VPN does not boot... ASA 5505

Hi all

I encountered a problem and hopefully one (or more!) of you have seen this before.

I configured an ASA5505 to be endpoint tunnel VPN Lan to Lan, peering with a Linux links.  The SAA is full licensed so that side is not a problem.

PROBLEM:

When the tunnel is initialized from the linux box everything is happening very well except the ASA is not encapsulation of packages.  They are decrypted packets from the Linux box agreement, but not return traffic are encryption.

When the tunnel is initialized to the ASA, nothing happens.

After some troubleshooting I found that the ACL defines interesting traffic or the ACL setting NO_NAT will are not affected at all.

ACL for NO_NAT:

access-list NO_NAT line 1 Note USED ACL TO DEFINE WHAT TRAFFIC NOT NAT ON THE VPN

permit for line NO_NAT of access list lengthened 2 ip host LINUX-AREAS of PAMS_SERVER object-group 0xc736d5fb

allowed to Access - list NO_NAT line 2 extended host ip PAMS_SERVER 10.11.228.0 255.255.255.0 (hitcnt = 0)

ACL for interesting traffic

LNX_IPSEC list of access; 2 elements; hash name: 0xda433bf

Line note 1 LNX_IPSEC to access list ACL USED TO DEFINE WHAT TRAFFIC to ENCRYPT

permit for line LNX_IPSEC of access list lengthened 2 ip host LINUX-AREAS of PAMS_SERVER object-group 0x49989fbd

allowed to Access - list LNX_IPSEC line 2 extended host ip PAMS_SERVER 10.11.228.0 255.255.255.0 (hitcnt = 0) 0x6f1aad85

permits for Access - list extended LNX_IPSEC line of 3 ip host 10.1.85.156 LINUX-AREAS of 0x034eece3 object-group

allowed for extended access list of 3 ip host 10.1.85.156 LNX_IPSEC line 10.11.228.0 255.255.255.0 (hitcnt = 0) 0xc3b2fc0b

I checked with the administrator of the linux machine and the definition of interesting traffic is exactly the same (except in reverse, that should be the case).

The firewall is doing other things such as NATs and as too but the NATs have nothing to do with this VPN.  The configuration is a LAN connection to LAN with no natting between the two.

The main parts of the config are attached, I deleted that should have an impact on this, but if you think it is necessary I can clean up the config and re-post.  I think it will work very well as long as the traffic hitting these ACLs, but they are not and I'm not sure why.

Right now I don't see anything when doing a Cree debugging ipsec or debug cry ISA.  The ACL are not being touched so I think he's trying to not even form the VPN as it can not see all traffic which is being 'interesting '.

Has anyone seen this problem before or someone has any advice that I might be able to use to make it work?

Thanks in advance for any help

Brad

How are those that hosts (PAMS_Server and 10.1.85.156) which is routed? You did not include the routing within the clinical setting and wondered if the routing is correct.

Tags: Cisco Security

Similar Questions

  • How to fix iTunes?. It no longer starts. I reinstalled 10.3 and updated 10.6.8 repaired, repaired disk permissions, but it still does not boot to the top. TIA Pietrowiak

    How to fix iTunes?. It no longer starts. I reinstalled 10.3 and updated 10.6.8 repaired, repaired disk permissions, but it still does not boot to the top. TIA Pietrowiak

    There is a Snow Leopard update that would probably help.  It's called 10.6.8 Combo update.  Download and apply.  Then discover iTunes.

    https://support.Apple.com/kb/dl1399?locale=en_GB there is also a supplement that should also be downloaded.

    http://support.Apple.com/kb/DL1429

  • computer does not boot, blue screen with the message: Stop: 0 x 00000024 (0 x 00190203, 0 X 86949258, 0xC0000102, 0x00000000)

    computer does not boot, blue screen with the message: Stop: 0 x 00000024 (0 x 00190203, 0 X 86949258, 0xC0000102, 0x00000000)

    Hello

    1 how long have you been faced with this problem?
    2. don't you make changes on the computer before this problem?

