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0
    5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8
    6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28
    6c2527b9 deb78458 c61f381e a4c4cb66
    quit smoking
    crypto isakmp identity address
    Crypto isakmp nat-traversal 1500
    Crypto ikev1 allow outside
    IKEv1 crypto policy 10
    preshared authentication
    aes-256 encryption
    sha hash
    Group 5
    life 86400
    IKEv1 crypto policy 65535
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet timeout 5
    SSH stricthostkeycheck
    SSH 0.0.0.0 0.0.0.0 inside
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 5
    SSH version 2
    SSH group dh-Group1-sha1 key exchange
    Console timeout 0
    management-access inside

    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    attributes of Group Policy DfltGrpPolicy
    Ikev1 VPN-tunnel-Protocol l2tp ipsec without ssl-client
    username
    username
    tunnel-group 50.201.218.93 type ipsec-l2l
    IPSec-attributes tunnel-group 50.201.218.93
    IKEv1 pre-shared-key *.
    NOCHECK Peer-id-validate
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    Review the ip options
    !
    global service-policy global_policy
    context of prompt hostname
    call-home service
    anonymous reporting remote call
    call-home
    contact-email-addr [email protected] / * /
    Profile of CiscoTAC-1
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:e519f212867755f697101394f40d9ed7
    : end
    LN-BLF-ASA5505 #.

    Assuming that you have an active IPSEC security association (i.e. "show crypto ipsec his" shows the tunnel is up), please perform a packet trace to see why it's a failure:

     packet-tracer input inside tcp 192.168.116.1 1025 192.168.1.1 80 detail

    (simulating a hypothetical customer of blue LNC tries to navigate to a hypothetical LNC TX Local site server)

  • Terminating the VPN client on 871W

    Hello

    I tried to install EasyVPN on a cisco 871W by SDM. The goal is to finish the VPN client with authentication with an external RADIUS/advertising (on a local subnet). I implemented the IAS on a win2003 Server advertising and checked the accounts.

    SDM was missing the 'crypto map' piece of config. After you add this in the CLI it still didn't work. Thus, EasyVPN is not as easy at is sounds...

    Could someone with some knowledge of VPN and IPsec and so forth please look at this config? Maybe it gives me an idea of what I did wrong (which, without a doubt, must be the case).

