tunnel VPN ZFW problem
Recently I tried to build a tunnel VPN of LAN LAN 2 connecting an Asa to a current zone based firewall 2911. It's a standard IPSec psk tunnel nothing complicated. I got the tunnel to establish, but I could only get traffic to encap on the side of the SAA and decap on the side of 2911. I couldn't return circulation. I followed this doc classic here for IPSec in the last example.
http://www.Cisco.com/en/us/prod/collateral/vpndevc/ps5708/ps5710/ps1018/...
And I don't know that the SAA is right I have built a ton of those but I am new to zfw. I don't see anything about a NAT rule exempt. But as all used real IPs instead of NAT I wasn't sure and I have found no info. I do free NAT? If If you are using a roadmap on the end you NAT overload line config as in the past?
I also have a pair of area to "self" and I didn't know if I need something there to be able to do a ping from inside the 2911 interface when the tunnel is at the top of the remote end. Thank you
Is the pair area yourself, outside of itself?
And you say that you do not use only NAT, have real addresses (public routable addresses?), so why you have to make an exception for NAT you have not?
Tags: Cisco Security
Similar Questions
-
With tunnel VPN ASA5505 problem
The business needs is for a VLAN again on site to go directly back to an internet service to site B.
Site A and B are connected by a service of WES MB 100.
A site is a site of campus with about 25 switches. Him become VLAN on the site is for the engineer access only, so they can access their companys remote access service. This VLAN must stay back so there is very little potential of a trade-off on the live network.
The solution that I just put in place is to place an ASA5505 as the dhcp server for him VLAN become to Site A. All clients on that VLAN become get a 192.168.100.x address. The external interface on the ASA5505 to Site A is put on the live network to allow a site VPN tunnel to be put in place between the ASA5505 and the Internet - an another ASA5505 firewall
The Site A ASA5505 was put in place with inside and outside interfaces with the same level of security. 192.168.100.x subnet is exempt from NAT. Traffic is configured to transmit via the interfaces with the same level of security and the tunnel of L2L is coming.
But I can not all connectivity to the internet from any host on the 192.168.100.x VLAN.
This is made more complex because the external interfaces on both of the ASA are the corporate network...
The default route to the Site B ASA5505 is 87.xx.xx.1, the ISP router.
The Site B ASA5505 connects directly to the ISP router.
Site has ASA5505
--------------------
access-list no. - nat extended ip 192.168.100.0 allow 255.255.255.0 any
Access access-list ON scope ip 192.168.100.0 allow 255.255.255.0 any
NAT (inside) - access list 0 no - nat
Access-Group No. - nat inside interface
Route outside 0.0.0.0 0.0.0.0 10.0.99.254 1
Crypto ipsec transform-set AES-256 aes-256-esp esp-sha-hmac
vpn-traffic 10 crypto card matches the address OUT access
card crypto vpn-traffic 10 peers set ##Site B IP address #.
card crypto vpn-traffic 10 game of transformation-AES-256
vpn-traffic outside crypto map interface
tunnel-group ##Site B IP address # type ipsec-l2l
tunnel-group ##Site B IP address # ipsec - attributes
pre-shared-key *.
Site B ASA5505
-------------------
permit same-security-traffic intra-interface
access-list no. - nat extended ip 192.168.100.0 allow 255.255.255.240 all
outside_access_in of access allowed any ip an extended list
Global (inside) 1 interface
NAT (inside) - access list 0 no - nat
NAT (outside) 1 192.168.100.0 255.255.255.0
Access-Group No. - nat inside interface
Access-group outside_access_in in interface outside
Crypto ipsec transform-set AES-256 aes-256-esp esp-sha-hmac
Crypto ipsec transform-set esp-aes-256 set1, esp-sha-hmac
card crypto vpn-traffic 10 correspondence address wootton hall
card crypto vpn-traffic 10 peers set ##Site an IP #.
crypto-vpn 10 transform-set set1 traffic map
vpn-traffic outside crypto map interface
I spent some time on it and really need some advice form experts out there!
Can you help me to know where I have gone wrong?
Dan
There are some parts of the configuration that you have published to that surprise me, such as the assignment of the default route on the inside interface. But these things are not at the heart of your problem. I agree that the core of your problem is probably the sheep access list. If I understand your needs, what you need is 192.168.100.0 is not translated by going to meets B, and is translated by going to the Internet. But your translation says access list never 192.168.100.0 since your access list as another destination:
access-list no. - nat extended ip 192.168.100.0 allow 255.255.255.0 any
My suggestion is to rewrite this access list and change the destination of the 'all' to be addresses behind B (LAN to B).