    Start the computer by using the Microsoft Windows XP recovery console, and then perform a check disk on the file system.

    To do this, follow these steps:

    1. Insert the Windows XP CD in the CD-ROM or DVD - ROM drive, and then restart the computer. Select the required options to start the computer from the CD-ROM or DVD - ROM drive if you are prompted to do so.
    2. once the Welcome to Setup screen appears, press R to start the Recovery Console.
    3. If your computer is configured to dual-boot or multiple boot, select the appropriate installation of Windows XP.
    4. When you are prompted to do so, type the administrator password and press ENTER. NOTE: In Windows XP Home Edition, the administrator password is blank by default.
    5. at the command prompt, type the following command and press ENTER: cd system32
    6. type the following command and press ENTER: chkdsk /r /p
    7. remove the Windows XP CD in the disc drive.
    8. Type exit to restart your computer.

    Important: Running chkdsk on the drive if bad sectors are found on the disk hard when chkdsk attempts to repair this area if all available on which data may be lost

  • After the upgrade yesterday from Vista to Windows 7, now my Cisco VPN does not work and I get an error message titled: grounds 440 driver fault. Any ideas to fix this?

    After the upgrade yesterday from Vista to Windows 7, now my Cisco VPN does not work and I get an error message titled: grounds 440 driver fault.  Any ideas to fix this?

    This was the solution!  The works of vpn as $ 1 million now.  I followed the instructions above to enter the uninstall program and selecting the repair option.  I rebooted the machine, then used the troubleshooting on vpn software compatibility option.  Selected Windows windows xp (service pack 2) as the correct software and cisco vpn client started right up.

    Thanks, Nick!

    Rick

  • I erased the DW cache, but it still does not boot to the top.

    DW CC 2014 order of commissioning.  I have cleared the cache, but it still does not boot to the top.  What should I do now?

    I use Windows 8.  I think I can rebuilt my preferences file?  It started working again.

  • Site to site ASA 5505 VPN does not

    Hello

    We have configuration problems our VPN site-to-site with our ASA 5505. We ran the assistants who seem to be straight forward, but we have no chance for them to communicate with each other via ping or anything else. If someone could help us, our configs for our two sites:

    Site A:

    Output of the command: "sho run".

    : Saved
    :
    ASA Version 7.2 (4)
    !
    ciscoasa hostname
    domain default.domain.invalid

    names of
    DNS-guard
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 192.168.45.20 255.255.255.0
    OSPF cost 10
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP address 173.xxx.xxx.249 255.255.255.252
    OSPF cost 10
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    passive FTP mode
    clock timezone EST - 5
    clock to summer time EDT recurring
    DNS server-group DefaultDNS
    domain default.domain.invalid
    permit same-security-traffic inter-interface
    extended incoming access permit tcp host 173.xxx.xxx.249 eq www list everything
    list of extended inbound icmp permitted access a whole
    list of allowed inbound tcp extended access any host 173.xxx.xxx.249 eq www
    extended incoming access permit tcp host 173.xxx.xxx.249 eq https list everything
    list of allowed inbound tcp extended access any host 173.xxx.xxx.249 eq https
    access extensive list ip 192.168.45.0 outside_20_cryptomap allow 255.255.255.0 192.168.42.0 255.255.255.0
    access extensive list ip 192.168.45.0 inside_nat0_outbound allow 255.255.255.0 192.168.42.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Within 1500 MTU
    Outside 1500 MTU
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow any inside
    ICMP allow all outside
    ASDM image disk0: / asdm - 524.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Access-group interface incoming outside
    Route inside 192.168.0.0 255.255.255.0 192.168.45.20 1
    Route inside 192.168.0.0 255.255.0.0 192.168.45.20 1
    Route outside 0.0.0.0 0.0.0.0 173.xxx.xxx.250 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    RADIUS Protocol RADIUS AAA server
    Enable http server
    http 192.168.45.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    card crypto outside_map 20 match address outside_20_cryptomap
    card crypto outside_map 20 set pfs
    card crypto outside_map 20 peers set 50.xxx.xxx.89
    outside_map crypto 20 card value transform-set ESP-3DES-SHA
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet 192.168.45.0 255.255.255.0 inside
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 inside
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 5
    Console timeout 0
    68.xxx.xxx.194 dns 192.168.45.20 dhcpd
    dhcpd outside auto_config
    !