    Thank you

    Erik

    ==

    AAA new-model
    !
    AAA rad_eap radius server group
    auth-port 1645 10.128.7.5 Server acct-port 1646
    !
    AAA rad_mac radius server group
    !
    AAA rad_acct radius server group
    !
    AAA rad_admin radius server group
    !
    AAA server Ganymede group + tac_admin
    !
    AAA rad_pmip radius server group
    !
    RADIUS server AAA dummy group
    !
    AAA authentication login default local
    AAA authentication login eap_methods group rad_eap
    AAA authentication login mac_methods local
    AAA authentication login sdm_vpn_xauth_ml_1 local
    AAA authorization exec default local
    AAA authorization ipmobile default group rad_pmip
    AAA authorization sdm_vpn_group_ml_1 LAN
    AAA accounting network acct_methods
    action-type market / stop
    Group rad_acct
    !
    !
    !
    AAA - the id of the joint session
    clock timezone MET 1
    clock to DST DST PUTS recurring last Sun Mar 02:00 last Sun Oct 02:00
    !
    Crypto pki trustpoint TP-self-signed-1278336536
    enrollment selfsigned
    name of the object cn = IOS - Self - signed - certificate - 1278336536
    revocation checking no
    rsakeypair TP-self-signed-1278336536
    !
    !
    TP-self-signed-1278336536 crypto pki certificate chain
    certificate self-signed 01
    3082024A 308201B 3 A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
    2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
    69666963 31323738 33333635 6174652D 3336301E 170 3039 31303237 32313237
    32395A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
    4F532D53 5369676E 656C662D 43 65727469 66696361 74652 31 32373833 65642D
    33363533 3630819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
    81008B 56 5902F5DF FCE1A56E 3A63350E 45956514 1767EF73 FEC6CD16 7E982A82
    B0AF8546 ABB3D35A B7C3A7E3 3ACCB34A 8B655C97 F103DBD5 9AAEFEFC 37A 02103
    4EFC398B 0C8B6BE5 AD3E568E 6CB69F87 CBCA0785 EAED0A28 726F2F0A B0B0453E
    32E6B3B7 861F87FA 222197DD 3410D8A9 35939E9B CBF95F20 B8DA6ADE BF460F5C
    BF8F0203 010001A 3 72307030 130101 1 FF040530 030101FF 301D 0603 0F060355
    551 1104 16301482 12444341 4E495430 302E6361 6E2D6974 2E657530 1F060355
    1 230418 30168014 84C9223E 661B2EB4 5BAB0B0E 1BE3A27A 64B3AEB0 301D 0603
    551D0E04 16041484 C9111E66 1B2EB45B AB0B0E1B E3A27A64 B3AEB030 0D06092A
    010104 05000381 8693B 599 70EC1F1A D2995276 F3E4AF9D 81002F4A 0D 864886F7
    17E3583A 46C749F9 38743E6F F5E60478 5B9B5091 E944C689 7BA6DCA2 94D2FBD3
    AFDE4500 A0A3644E 603A852D 55ED7A87 93501D5C 1662DAED 3FFFEC5A F1C38ED4
    E0787561 BA5C14A3 6D065FCF 7DBDEBB6 9186C2D9 AA253FBF A9E38BC3 342C3AC9
    2BEF6821 E4C50277 493AD5B6 2AFE
    quit smoking
    dot11 syslog
    !
    IP source-route
    !
    !
    DHCP excluded-address IP 10.128.1.250 10.128.1.254
    DHCP excluded-address IP 10.128.150.250 10.128.150.254
    DHCP excluded-address IP 10.128.7.0 10.128.7.100
    DHCP excluded-address IP 10.128.7.250 10.128.7.254
    !
    pool IP dhcp VLAN30-COMMENTS
    import all
    Network 10.128.1.0 255.255.255.0
    router by default - 10.128.1.254
    10.128.7.5 DNS server
    -10.128.7.5 NetBIOS name server
    aaa.com domain name
    4 rental
    !
    IP dhcp VLAN20-STAFF pool
    import all
    Network 10.128.150.0 255.255.255.0
    router by default - 10.128.150.254
    10.128.7.5 DNS server
    -10.128.7.5 NetBIOS name server
    aaa.com domain name
    4 rental
    !
    IP dhcp SERVERS VLAN10 pool
    import all
    Network 10.128.7.0 255.255.255.0
    router by default - 10.128.7.254
    10.128.7.5 DNS server
    -10.128.7.5 NetBIOS name server
    aaa.com domain name
    4 rental
    !
    !
    IP cef
    no ip domain search
    IP domain name aaa.com
    inspect the tcp IP MYFW name
    inspect the IP udp MYFW name
    No ipv6 cef
    !
    Authenticated MultiLink bundle-name Panel
    !
    VPDN enable
    !
    !
    !
    username privilege 15 secret 5 xxxx xxxx
    !
    !
    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    !
    ISAKMP crypto client configuration group vpn
    key xxxx
    pool SDM_POOL_1
    netmask 255.255.255.0
    !
    !
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    !
    crypto dynamic-map SDM_DYNMAP_1 1
    market arriere-route
    !
    !
    card crypto SDM_CMAP_1 client authentication list sdm_vpn_xauth_ml_1
    map SDM_CMAP_1 isakmp authorization list sdm_vpn_group_ml_1 crypto