HTH
Rick
-
Tunnel VPN BEFVP41-BEFVP41 after a certain time blocks
I have 2 networks in different countries with routers BEFVP41 put in place to establish a VPN tunnel. Setup in country A has a static Internet IP address, in country B a dynamic IP address. For the remote security gateway a DynDNS-FULL domain name is inserted. (I tried "Any", but for some reason any that does not work.) However this is not a problem at this point). Installation works perfectly in the sense that a VPN connection is established and works as it should.
However the annoying problem is that after some time, usually during the night, the VPN tunnel seems to block even if it remainsl upward. I can not all data through more. I can get running again by resetting the modem and router b (I couldn't try if that would also be the case if the modem and the router could be reinitialized, because these are unmanned at the moment)
In the situation of blocking internet connection is OK on both sides. A connection between the networks outside the VPN tunnel works without problem. The VPN can be disconnected and reconnected, but he remains blocked.
Both routers are the latest firmware 1.02.06, build 003.
Thanks in advance for any help to solve this annoying problem.
You have to try to adjust the MTU, change it to 1350...
Also, make sure that you have done this
-
Tunnel VPN remote Internet and VPN remote VPN from Site to Site traffic?
Hello
We try to remote traffic from our users VPN tunnel through our ASA 5510 as well as to allow the only access for remote user VPN traffic to the other end of the all our VPN site-to-site connected to the same ASA. Basically, we who want to VPN in the network in order to access all of our networks business. We try to get away with this without using split Tunneling.
I can currently get internal traffic from the remote user VPN to reach all other vpn site-to-site tunnels without the internet in tunnel. The problem is when I add the following statement to the NAT:
NAT (outside) 1 10.10.19.0 255.255.255.0 * 10.10.19.0 is the address of the remote VPN Client
Internet traffic to the remote VPN starts to get in the tunnel, but I lose the opportunity to reach one of the other tunnels from site to site by the remote VPN tunnel.
I also begin to receive the following errors in the journal of the ASA
3 July 1, 2009 12:34:18 305005 10.10.19.255 137 no group of translation not found for udp src outside:10.10.19.3/137 dst outside:10.10.19.255/137
Any help with how NAT statements must be defined for this work would be appreciated.
Thank you
Will be
Will,
the link of this post for your scenario of vpn hub & speak reference, you problem may be on exempt nat rules.
Have a second look at your sheep rules.
Be sure to eliminate tunnel rules related to rheumatoid arthritis, as appropriate, to not let him get in the way of splitting.
If always emits discribe topology for l2ls and info logic RA and sanatized hub config asa... but I think if you look at the thread above, you should be able to solve.
Concerning
-
Tunnel VPN from Site to Site dynamic
I spent the last 2 days, try to set up a dynamic tunnel VPN site to site of a Cisco 5510 to a Cisco SA540. The 540 is a dynamic supplier that can not be changed. There a dyndns account.
I was lucky that the other 10 sites are all static and the ADSM Assistant creates these tunnels without problems.
What I try to do is:
Is it possible to do it VIA ADSM?
If this isn't the case, someone please in detail can help with orders.
Kind regards
PP
Hello Paul,
This is possible thanks to the ASDM, but you do have to use some advanced settings:
Configuration > VPN Site to Site > advanced > Tunnel groups
It change the group called "DefaultL2LGroup" and add the brightness button before the SA540 (Note: all of your sites with dynamic IP addresses will have the same key communicated in advance, if you have IPSec VPN clients, it will be a good idea to use a different key).
Click ok and then apply.
Then go to Configuration > VPN Site to Site > advanced > Crypto Maps and add a new entry dynamic
Make sure that you match the phase 2 are on your SA540 (pictured ESP-AES-128-SHA), select a dynamic strategy and make the last sequence number (65535) then ok, apply.
Then go to Configuration > VPN Site to Site > advanced > IKE policies and make sure you have corresponding policies of the phase 1.
If no corresponding policy is found, add them.
Through CLI:
IKEv1 crypto policy 1
preshared authentication
aes encryption
sha hash
Group 2
Crypto-map dynamic outside_dyn_map 65535 set transform-set ESP-AES-128-SHA ikev1
CARD crypto ipsec-isakmp 65535 dynamic outside_dyn_map
IPSec-attributes tunnel-group DefaultL2LGroup
IKEv1 pre-shared-key *.
I hope this helps.
-
Hi all
First of all, I apologize if this is something that I can google. My knowledge of the administration of the network is all self-taught, so if there is a guide that I missed please point me in the right direction, it is often difficult to Google the terms for troubleshooting when your jargon is not the height.
The main problem is that when ping devices internal when you are connected to the results are very inconsistent.
Ping 192.168.15.102 with 32 bytes of data:
Reply from 192.168.15.102: bytes = 32 time = 112ms TTL = 128
Request timed out.
Request timed out.
Request timed out.