    tunnel-group 50.xxx.xxx.89 type ipsec-l2l
    50.xxx.xxx.89 group of tunnel ipsec-attributes
    pre-shared-key * (key is the same on the two ASA)
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 1500
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    inspect the icmp
    !
    global service-policy global_policy
    context of prompt hostname
    Cryptochecksum: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    : end

    Site b:

    Output of the command: "sho run".

    : Saved
    :
    ASA Version 7.2 (4)
    !
    host name
    domain default.domain.invalid

    names of
    DNS-guard
    !
    interface Vlan1
    nameif inside
    security-level 100
    IP 192.168.42.12 255.255.255.0
    OSPF cost 10
    !
    interface Vlan2
    nameif outside
    security-level 0
    IP address 50.xxx.xxx.89 255.255.255.248
    OSPF cost 10
    !
    interface Ethernet0/0
    switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    passive FTP mode
    clock timezone IS - 5
    clock to summer time EDT recurring
    DNS server-group DefaultDNS
    domain default.domain.invalid
    permit same-security-traffic inter-interface
    list of allowed inbound tcp interface out eq 3389 home 192.168.42.26 extended access
    list of extended inbound icmp permitted access a whole
    list of allowed inbound tcp interface out eq 39000 home 192.168.42.254 extended access
    list of allowed inbound tcp interface out eq 39001 home 192.168.42.254 extended access
    list of allowed inbound tcp interface out eq 39002 home 192.168.42.254 extended access
    list of allowed inbound udp out eq 39000 home 192.168.42.254 interface extended access
    list of allowed inbound udp out eq 39001 home 192.168.42.254 interface extended access
    list of allowed inbound udp out eq 39002 home 192.168.42.254 interface extended access
    list of incoming access permit tcp host 50.xxx.xxx.89 eq 3389 everything
    list of allowed inbound tcp extended access any host 50.xxx.xxx.89 eq 3389
    extended incoming access permit tcp host 50.xxx.xxx.89 eq www list everything
    list of allowed inbound tcp extended access any host 50.xxx.xxx.89 eq www
    extended incoming access permit tcp host 50.xxx.xxx.89 eq https list everything
    list of allowed inbound tcp extended access any host 50.xxx.xxx.89 eq https
    extended incoming access permit tcp host 50.xxx.xxx.89 eq 39000 list everything
    list of allowed inbound tcp extended access any host 50.xxx.xxx.89 eq 39000
    extended incoming access permit tcp host 50.xxx.xxx.89 eq 16450 list everything
    list of allowed inbound tcp extended access any host 50.xxx.xxx.89 eq 16450
    access extensive list ip 192.168.42.0 outside_20_cryptomap allow 255.255.255.0 192.168.45.0 255.255.255.0
    access extensive list ip 192.168.42.0 inside_nat0_outbound allow 255.255.255.0 192.168.45.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information

