<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Karsten, I considered in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457737#M268015</link>
    <description>&lt;P&gt;Hi Karsten, I considered using the ASA to teminate VPN, but the person requesting this is doing a special project that involves a Tripp Lite Console server, which includes&amp;nbsp;a pptp vpn server.&amp;nbsp; I'll ask if we can instead terminate&amp;nbsp;vpn access at ASA.&amp;nbsp; Also,&amp;nbsp;I somehow left that info out while cleaning the config.&amp;nbsp; I have a few other ports&amp;nbsp;open to this console server that can be closed if the vpn worked.&amp;nbsp; Thanks!&amp;nbsp; &amp;nbsp;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network pptp-server&lt;BR /&gt;&amp;nbsp;host 192.168.0.3&lt;BR /&gt;object network Ext-IP-113&lt;BR /&gt;&amp;nbsp;host 77.77.77.113&lt;BR /&gt;object-group service Console-Range-2 tcp&lt;BR /&gt;&amp;nbsp;port-object range 2001 2016&lt;BR /&gt;&amp;nbsp;port-object range 3001 3016&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;group-object Console-Range-2&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object gre&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pptp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq isakmp&lt;BR /&gt;&amp;nbsp;service-object esp&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 object pptp-server&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object pptp-server object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT:&amp;nbsp; Karsten, as an update, I tried removing&amp;nbsp;the current NAT and tried&amp;nbsp;your suggestion,&amp;nbsp;but no luck&amp;nbsp;and it actually broke https access to the internal server so I put it back the way it was.&amp;nbsp;&amp;nbsp;I also noticed this in the config &amp;gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Warning: All traffic destined to the ip address of the inside interface is being redirected&lt;/P&gt;&lt;P&gt;Warning: Users may not be able to access any service enabled on the inside interface&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;What exactly does this mean?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Mar 2014 14:08:12 GMT</pubDate>
    <dc:creator>david</dc:creator>
    <dc:date>2014-03-28T14:08:12Z</dc:date>
    <item>
      <title>Cannot access internal PPTP Server!</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457735#M268013</link>
      <description>&lt;P&gt;Hi All, pulling my hair out on this one...&amp;nbsp; We have an internal PPTP server that works fine when I access it via internal subnet.&amp;nbsp; However, I cannot get access&amp;nbsp;from an external&amp;nbsp;IP via&amp;nbsp;our ASA 5505.&amp;nbsp; I've tried enabling/disabling PPTP Fixup as well as many different config changes, but it will not&amp;nbsp;work.&amp;nbsp; I even upgraded from 8.4.5 to 9.1.4.&amp;nbsp;&amp;nbsp;I also called the PPTP server vendor&amp;nbsp;and they said that there's nothing special needed for their pptp server so I'm stumped.&amp;nbsp; Debug doesn't show anything too descriptive.&amp;nbsp; The last line says teardown GRE connection and then the windows vpn client says it could not connect.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The pertinent current config is below, am I&amp;nbsp;missing anything obvious?&amp;nbsp; Thanks!&lt;/P&gt;&lt;P&gt;--------------------------------------------------&lt;/P&gt;&lt;P&gt;ASA Version 9.1(4)&lt;BR /&gt;!&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.0.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 77.77.77.117 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network pptp-server&lt;BR /&gt;&amp;nbsp;host 192.168.0.3&lt;BR /&gt;object network Ext-IP-113&lt;BR /&gt;&amp;nbsp;host 77.77.77.113&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object gre&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pptp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq isakmp&lt;BR /&gt;&amp;nbsp;service-object esp&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object pptp-server object-group DM_INLINE_TCP_1&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;nat (outside,inside) source static any interface destination static Ext-IP-113 pptp-server&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 77.77.77.118 1&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457735#M268013</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2019-03-12T04:00:18Z</dc:date>
    </item>
    <item>
      <title>What is the content of the</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457736#M268014</link>
      <description>&lt;OL&gt;&lt;LI&gt;What is the content of the object-group "DM_INLINE_TCP_1"? I don't see that in the config.&lt;/LI&gt;&lt;LI&gt;I would configure the NAT in the more traditional way instead of the destination-style you are using:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;TT&gt;object network pptp-server&lt;BR /&gt;&amp;nbsp; host 192.168.0.3&lt;BR /&gt;&amp;nbsp; nat (inside,outside) static Ext-IP-113&lt;/TT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;TT&gt;And consider to migrate to SSL or IPsec VPNs. PPTP is not state of the art any more and in a security-sensitive environment I would consider PPTP more or less as cleartext.&lt;/TT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2014 09:10:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457736#M268014</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-03-28T09:10:21Z</dc:date>
    </item>
    <item>
      <title>Hi Karsten, I considered</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457737#M268015</link>
      <description>&lt;P&gt;Hi Karsten, I considered using the ASA to teminate VPN, but the person requesting this is doing a special project that involves a Tripp Lite Console server, which includes&amp;nbsp;a pptp vpn server.&amp;nbsp; I'll ask if we can instead terminate&amp;nbsp;vpn access at ASA.&amp;nbsp; Also,&amp;nbsp;I somehow left that info out while cleaning the config.&amp;nbsp; I have a few other ports&amp;nbsp;open to this console server that can be closed if the vpn worked.&amp;nbsp; Thanks!&amp;nbsp; &amp;nbsp;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network pptp-server&lt;BR /&gt;&amp;nbsp;host 192.168.0.3&lt;BR /&gt;object network Ext-IP-113&lt;BR /&gt;&amp;nbsp;host 77.77.77.113&lt;BR /&gt;object-group service Console-Range-2 tcp&lt;BR /&gt;&amp;nbsp;port-object range 2001 2016&lt;BR /&gt;&amp;nbsp;port-object range 3001 3016&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;group-object Console-Range-2&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object gre&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pptp&lt;BR /&gt;&amp;nbsp;service-object udp destination eq isakmp&lt;BR /&gt;&amp;nbsp;service-object esp&lt;BR /&gt;access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 object pptp-server&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 object pptp-server object-group DM_INLINE_TCP_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT:&amp;nbsp; Karsten, as an update, I tried removing&amp;nbsp;the current NAT and tried&amp;nbsp;your suggestion,&amp;nbsp;but no luck&amp;nbsp;and it actually broke https access to the internal server so I put it back the way it was.&amp;nbsp;&amp;nbsp;I also noticed this in the config &amp;gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;Warning: All traffic destined to the ip address of the inside interface is being redirected&lt;/P&gt;&lt;P&gt;Warning: Users may not be able to access any service enabled on the inside interface&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;What exactly does this mean?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2014 14:08:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-internal-pptp-server/m-p/2457737#M268015</guid>
      <dc:creator>david</dc:creator>
      <dc:date>2014-03-28T14:08:12Z</dc:date>
    </item>
  </channel>
</rss>