We have implemented an IPSec VPN connection to a remote Cisco ASA 5505. There is no connection problems, connection seems constant, etc. good packages. At this stage, I can only assume I have configuration problems, but I was watching this while if long and pair with my inexperience configuration of these settings I have no idea where to start. My first impressions are that LAN devices I'm ping do not send their response back or the ASA does not know how to route packets back?
Here is a dump of the configuration:
Output of the command: "show config".
: Saved
: Written by enable_15 to the 12:40:06.114 CDT MON Sep 9 2013
!
ASA Version 8.2 (5)
!
hostname VPN_Test
activate the encrypted password of D37rIydCZ/bnf1uj
2KFQnbNIdI.2KYOU encrypted passwd
names of
192.168.15.0 - internal network name
DDNS update method DDNS_Update
DDNS both
maximum interval 0 4 0 0
!
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
Description VLAN internal guests
nameif inside
security-level 100
DDNS update hostname 0.0.0.0
DDNS update DDNS_Update
DHCP client updated dns server time
192.168.15.1 IP address 255.255.255.0
!
interface Vlan2
Description of VLAN external to the internet
nameif outside
security-level 0
address IP xx.xx.xx.xx 255.255.255.248
!
passive FTP mode
clock timezone CST - 6
clock to summer time recurring CDT
DNS server-group DefaultDNS
Server name 216.221.96.37
Name-Server 8.8.8.8
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
DM_INLINE_TCP_1 tcp service object-group
port-object eq www
EQ object of the https port
outside_access_in list extended access permit icmp any one
outside_access_in list extended access deny interface icmp outside interface inside
access extensive list ip 192.168.15.192 outside_access_in allow 255.255.255.192 all
Remote_splitTunnelAcl list standard allowed internal-network access 255.255.255.0
inside_nat0_outbound list extended access allowed internal-network ip, 255.255.255.0 192.168.15.192 255.255.255.192
Note to inside_access_in to access list blocking Internet traffic
access extensive list ip 192.168.15.192 inside_access_in allow 255.255.255.192 all
Note to inside_access_in to access list blocking Internet traffic
inside_access_in extended access list allow interface ip inside the interface inside
inside_access_in list of allowed ip extended access all 192.168.15.192 255.255.255.192
Note to inside_access_in to access list blocking Internet traffic
access extensive list ip 192.168.15.192 inside_nat0_outbound_1 allow 255.255.255.192 all
pager lines 24
Enable logging
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
mask 192.168.15.200 - 192.168.15.250 255.255.255.0 IP local pool VPN_IP_Pool
inside_access_ipv6_in list of access allowed IPv6 interface ip inside the interface inside
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ICMP allow any response of echo outdoors
ICMP allow all outside
don't allow no asdm history
ARP timeout 14400
NAT-control
Global 1 interface (outside)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 0 inside_nat0_outbound_1 list of outdoor access
NAT (inside) 1 192.168.15.192 255.255.255.192
NAT (inside) 1 0.0.0.0 0.0.0.0
inside_access_in access to the interface inside group
inside_access_ipv6_in access to the interface inside group
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
Floating conn timeout 0:00:00
dynamic-access-policy-registration DfltAccessPolicy
Enable http server
http 192.168.1.0 255.255.255.0 inside
255.255.255.0 inside internal network http
http yy.yy.yy.yy 255.255.255.255 outside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Sysopt connection timewait
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
outside_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
management-access inside
dhcpd outside auto_config
!
dhcpd address 192.168.15.200 - 192.168.15.250 inside
dhcpd allow inside
!
a basic threat threat detection
Statistics-list of access threat detection
a statistical threat detection tcp-interception rate-interval 30 burst-400-rate average rate 200
NTP server 192.168.15.101 source inside
prefer NTP server 192.168.15.100 source inside
WebVPN
internal remote group strategy
Group remote attributes policy
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list Remote_splitTunnelAcl
username StockUser encrypted password privilege 0 t6a0Nv8HUfWtUdKz
username StockUser attributes
Strategy-Group-VPN remote
tunnel-group type remote access remotely
tunnel-group remote General attributes
address pool VPN_IP_Pool
Group Policy - by default-remote control
tunnel-group remote ipsec-attributes
pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
maximum message length automatic of customer
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
Review the ip options
inspect the icmp
!
global service-policy global_policy
context of prompt hostname
no remote anonymous reporting call
Cryptochecksum:f4271785b86e45dd3a17bab8f60cd2f3
Hi Graham,
My first question is do you have a site to site VPN and VPN remote access client.
After checking your configuration, I see you don't have any Site to SIte VPN configuration, so I'm assuming you ara facing issue with the VPN client.
And if I understand you are able to connect VPN client, but you not able to access internal resources properly.