    Within 1500 MTU
    Outside 1500 MTU
    ICMP unreachable rate-limit 1 burst-size 1
    ICMP allow any inside
    ICMP allow all outside
    ASDM image disk0: / asdm - 524.bin
    don't allow no asdm history
    ARP timeout 14400
    Global 1 interface (outside)
    NAT (inside) 0-list of access inside_nat0_outbound
    NAT (inside) 1 0.0.0.0 0.0.0.0
    static (inside, outside) tcp 3389 192.168.42.26 interface 3389 netmask 255.255.255.255
    public static tcp (indoor, outdoor) interface 39000 192.168.42.254 39000 netmask 255.255.255.255
    public static (inside, outside) udp interface 39000 192.168.42.254 39000 netmask 255.255.255.255
    public static tcp (indoor, outdoor) interface 39001 192.168.42.254 39001 netmask 255.255.255.255
    public static (inside, outside) udp interface 39001 192.168.42.254 39001 netmask 255.255.255.255
    public static tcp (indoor, outdoor) interface 39002 192.168.42.254 39002 netmask 255.255.255.255
    public static (inside, outside) udp interface 39002 192.168.42.254 39002 netmask 255.255.255.255
    public static tcp (indoor, outdoor) interface 16450 192.168.42.254 16450 netmask 255.255.255.255
    Access-group interface incoming outside
    Route inside 192.168.0.0 255.255.255.0 192.168.42.12 1
    Route inside 192.168.0.0 255.255.0.0 192.168.42.12 1
    Route outside 0.0.0.0 0.0.0.0 50.xxx.xxx.94 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    GANYMEDE + Protocol Ganymede + AAA-server
    RADIUS Protocol RADIUS AAA server
    Enable http server
    http 192.168.42.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
    card crypto outside_map 20 match address outside_20_cryptomap
    card crypto outside_map 20 set pfs
    card crypto outside_map 20 peers set 173.xxx.xxx.249
    outside_map crypto 20 card value transform-set ESP-3DES-SHA
    outside_map interface card crypto outside
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    Telnet 192.168.42.0 255.255.255.0 inside
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 inside
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 5
    Console timeout 0
    dhcpd outside auto_config
    !
    dhcpd address 192.168.42.13 - 192.168.42.44 inside
    !

    tunnel-group 173.xxx.xxx.249 type ipsec-l2l
    173.xxx.xxx.249 group of tunnel ipsec-attributes
    pre-shared-key * (same as the other ASA)
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    message-length maximum 1500
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    inspect the rsh
    inspect the rtsp
    inspect esmtp
    inspect sqlnet
    inspect the skinny
    inspect sunrpc
    inspect xdmcp
    inspect the sip
    inspect the netbios
    inspect the tftp
    inspect the icmp
    !
    global service-policy global_policy
    context of prompt hostname
    Cryptochecksum:xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
    : end

    Thank you very much as I apperciate your all of the help.

    Scott

    Hi Scott,.

    Configs looks very good. Don't know why you need ' route stmts in 192.168.0.0 255.255.0.0' network on both sides. They point to the inside of the ASA. Remove and try to reach the other end PC. If you need to keep it, then try to add specific routes...

    A:

    Route outside 192.168.42.0 255.255.255.0 173.xxx.xxx.250 1

    B:

    Route outside 192.168.45.0 255.255.255.0 50.xxx.xxx.94 1

    HTH

    MS

  • PIX and ASA static, dynamic and RA VPN does not

    Hello

    I am facing a very interesting problem between a PIX 515 and an ASA 5510.

    The PIX is in HQ and has several dynamic VPN connections (around 130) and IPsec vpn remote works very well. I had to add a PIX to ASA L2L VPN static and it does not work as it is supposed to be. The ASA 5510, at the remote end, connects and rest for a small period of time, however, all other VPN connections stop working.

    The most interesting thing is that ASA is associated with the dynamic map and not the static map that I created (check by sh crypto ipsec his counterpart x.x.x.x). However, if I make any changes in the ACL 'ACL-Remote' it affects the tunnel between the PIX and ASA.

    Someone saw something like that?

    Here is more detailed information:

    HQ - IOS 8.0 (3) - PIX 515

    ASA 5510 - IOS 7.2 (3) - remote provider

    Several Huawei and Cisco routers dynamically connected via ADSL

    Several users remote access IPsec

    A VPN site-to site static between PIX and ASA - does not.