    client configuration address map SDM_CMAP_1 crypto answer
    map SDM_CMAP_1 65535-isakmp dynamic SDM_DYNMAP_1 ipsec crypto
    !
    Crypto ctcp port 10000
    Archives
    The config log
    hidekeys
    !
    !
    !
    Bridge IRB
    !
    !
    interface Loopback0
    10.128.201.1 the IP 255.255.255.255
    map SDM_CMAP_1 crypto
    !
    interface FastEthernet0
    switchport access vlan 10
    !
    interface FastEthernet1
    switchport access vlan 20
    !
    interface FastEthernet2
    switchport access vlan 10
    !
    interface FastEthernet3
    switchport access vlan 30
    !
    interface FastEthernet4
    no ip address
    Speed 100
    full-duplex
    PPPoE enable global group
    PPPoE-client dial-pool-number 1
    No cdp enable
    !
    interface Dot11Radio0
    no ip address
    Shutdown
    No dot11 extensions aironet
    !
    interface Vlan1
    address IP AAA. BBB. CCC.177 255.255.255.240
    no ip redirection
    no ip proxy-arp
    NAT outside IP
    no ip virtual-reassembly
    No autostate
    Hold-queue 100 on
    !
    interface Vlan10
    SERVER description
    no ip address
    IP nat inside
    no ip virtual-reassembly
    No autostate
    Bridge-group 10
    Bridge-group of 10 disabled spanning
    !
    interface Vlan20
    Description of the STAFF
    no ip address
    IP nat inside
    no ip virtual-reassembly
    No autostate
    Bridge-group 20
    Bridge-group 20 covering people with reduced mobility
    !
    Vlan30 interface
    Description COMMENTS
    no ip address
    IP nat inside
    no ip virtual-reassembly
    No autostate
    Bridge-group 30
    Bridge-group 30 covering people with reduced mobility
    !
    interface Dialer1
    MTU 1492
    IP unnumbered Vlan1
    no ip redirection
    no ip proxy-arp
    NAT outside IP
    inspect the MYFW over IP
    IP virtual-reassembly
    encapsulation ppp
    Dialer pool 1
    Dialer-Group 1
    PPP authentication pap callin
    PPP pap sent-name of user password 7 xxxx xxxxx
    !
    interface BVI10
    Description the server network bridge
    IP 10.128.7.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    !
    interface BVI20
    Description personal network bridge
    IP 10.128.150.254 255.255.255.0
    IP nat inside
    IP virtual-reassembly
    !
    interface BVI30
    Bridge network invited description
    IP 10.128.1.254 255.255.255.0
    IP access-group Guest-ACL in
    IP nat inside
    IP virtual-reassembly
    !
    pool of local SDM_POOL_1 192.168.2.1 IP 192.168.2.100
    IP forward-Protocol ND
    IP route 0.0.0.0 0.0.0.0 Dialer1
    IP http server
    access-class 2 IP http
    local IP http authentication
    IP http secure server
    IP http secure ciphersuite 3des-ede-cbc-sha
    IP http secure-client-auth
    IP http timeout policy slowed down 60 life 86400 request 10000
    !
    !
    overload of IP nat inside source list 101 interface Vlan1
    IP nat inside source static tcp 10.128.7.1 25 AAA. BBB. Expandable 25 CCC.178
    IP nat inside source static tcp 10.128.7.1 80 AAA. BBB. CCC.178 extensible 80
    IP nat inside source static tcp 10.128.7.1 443 AAA. BBB. CCC.178 extensible 443
    IP nat inside source static tcp 10.128.7.1 8333 AAA. BBB. CCC.178 extensible 8333
    IP nat inside source static tcp 10.128.7.2 25 AAA. BBB. Expandable 25 CCC.179
    IP nat inside source static tcp 10.128.7.2 80 AAA. BBB. CCC.179 extensible 80
    IP nat inside source static tcp 10.128.7.2 443 AAA. BBB. CCC.179 extensible 443
    IP nat inside source static tcp 10.128.7.2 8333 AAA. BBB. CCC.179 extensible 8333
    IP nat inside source static tcp 10.128.7.3 25 AAA. BBB. Expandable 25 CCC.180
    IP nat inside source static tcp 10.128.7.3 80 AAA. BBB. CCC.180 extensible 80
    IP nat inside source static tcp 10.128.7.3 443 AAA. BBB. CCC.180 extensible 443
    IP nat inside source static tcp 10.128.7.3 8333 AAA. BBB. CCC.180 extensible 8333
    IP nat inside source static tcp 10.128.7.4 25 AAA. BBB. Expandable 25 CCC.181
    IP nat inside source static tcp 10.128.7.4 80 AAA. BBB. CCC.181 extensible 80
    IP nat inside source static tcp 10.128.7.4 443 AAA. BBB. CCC.181 extensible 443
    IP nat inside source static tcp 10.128.7.4 8333 AAA. BBB. CCC.181 extensible 8333
    IP nat inside source static tcp 10.128.7.5 25 AAA. BBB. Expandable 25 CCC.182
    IP nat inside source static tcp 10.128.7.5 80 AAA. BBB. CCC.182 extensible 80