I recommend tey and make the following changes.
First remove the following configuration:
NAT (inside) 0 inside_nat0_outbound_1 list of outdoor access
NAT (inside) 1 192.168.15.192 255.255.255.192
You don't need the 1st one and I do not understand the reason for the second
Second, one is your pool IP subnet (192.168.15.200 - 192.168.15.250) and I don't know why you added this NAT.
If possible change your subnet pool all together because we do not recommend to use th ip POOL that is similar to your local network.
Try the changes described above and let me know in case if you have any problem.
Thank you
Jeet Kumar
-
Hi all
I inherited this VPN and get slowly upward. At least users can connect to it now! I had a few problems. Users can connect to the VPN, but cannot ping or access shared files on the server (192.168.2.3), but the VPN users must be able to make full use of the network.
I removed the NAT rule.
#no nat (inside) 1 0.0.0.0 0.0.0.0)
And after removing that, VPN users have been able to navigate and access to internal resources. However, users in the office now had no internet. I went and added the rule of return and returned internet.
Believe it is related to the split tunneling, what can I do to activate full VPN access and still have internet at Headquarters?
ASA Version 7.2 (4)
!
ciscoasa hostname
domain default.domain.invalid
activate mI3N1CPoxB4FJhZg encrypted password
2KFQnbNIdI.2KYOU encrypted passwd
names of
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.2.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
209.124.X.X 255.255.255.252 IP address
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passive FTP mode
Server DNS 192.168.2.3 Group
DNS server-group DefaultDNS
domain default.domain.invalid
the Exchange25 object-group network
access-list standard split allow 192.168.2.0 255.255.255.0
access-list extended sheep permit ip 192.168.2.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list extended sheep permit ip 192.168.2.0 255.255.255.0 192.168.10.0 255.255.255.0
out_in of access allowed any ip an extended list
outside_access_in list extended access permit tcp any eq smtp host 192.168.2.3 eq smtp
outside_access_in list extended access permit tcp any host 192.168.2.3 eq https
outside_access_in list extended access permit tcp any host 192.168.2.3 eq www
outside-access allowed extended access list tcp no matter what interface outside eq 7000
outside-access allowed extended access list tcp no matter what interface outside eq 3389
outside-access allowed extended access list tcp no matter what interface outside eq 587
outside-access allowed extended access list tcp no matter what interface outside eq https
LAN_nat0_outbound list of allowed ip extended access any 192.168.10.0 255.255.255.0
pager lines 24
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
IP local pool vpnpool 192.168.2.31 - 192.168.2.60
ICMP unreachable rate-limit 1 burst-size 1
ICMP allow any inside
ASDM image disk0: / asdm - 524.bin
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0-list of access LAN_nat0_outbound
NAT (inside) 1 0.0.0.0 0.0.0.0
public static tcp (indoor, outdoor) interface 192.168.2.3 smtp smtp netmask 255.255.255.255
public static tcp (indoor, outdoor) interface 7000 192.168.2.80 7000 netmask 255.255.255.255
public static interface 3389 192.168.2.3 (indoor, outdoor) tcp 3389 netmask 255.255.255.255
public static interface 587 587 netmask 255.255.255.255 tcp (indoor, outdoor) 192.168.2.3
public static tcp (indoor, outdoor) interface https 192.168.2.3 https netmask 255.255.255.255
Access-group out_in in interface outside
Route outside 0.0.0.0 0.0.0.0 209.124.192.45 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
Enable http server
http 0.0.0.0 255.255.255.255 outside
http 192.168.2.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto-map dynamic dynmap 10 game of transformation-ESP-3DES-SHA
map mymap 65000-isakmp ipsec crypto dynamic dynmap
mymap outside crypto map interface
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Crypto isakmp nat-traversal 20
Telnet 0.0.0.0 0.0.0.0 inside
Telnet timeout 5
SSH timeout 5
Console timeout 0
management-access inside
dhcpd dns 192.168.2.3
!