    Here is the config on the PIX:

    Crypto ipsec transform-set ESP-3DES-ESP-SHA-HMAC-IPSec esp-3des esp-sha-hmac

    Dyn - VPN game 100 Dynamics-card crypto transform-set ESP-3DES-ESP-SHA-HMAC-IPSec

    Crypto dynamic-map Dyn - VPN 100 the value reverse-road

    VPN - card 30 crypto card matches the ACL address / remote

    card crypto VPN-card 30 peers set 20 x. XX. XX. XX

    card crypto VPN-card 30 the transform-set ESP-3DES-ESP-SHA-HMAC-IPSec value

    VPN crypto card - 100 - isakmp dynamic Dyn - VPN ipsec

    interface card crypto VPN-card outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    crypto ISAKMP policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    access list ACL-remote ext ip 10.0.0.0 allow 255.255.255.0 192.168.1.0 255.255.255.0

    Thank you.

    Marcelo Pinheiro

    The problem is that the ASA has a crypto acl defined between host and network, while the remote end has to the network.

    Make sure that the acl is reversed.

  • Check sensor SFR with FireSight via VPN - does not work

    Hello security experts.

    I have an ASA5515-X with SFR installed 5.4.0 and manage with 5.4 FireSight installed on the virtual machine on LAN and I record the sensor without any problem but when I try to register the sensor to FireSight via VPN I can't do. The interface on the ASA management has no intellectual property nor nameif configured and the interface is connected to the switch, SFR has the IP even configured as LAN addressing. I can see traffic being exchanged between the sensor and the FireSight but I can't save the sensor.

    Has anyone managed to register the sensor via VPN? Is there something else to be configured in order to save the sensor with the MC via the VPN?

    The delay between the Firesight and the sensor (on WAN and VPN) I get between 80 and 100 ms, what could be the problem?

    Thank you very much!

    Remi

    Hello

    If you are unable to telnet from DC to the sensor on the port 8305 delivers connectivity then.

    Can try you to ping from sensor to DC:

    ping -M do -c 20 -s 1572 
    By default, the MTU is 1500 on eth0, if the ping does not work I will suggest to lower the MTU on the interface and see if it works. See also: / var/log/messages | grep sftunnel and see the error messages on DC and sensor and send it to me everywhere. Best regards, Aastha Bhardwaj rate if this is useful!
  • ACEs does not properly ASA 5510

    Hello guys,.

    I have a VPN, and I think that something is wrong with her placement of the ACE of for the instruction of the permit. I have first of all that I would like ACL 10, 20, 30, 40, 50 and 60. My ACL 10 to 6 ACE and I'm not trying to add ACE 7 and 8. Whenever I add my ACE 7 with (control lines), it does not impose the I am adding behind the line 6 in the ACL 10 to 2 ACE list. It starts really everywhere as it is the first 10 ACLs and the list of my lines 1 and 2 instead of 7 and 8 behind the current have a 10. Not only that, but it is turned 60 ACL that concerns me is why my VPN tunnel is not coming. What's causing the ASA watch my ACE application because they are not at the top, with the rest of the ACE 10, ACL? When I do a ping from the source to the destination network network in the ACE, I added that I don't see any hits on my ACE when I perform an access control list of a show.

    Placement in the ACL for crypto VPN ACL is not important. What is important for crypto ACL, is that this mirror image exactly on the other site of the tunnel.

    If you have 10 lines of ACE on this site, the corresponding VPN peer should have 10 lines as well in reverse (mirror image).

    The placement of the ACE is not the same.

  • Outgoing Microsoft VPN via a device ASA 5505

    Hi all

    I installed an ASA 5505 device for a client just now and they were delighted by improving stability VPN, he provided them, as they work for the most distance and VPN in all day to access their servers at the office. Recently, however, some staff members have spent more time at the office and where they discovered that they are unable to establish a VPN out to customers that are running Microsoft based on virtual private networks. The nature of their activity forced him to regularly establish the VPN to the servers of their customers to download data. They can establish successful Cisco VPN clients when they are in the office or working remotely, but they are not able to connect to the MS VPNs outside the office. What configuration changes I have to do on the ASA 5505 in order to solve this problem for them? Any help would be greatly appreciated.

    See you soon,.

    John

    Hello

    If the clients are connecting to a Microsoft VPN through the ASA using PPTP, you need to allow outgoing traffic (if there is an ACL that is applied to the inside interface) and also to activate the inspection of PPTP.