    IP nat inside source static tcp 10.128.7.5 443 AAA. BBB. CCC.182 extensible 443
    IP nat inside source static tcp 10.128.7.5 8333 AAA. BBB. CCC.182 extensible 8333
    IP nat inside source static tcp 10.128.7.6 25 AAA. BBB. Expandable 25 CCC.183
    IP nat inside source static tcp 10.128.7.6 80 AAA. BBB. CCC.183 extensible 80
    IP nat inside source static tcp 10.128.7.6 443 AAA. BBB. CCC.183 extensible 443
    IP nat inside source static tcp 10.128.7.6 8333 AAA. BBB. CCC.183 extensible 8333
    IP nat inside source static tcp 10.128.7.7 25 AAA. BBB. Expandable 25 CCC.184
    IP nat inside source static tcp 10.128.7.7 80 AAA. BBB. CCC.184 extensible 80
    IP nat inside source static tcp 10.128.7.7 443 AAA. BBB. CCC.184 extensible 443
    IP nat inside source static tcp 10.128.7.7 8333 AAA. BBB. CCC.184 extensible 8333
    IP nat inside source static tcp 10.128.7.8 25 AAA. BBB. Expandable 25 CCC.185
    IP nat inside source static tcp 10.128.7.8 80 AAA. BBB. CCC.185 extensible 80
    IP nat inside source static tcp 10.128.7.8 443 AAA. BBB. CCC.185 extensible 443
    IP nat inside source static tcp 10.128.7.8 8333 AAA. BBB. CCC.185 extensible 8333
    IP nat inside source static tcp 10.128.7.9 25 AAA. BBB. Expandable 25 CCC.186
    IP nat inside source static tcp 10.128.7.9 80 AAA. BBB. CCC.186 extensible 80
    IP nat inside source static tcp 10.128.7.9 443 AAA. BBB. CCC.186 extensible 443
    IP nat inside source static tcp 10.128.7.9 8333 AAA. BBB. CCC.186 extensible 8333
    IP nat inside source static tcp 10.128.7.10 25 AAA. BBB. Expandable 25 CCC.187
    IP nat inside source static tcp 10.128.7.10 80 AAA. BBB. CCC.187 extensible 80
    IP nat inside source static tcp 10.128.7.10 443 AAA. BBB. CCC.187 extensible 443
    IP nat inside source static tcp 10.128.7.10 8333 AAA. BBB. CCC.187 extensible 8333
    IP nat inside source static tcp 10.128.7.11 25 AAA. BBB. Expandable 25 CCC.188
    IP nat inside source static tcp 10.128.7.11 80 AAA. BBB. CCC.188 extensible 80
    IP nat inside source static tcp 10.128.7.11 443 AAA. BBB. CCC.188 extensible 443
    IP nat inside source static tcp 10.128.7.11 8333 AAA. BBB. CCC.188 extensible 8333
    IP nat inside source static tcp 10.128.7.12 25 AAA. BBB. Expandable 25 CCC.189
    IP nat inside source static tcp 10.128.7.12 80 AAA. BBB. CCC.189 extensible 80
    IP nat inside source static tcp 10.128.7.12 443 AAA. BBB. CCC.189 extensible 443
    IP nat inside source static tcp 10.128.7.12 8333 AAA. BBB. CCC.189 extensible 8333
    !
    Guest-ACL extended IP access list
    deny ip any 10.128.7.0 0.0.0.255
    deny ip any 10.128.150.0 0.0.0.255
    allow an ip
    IP Internet traffic inbound-ACL extended access list
    allow udp any eq bootps any eq bootpc
    permit any any icmp echo
    permit any any icmp echo response
    permit icmp any any traceroute
    allow a gre
    allow an esp
    !
    access-list 1 permit 10.128.7.0 0.0.0.255
    access-list 1 permit 10.128.150.0 0.0.0.255
    access-list 1 permit 10.128.1.0 0.0.0.255
    access-list 2 allow 10.0.0.0 0.255.255.255
    access-list 2 refuse any
    access-list 101 permit ip 10.128.7.0 0.0.0.255 any
    access-list 101 permit ip 10.128.150.0 0.0.0.255 any
    access-list 101 permit ip 10.128.1.0 0.0.0.255 any
    Dialer-list 1 ip Protocol 1
    !
    !
    !
    !
    format of server RADIUS attribute 32 include-in-access-req hour
    RADIUS-server host 10.128.7.5 auth-port 1645 acct-port 1646 borders 7 xxxxx
    RADIUS vsa server send accounting
    !
    control plan
    !
    IP route 10 bridge
    IP road bridge 20
    IP road bridge 30
    Banner motd ^.
    Unauthorized access prohibited. *
    All access attempts are logged! ***************

    ^
    !
    Line con 0
    password 7 xxxx
    no activation of the modem
    line to 0
    line vty 0 4
    access-class 2
    privilege level 15
    transport input telnet ssh
    !
    max-task-time 5000 Planner
    AAA.BBB.CCC.ddd NTP server
    end

    Erik,

    The address pool you are talking about is to assign to the customer or the public router interface?  If you want to set up your vpn client software point a full domain name instead of an IP address that you can do it too long you can ensure the use of the name is resolved by a DNS SERVER.

    The range of addresses that you can be asigned to your Dialer interface will depend on your ISP.

    -Butterfly

Maybe you are looking for