attributes of Group Policy DfltGrpPolicy
No banner
WINS server no
value of server DNS 192.168.2.3
DHCP-network-scope no
VPN-access-hour no
VPN - 5 concurrent connections
VPN-idle-timeout 30
VPN-session-timeout no
VPN-filter no
Protocol-tunnel-VPN IPSec l2tp ipsec webvpn
allow password-storage
disable the IP-comp
Re-xauth disable
Group-lock no
disable the PFS
IPSec-udp disable
IPSec-udp-port 10000
Split-tunnel-policy tunnelall
Split-tunnel-network-list no
TMA.local value by default-field
Split-dns no
Disable dhcp Intercept 255.255.255.255
disable secure authentication unit
disable authentication of the user
user-authentication-idle-timeout 10
disable the IP-phone-bypass
disable the leap-bypass
disable the NEM
Dungeon-client-config backup servers
MSIE proxy server no
MSIE-proxy method non - change
Internet Explorer proxy except list - no
Disable Internet Explorer-proxy local-bypass
disable the NAC
NAC-sq-period 300
NAC-reval-period 36000
NAC-by default-acl no
address pools no
enable Smartcard-Removal-disconnect
the firewall client no
rule of access-client-none
WebVPN
url-entry functions
HTML-content-filter none
Home page no
4 Keep-alive-ignore
gzip http-comp
no filter
list of URLS no
value of customization DfltCustomization
port - forward, no
port-forward-name value access to applications
SSO-Server no
value of deny message connection succeeded, but because some criteria have not been met, or because of a specific group policy, you are not allowed to use the VPN features. Contact your administrator for more information
SVC no
SVC Dungeon-Installer installed
SVC keepalive no
generate a new key SVC time no
method to generate a new key of SVC no
client of dpd-interval SVC no
dpd-interval SVC bridge no
deflate compression of SVC
internal TMAgroup group strategy
attributes of Group Policy TMAgroup
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value split
gene AzJFyGPWta7durW9 encrypted privilege 15 password username
username admin privilege 15 encrypted password hLjunphNGLvrgsRP
username TMAen encrypted password ojCI79mnpWOehEZC
tunnel-group TMAgroup type ipsec-ra
attributes global-tunnel-group TMAgroup
address vpnpool pool
Group Policy - by default-TMAgroup
IPSec-attributes tunnel-group TMAgroup
pre-shared-key *.
!
!
context of prompt hostname
Cryptochecksum:78c4838558d030ac964d2c331deed909
: end
Hello
Please add the following to your configuration:
nonat_inside ip access list allow any 192.168.2.0 255.255.255.0
NAT (inside) 0-list of access nonat_inside
You must keep the "nat (inside) 1 0.0.0.0 0.0.0.0 ' so that your users access to the Internet.
"Nat (inside) 0 nonat_inside access-list" allows to bypass the above rule only for traffic destined to the VPN pool.
In addition, it is to you if you want to use split tunneling or not.
More information on tunneling split:
ASA/PIX: Allow the tunneling split for the VPN Clients on the example of Configuration of ASA
Let me know.
Portu.
Please note all useful posts
-
Hello. I'm creating a tunnel VPN IPSec LAN - to - LAN of my ASA5510 to another network but met an obstacle bit. My counterpart on the other side has informed me that he already has a VPN tunnel to another company that has the same IP range as my network(10.100.16.0 /24) and can not create the tunnel.
I was wondering is it possible to use NAT on the VPN tunnel so that traffic that goes from my network over the VPN tunnel gets translated and my counterpart on the other side sees this reflects the range of IP addresses?
Thanks in advance for any help.
Hello
Yes, you can use the same address you already use for internet access.
Just update your list of access crypto to reflect the new address and to ensure that the third party did the same.
Jon
-
Tunnel VPN site to Site with 2 routers Cisco 1921
Hi all
So OK, I'm stumped. I create much s2s vpn tunnels before, but this one I just can't go there. It's just a tunnel VPN Site to Site simple using pre-shared keys. I would appreciate it if someone could take a look at our configs for both routers running and provide a comment. This is the configuration for both routers running. Thank you!
Router 1
=======
Current configuration: 4009 bytes
!
! Last configuration change at 19:01:31 UTC Wednesday, February 22, 2012 by asiuser
!
version 15.0
horodateurs service debug datetime msec
Log service timestamps datetime msec
no password encryption service
!
SJWHS-RTRSJ host name
!
boot-start-marker
boot-end-marker
!
!
No aaa new-model
!
!
!
!
No ipv6 cef
IP source-route
IP cef
!
!
DHCP excluded-address 192.168.200.1 IP 192.168.200.110
DHCP excluded-address IP 192.168.200.200 192.168.200.255
!
IP dhcp POOL SJWHS pool
network 192.168.200.0 255.255.255.0
default router 192.168.200.1
10.10.2.1 DNS server 10.10.2.2
!
!
no ip domain search
IP-name 10.10.2.1 Server
IP-name 10.10.2.2 Server
!
Authenticated MultiLink bundle-name Panel
!
!
Crypto pki trustpoint TP-self-signed-236038042
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 236038042
revocation checking no
rsakeypair TP-self-signed-236038042
!
!
TP-self-signed-236038042 crypto pki certificate chain
certificate self-signed 01
30820241 308201AA A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
8B1E638A EC
quit smoking
license udi pid xxxxxxxxxx sn CISCO1921/K9
!
!
!
redundancy
!
!
!
!
crypto ISAKMP policy 10
md5 hash
preshared authentication
ISAKMP crypto key presharedkey address 112.221.44.18
!