    Policy-map global_policy
    class inspection_default

    inspect the pptp

    Let us know how it goes.

    Federico.

  • ASA5505 - VPN does not

    Hello everyone,

    I have problems to make IPsec VPN remote access work.

    The goal is to be able to connect to our internal network from home or elsewhere.

    When I try to connect to my home virtual private network, I will no further than Phase 1.

    My architecture is a Cisco ASA5505 behind a router-modem router from ISP. The IP address of the modem is 192.168.1.1 for outside.

    The IP address of the ASA is 192.168.1.254 for outdoor and 10.0.0.1 for indoors. I put the ASA in a demilitarized zone of the ISP modem to be able to reach it through the Internet (I wanted to use the ISP modem-router-bridge just as a simple gateway and handle other things with the ASA).

    So my problem is that I can't seem to connect to the VPN through the public IP address.

    Here is my config:

    : Saved

    :

    ASA Version 8.2(5)

    !

    hostname Cisco-ASA-5505

    enable password 8Ry2YjIyt7RRXU24 encrypted

    passwd 2KFQnbNIdI.2KYOU encrypted

    names

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    interface Vlan1

    nameif inside

    security-level 100

    ip address 10.0.0.1 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    ip address 192.168.1.254 255.255.255.0

    !

    ftp mode passive

    clock timezone GMT 1

    access-list NONAT extended permit ip 10.0.0.0 255.255.255.0 10.0.1.0 255.255.255.0

    pager lines 24

    logging asdm informational

    mtu inside 1500

    mtu outside 1500

    ip local pool VPNpool 10.0.1.1-10.0.1.50

    icmp unreachable rate-limit 1 burst-size 1

    no asdm history enable

    arp timeout 14400

    global (outside) 1 interface

    nat (inside) 0 access-list NONAT

    nat (inside) 1 0.0.0.0 0.0.0.0

    route outside 0.0.0.0 0.0.0.0 192.168.1.1 1

    route inside 192.168.2.0 255.255.255.0 10.0.0.42 1

    timeout xlate 3:00:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    timeout floating-conn 0:00:00

    dynamic-access-policy-record DfltAccessPolicy

    aaa authentication ssh console LOCAL

    http server enable

    http 192.168.1.0 255.255.255.0 inside

    no snmp-server location

    no snmp-server contact

    snmp-server enable traps snmp authentication linkup linkdown coldstart

    crypto ipsec transform-set RA-TS esp-aes-256 esp-sha-hmac

    crypto ipsec security-association lifetime seconds 28800

    crypto ipsec security-association lifetime kilobytes 4608000

    crypto dynamic-map DYN-MAP 10 set transform-set RA-TS

    crypto map VPN-MAP 30 ipsec-isakmp dynamic DYN-MAP

    crypto map VPN-MAP interface outside

    crypto isakmp enable outside

    crypto isakmp policy 20

    authentication pre-share

    encryption aes-256

    hash sha

    group 2

    lifetime 3600

    telnet timeout 5

    ssh 192.168.1.0 255.255.255.0 inside

    ssh 10.0.0.0 255.255.255.0 inside

    ssh timeout 5

    console timeout 0

    dhcpd address 10.0.0.10-10.0.0.40 inside

    dhcpd dns 81.253.149.9 80.10.246.1 interface inside

    dhcpd update dns both override interface inside

    dhcpd enable inside

    !

    threat-detection basic-threat

    threat-detection statistics access-list

    no threat-detection statistics tcp-intercept

    tftp-server inside 10.0.0.42 /srv/tftp/cisco-rtr-01-config

    webvpn

    username admin password 4RdDnLO1w2ilihWc encrypted

    username test password zGOnThs6HPdiZhqs encrypted

    tunnel-group testvpn type remote-access

    tunnel-group testvpn general-attributes

    address-pool VPNpool

    tunnel-group testvpn ipsec-attributes

    pre-shared-key *****

    !