!
Crypto ipsec transform-set esp-3des esp-md5-hmac IPSecTransformSet1
!
map CryptoMap1 10 ipsec-isakmp crypto
defined by peer 112.221.44.18
game of transformation-IPSecTransformSet1
match address 100
!
!
!
!
!
interface GigabitEthernet0/0
192.168.200.1 IP address 255.255.255.0
automatic duplex
automatic speed
!
!
interface GigabitEthernet0/1
Description wireless bridge
IP 172.17.1.2 255.255.255.0
automatic duplex
automatic speed
!
!
interface FastEthernet0/0/0
Verizon DSL description for failover of VPN
IP 171.108.63.159 255.255.255.0
automatic duplex
automatic speed
card crypto CryptoMap1
!
!
!
Router eigrp 88
network 172.17.1.0 0.0.0.255
network 192.168.200.0
redistribute static
passive-interface GigabitEthernet0/0
passive-interface FastEthernet0/0/0
!
IP forward-Protocol ND
!
no ip address of the http server
local IP http authentication
IP http secure server
!
IP route 0.0.0.0 0.0.0.0 172.17.1.1
IP route 112.221.44.18 255.255.255.255 171.108.63.1
!
access-list 100 permit ip 192.168.200.0 0.0.0.255 10.10.0.0 0.0.255.255
!
!
!
!
!
!
control plan
!
!
!
Line con 0
Synchronous recording
local connection
line to 0
line vty 0 4
exec-timeout 30 0
Synchronous recording
local connection
transport input telnet ssh
!
Scheduler allocate 20000 1000
end
=======
Router 2
=======
Current configuration: 3719 bytes
!
! Last configuration change at 18:52:54 UTC Wednesday, February 22, 2012 by asiuser
!
version 15.0
horodateurs service debug datetime msec
Log service timestamps datetime msec
no password encryption service
!
SJWHS-RTRHQ host name
!
boot-start-marker
boot-end-marker
!
logging buffered 1000000
!
No aaa new-model
!
!
!
!
No ipv6 cef
IP source-route
IP cef
!
!
!
!
no ip domain search
!
Authenticated MultiLink bundle-name Panel
!
!
Crypto pki trustpoint TP-self-signed-3490164941
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 3490164941
revocation checking no
rsakeypair TP-self-signed-3490164941
!
!
TP-self-signed-3490164941 crypto pki certificate chain
certificate self-signed 01
30820243 308201AC A0030201 02020101 300 D 0609 2A 864886 F70D0101 04050030
2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
EA1455E2 F061AA
quit smoking
license udi pid xxxxxxxxxx sn CISCO1921/K9
!
!
!
redundancy
!
!
!
!
crypto ISAKMP policy 10
md5 hash
preshared authentication
ISAKMP crypto key presharedkey address 171.108.63.159
!
86400 seconds, duration of life crypto ipsec security association
!
Crypto ipsec transform-set esp-3des esp-md5-hmac IPSecTransformSet1
!
map CryptoMap1 10 ipsec-isakmp crypto
defined by peer 171.108.63.159
game of transformation-IPSecTransformSet1
match address 100
!
!
!
!
!
interface GigabitEthernet0/0
no ip address
automatic duplex
automatic speed
!
!
interface GigabitEthernet0/0.1
encapsulation dot1Q 1 native
IP 10.10.1.6 255.255.0.0
!
interface GigabitEthernet0/1
IP 172.17.1.1 255.255.255.0
automatic duplex
automatic speed
!
!
interface FastEthernet0/0/0
IP 112.221.44.18 255.255.255.248
automatic duplex
automatic speed
card crypto CryptoMap1
!
!
!
Router eigrp 88
Network 10.10.0.0 0.0.255.255
network 172.17.1.0 0.0.0.255
redistribute static
passive-interface GigabitEthernet0/0
passive-interface GigabitEthernet0/0.1
!
IP forward-Protocol ND
!
no ip address of the http server
local IP http authentication
IP http secure server
!
IP route 0.0.0.0 0.0.0.0 112.221.44.17
!
access-list 100 permit ip 10.10.0.0 0.0.255.255 192.168.200.0 0.0.0.255
!
!
!
!
!
!
control plan
!
!
!
Line con 0
Synchronous recording
local connection
line to 0
line vty 0 4
exec-timeout 30 0
Synchronous recording
local connection
transport input telnet ssh
!
Scheduler allocate 20000 1000
end
When the GRE tunnel carries your traffic to private ip range, your ACL must contain address of the host of point to point the IPSec tunnel.
Since then, both routers are running EIGRP in the corporate network, let the EIGRP Exchange routes via GRE tunnel, which is a good practice, rather than push the ip ranges private individual through the IPSec tunnel.
Let me know, if that's what you want.
Thank you
-
Tunnel VPN RV-042 for Dual WAN Failover backup function
We have customers with dual WAN failover scenarios with site-to-site VPN tunnels.
In the past, the VPN tunnel backup feature has been available in the RV-082.
One of the new RV-042 firmware versions have the function of backup Tunnel VPN available?
The feature is supported on the RV042 V3 hardware.
-
Bring up the tunnel vpn crypto without interesting traffic map
Is it possible on ASA to bring up the tunnel vpn site to site static crypto map without generating interesting traffic? I want to reverse route injection generate road dynamic until traffic begins to flow.
Roman,
Unless something chnaged recently RRI inserts routes without present SAs, meaning that they are static (in contrast to current default behavior on IOS 12.4 (9) T-I_think leave).
But to answer the question, in more recent versions, you can bring up the tunnel using packet - trace CLI.
M.
Edit: request for improvement that will present the same features of IPP on ASA as on IOS:
http://Tools.Cisco.com/support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&bugId= CSCsx67450
-
Tunnel VPN site to Site - aggressive Mode
I searched the community for answers to this and that you have not found quite what I was looking for (or what seems logical). I have an ASA 5510 to A site with one website VPN tunnel to a SonicWall to site B. Which works very well. I need to create a tunnel for site C to site a using a tunnel of aggressive mode. I'm not quite sure how to do this. Any suggestion would be great!
NOTE: I have included the parts of the running configuration that seem relevant to me. If I missed something please let me know.
ASA Version 8.2 (1)
interface Ethernet0/0
nameif outside
security-level 0
IP 1.2.3.4 255.255.255.248
!
10.5.2.0 IP Access-list extended site_B 255.255.255.0 allow 10.205.2.0 255.255.255.128
access extensive list ip 10.5.2.0 site_C allow 255.255.255.0 10.205.2.128 255.255.255.128
dynamic-access-policy-registration DfltAccessPolicy
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set esp-3des esp-sha-hmac 3des-sha1
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto VPN 30 card matches the address site_B
card crypto VPN 30 peer set 4.3.2.1
crypto VPN 30 the transform-set 3des-sha1 value card
card crypto VPN 40 corresponds to the address site_C
card crypto VPN. 40 set peer 8.7.6.5
crypto VPN. 40 the transform-set 3des-sha1 value card
crypto ISAKMP allow outside
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Crypto isakmp nat-traversal 30
crypto ISAKMP ipsec-over-tcp port 10000
attributes of Group Policy DfltGrpPolicy
Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
tunnel-group 4.3.2.1 type ipsec-l2l
4.3.2.1 tunnel-group ipsec-attributes
pre-shared-key *.
tunnel-group 8.7.6.5 type ipsec-l2l
IPSec-attributes tunnel-group 8.7.6.5
pre-shared-key *.
David,
Please try this:
clear crypto ipsec its peer site_c_IP
clear configure VPN 40 crypto card
card crypto VPN 10 corresponds to the address site_C
card crypto VPN 10 set peer 8.7.6.5
crypto VPN 10 the transform-set 3des-sha1 value card
debug logging in buffered memory
capture drop all circular asp type
capture capin interface inside the match ip 10.5.2.0 255.255.255.0 10.205.2.128 255.255.255.128
After generating the traffic and INTERNAL of the machine behind the ASA:
view Journal | 10.205.2 Inc.
See the fall of cap. 10.205.2 Inc.
view Cape capin
In case it does not work:
(a) show the crypto classic table ASP.
(b) details of vpn-framework for table ASP.
(c) show cry its site_c peer ipsec
(d) entry packet - trace within the icmp 10.5.2.15 8 0 10.205.2.130 detail
(e) see the crypto ipsec his
At the same time, please.
Let me know how it goes.
Thank you
Portu.
Please note all useful posts
-
Impossible to access them Internert through the split tunneling VPN client.
I divided tunnel configured on a PIX 515. The remote VPN client connects to the PIX very well and can ping hosts on the internal network, but cannot access the Internet. Am I missing something? My config as shown below.
In addition, I don't see the routes on the VPN client via statistics (screenshot below)
All opinions are appreciated.
Rob
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------
8.0 (3) version PIX
!
hostname PIX-to-250
enable the encrypted password xxxxx
names of
!
interface Ethernet0
nameif outside
security-level 0
IP address x.x.x.250 255.255.255.240
!
interface Ethernet1
nameif inside
security-level 100
IP 192.168.9.1 255.255.255.0
!