    !

    prompt hostname context

    no call-home reporting anonymous

    Cryptochecksum:c3d233f44e742110aa0ce1f81173d47c

    : end

    My config to the client is attached.

    When I look at what happened during the connectin with Wireshark, I see 'Port Unreachable '. I have to do something on my ISP router? Because I read that it is not necessary to use NAT if the device is in the demilitarized zone.

    Can you help me please?

    Because you have the address on your external interface, you will need to tell your router to forward traffic to ASA. So you can do NAT or port forward to ASA.

    I guess you don't have a single address public IP assigned by your ISP.

    Kind regards

    Jan

  • PPTP VPN does not work on Iphone Personal Hotspot

    Hello

    I've just updated to iOS 10 yesterday and now all my devices I use to connect to the personal hotspot on my iphone are not able to establish PPTP VPN connections. I was aware of the PPTP client are disabled in the iOS, but has actually blocked PPTP are not used by devices that connect to the Personal Hotspot?

    Please help ASAP, I know there are many more end-users like me having the same problem.

    Hello

    Apple does not recommend using the PPTP protocol for secure and private communication.

    iOS 10 and macOS Sierra intentionally delete a VPN profile PPTP connections when a user upgrades from their device.

    Apple recommends using another VPN protocol which is safer:

    More information:

    Prepare for removal of PPTP VPN before you upgrade to iOS 10 and macOS Sierra - Apple Support

  • I use a VPN in AirPort Express. I've updated firmware for 7.7.7 and DNS assigned by my VPN does not work anymore. Upon entry, the icon 'internet' in utility Airpot turns brown, and the internet stops completely. Anyone have any idea?

    Why my internet connection dies? I use a VPN to my internet at home. I put the DNS numbers supplied by the company VPN in my airPort extreme, which, in turn, provides wireless for home. It worked perfectly until I updated to firmware 7.7.7. Suddenly the green light next to the 'internet' in airport Utility icon went Brown, and it is therefore most all internet. I put numbers in DNS to my ISP, and internet provider is displayed again. All the other numbers in DNS, whether it's Google, OpenDNS or VPN to stop the dead from the internet. Anyone has an idea about this?

    Airport base stations, are at best, a VPN-well past that device. It is a server or a VPN client. Upgrade to the latest firmware does not change this fact.

    To create a VPN tunnel using the AirPort Express Terminal, your computer must be running a VPN client that connects to a VPN server somewhere on the Internet. What DNS servers you use should make no difference with VPN.

    If the ISP-supplied DNS servers do not work, I would say that you contact your ISP to find out why they don't allow you to use them.

    What we need to study is more why you lose Internet connectivity when changing the DNS servers of your ISP. Please check with them and to report back, then we can try to help.

  • EliteDesk 800 G1: EliteDesk 800 G1 does not boot UEFI disks immediately after-> UEFI BIOS change

    I am changing our configuration of the BIOS boot in the UEFI. I tried to simplify the problem.

    I boot via PXE BIOS of SCCM task sequence and perform following actions:

    1. Apply UEFI Secure Boot configuration with BiosConfigUtility (enable Secure Boot, boot which is ignored anyway... order)
    2. Fixed disk partition type as TPG
    3. Create Fat32 partition to boot EFI and an NTFS volume for the data
    4. Apply WinPE to NTFS and copy the boot (bcdboot) in Fat32 files
    5. Set the volume to Fat32 as ESP
    6. Reset

    Now BIOS does not allow me to start this disc. Disk appears in 'Device Configuration', but not in the boot order.

    If I start again to PXE (now in mode UEFI) and check the contents of the disc, everything seems in order. If I reapply my script to repeat steps 4 and 5, and then the next time the disc will apper in the boot and boot order.

    If before the first attempt of UEFI, I put in a known UEFI boot disk, the system does not start it no more.

    I think that there is a bug in the BIOS.

    I saw something similar with Z620. When to apply some config past to the BIOS, the system is no longer shows startup valid drives in the boot order (this attempt was in BIOS mode). Emulation of the RAID controller is switched back to AHCI has worked around him then. But this time I'm not emulation of the controller.