XXXXX encrypted passwd
passive FTP mode
DNS domain-lookup outside
DNS server-group Ext_DNS
Server name 194.72.6.57
Server name 194.73.82.242
the LOCAL_LAN object-group network
object-network 192.168.9.0 255.255.255.0
object-network 192.168.88.0 255.255.255.0
Internet_Services tcp service object-group
port-object eq www
area of port-object eq
EQ object of the https port
port-object eq ftp
EQ object of port 8080
port-object eq telnet
the WAN_Network object-group network
object-network 192.168.200.0 255.255.255.0
ACLOUT list extended access allowed object-group LOCAL_LAN udp any eq log field
ACLOUT list extended access allow icmp object-group LOCAL_LAN no matter what paper
ACLOUT list extended access permitted tcp object-group LOCAL_LAN connect to any object-group Internet_Services
access-list extended ACLIN all permit icmp any what newspaper echo-reply
access-list extended ACLIN all permit icmp any how inaccessible journal
access-list extended ACLIN allowed icmp no matter what newspaper has exceeded the time
Comment by split_tunnel_list-LAN Local access list
split_tunnel_list list standard access allowed 192.168.9.0 255.255.255.0
access-list extended SHEEP allowed object-group ip LOCAL_LAN 192.168.100.0 255.255.255.0
pager lines 24
Enable logging
Outside 1500 MTU
Within 1500 MTU
IP local pool testvpn 192.168.100.1 - 192.168.100.99
no failover
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0 access-list SHEEP
NAT (inside) 1 0.0.0.0 0.0.0.0
Access-group ACLIN in interface outside
ACLOUT access to the interface inside group
Route outside 0.0.0.0 0.0.0.0 195.171.252.45 1
Route inside 192.168.88.0 255.255.255.0 192.168.88.254 1
Route inside 192.168.199.0 255.255.255.0 192.168.199.254 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout, uauth 0:05:00 absolute
dynamic-access-policy-registration DfltAccessPolicy
Enable http server
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set esp-3des esp-sha-hmac Set_1
Crypto-map dynamic outside_dyn_map 10 game of transformation-Set_1
life together - the association of security crypto dynamic-map outside_dyn_map 10 seconds 280000
Crypto-map dynamic outside_dyn_map 10 the value reverse-road
outside_map 10 card crypto ipsec-isakmp dynamic outside_dyn_map
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 1
preshared authentication
3des encryption
sha hash
Group 2
life 43200
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
a basic threat threat detection
Statistics-list of access threat detection
internal testvpn group policy
attributes of the strategy of group testvpn
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
name of user testuser encrypted password xxxxxx
type tunnel-group testvpn remote access
tunnel-group testvpn General-attributes
address testvpn pool
Group Policy - by default-testvpn
testvpn group of tunnel ipsec-attributes
pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
inspect the icmp
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:5dcb5dcdff277e1765a9a0c366b88b9e
: end
# 250 A - PIX
You have not assigned the ACL split tunnel to your strategy.
PLS, configure the following:
attributes of the strategy of group testvpn
value of Split-tunnel-network-list split_tunnel_list
-
Can anyone help me how I will work with tunnel VPN Failover.
Hi Experts,
I have two 5520 ASA one headquarters and another is disaster recovery. So I need to build the tunnel of the Branch Office Chief at the office that I have 3g router.
So I need to build failover to ASA of recovery after a disaster. Please can someone help me what would be the best option that makes my task complete.
Thank you
Mohammed
Hello
I guess you are looking for a relief tunnel VPN router. Here's how you set it up:
I hope this helps.
Kind regards
Anisha
P.S.: Please mark this thread as answered if you feel that your query is resolved. Note the useful messages.
-
Hello
I installed a tunnel VPN between ASA and PIX. I want to implement security on the ASA or PIX so that some remote endpoint specfic IP can access resources of tunnel. is it possible to block additional IP addresses?
Thank you
Amardeep
Please read this link, you can implement VPN-filter.
Thank you
Ajay
Maybe you are looking for
-
Added the e-mail account, want not separate Inbox, etc..
What a PITA! I just recorded, spent some time typing, responded to the confirmation email, spent some time more typing and had "Access denied" when I click on submit. Everything I had typed is gone, and I have to start all over again! I repeat - PITA
-
Best way to put music on iPod to the customer?
Recently digitized music collection of the client. We have it in a separate iTunes as aac files library. We'll buy a new iPod to get the collection. What is the best way to manage the entire to the top of the new iPod? We need to create a new iTunes
-
Upgrade laptop computer processor Compaq Presario CQ57
Hi I'm looking on youtube for hours and can not find a guide on how to find processor and replace it someone could give me a step by step on how to do.
-
How machines virtual host?
Sorry for the noob question, but I'm learning.VMs how can I have on a host? I have eight and vSphere client web don't create brand new.Thank you!
-
I m having trouble adding guides to my images. The pictures disappear and turn black. Some ideas?