    As BiosConfigUtility reports that it has fixed start changes but when reading them back (before or after the restart, they are the same). It's not as important, but

    BiosConfigUtility 4.0.15.1

    BIOS final v2.68

    My repro led nowhere (successful boot) but I was hired by HP support and all by responding to their email, I accidentally found the question.

    My BIOS setup script was a command to disable temporarily BitLocker if configuration is repeated his request for a system that is already deployed.

    manage-bde-protectors-disable c:

    However, this had inexplicably FAT32 partition become encrypted. If I started to UEFI PXE SCCM WinPE on the next boot, silently erased WinPE encryption and system would be on hard disk again, causing confusion.

    But when, for a test, I booted a Linux LiveCD, it showed encryption.

    I guess it's been like this for a while but only in this case C: was be the UEFI boot partition (usually it's system partition). In hindsight, my repro of WinPE image have also components BitLocker...

    I deleted command BitLocker and now it starts normally on hard drive after the configuration change. Detective Conan for time to engage the support of Microsoft and HP...

  • Satellite Pro A200 - system does not boot

    Hello

    wondering if someone could help?
    My Satellite Pro A200 with windows XP does not start. It starts with the Toshiba screen.
    Then goes to a screen black with text where it says "PXEE61 media test failure - check cable" (I have no cable) then said out of PXErom; moves to the next screen, which lists the options: safe mode; safe mode with networking; safe mode with prompt local; Last Configeration well-known; Start windows normally.

    Which have been tried and results in loading from page turns on for about 20 seconds, then just to abandon and trying all the whole process again (before flashing a blue screen) Windows.

    Nothing seems to work - tried to take the battery on a... number oftimes and the power cable, but nothing helps.
    It's already happened, but after a few false starts gets going - but this time he just don't come out it. I could not take others where locally, but I would prefer not to because I live in Spain and need the laptop as soon as possible and do not know, I want to leave it in some otherwise are hands to the risk of wipe them the hard drive.

    So, I would be very grateful for any help as soon as possible and I fear tech short hand maybe having to explain.

    Thanks a lot, a lot.

    Hello

    I think the problem is that the operating system is not found on the HARD drive.

    The test failure PXEE61 media - check the cable appears especially if the laptop tries to boot from LAN.

    Why the laptop is trying to boot from the local network?

    Well,.

    -option may be the LAN was chosen first in the boot order in the BIOS
    -Maybe the drive is defective and so the laptop is trying to boot from LAN
    -the MBR (master boot record) is may be defective

    I think you should take the Toshiba Recovery CD and need to format the HARD drive and needs to be reinstalled the operating system.
    This should help.

    If not, then the HARD drive could malfunction and should be replaced!

Maybe you are looking for

  • Firefox - screen / text is distorted, magnified, inverted, regularized...

    When ever I start FF the screen is distorted - on a slope, in fact. The text on the web pages will be expanded vertically, blackout curtains. The radio buttons will be moved from its position, but if I am lucky and drag the mouse all over where it sh

  • What are the best deals for an iPad?

    What are the best deals for an iPad?

  • Measure the resistance with PXI DMM 4072 on different frequencies

    Hi all I tried to get on board various and unable to find solutions for that. I'm trying to measure resistance using NI PXI-4072 on frequencey 1 kHz, but not luck. When I try to use Agilent LCR meter I see the correct value of the resistance. I've se

  • Boot time has become excessive.

    After having some problems with my HP printer and getting nothing more than generic help support HP I tried to uninstall the printer software and install a version update of HP. After several attempts I was finally able to get my printer working agai

  • Upgrade HP Pavilion 15 Msata

    Hello. I bought a laptop HP pavilion 15 n0004eh in 2013. I would like to know if I can put the MSATA SSD in my notebook, next to the 1 TB HARD drive. Specifications: Intel® Core™ i5 4200U, 8 GB memory 1600 Mhz, GeForce GT 740 M, 1 TB HARD drive http: