<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic asa server internal dchp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163513#M361627</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the vpn client using the "local ip pool" in the Cisco ASA configured with a DHCP address range reserved for internal DHCP server on the network, the Cisco ASA log indicates no mistake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you spanish?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Feb 2013 12:32:01 GMT</pubDate>
    <dc:creator>alexispino</dc:creator>
    <dc:date>2013-02-22T12:32:01Z</dc:date>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163511#M361622</link>
      <description>&lt;P&gt;I have a asa 5510 vpn client groups configured and connected to the internal network DHCP server stops giving network service dhcp and the network goes down, someone may have an idea of what may be occurring&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:03:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163511#M361622</guid>
      <dc:creator>alexispino</dc:creator>
      <dc:date>2019-03-12T01:03:59Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163512#M361626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that the VPN clients are getting their IP address using an internal DHCP server but as soon as they using it the DHCP network stops working and providing IP addresses so the internal users lost their IP address and no one can go out?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 04:27:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163512#M361626</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-02-22T04:27:04Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163513#M361627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the vpn client using the "local ip pool" in the Cisco ASA configured with a DHCP address range reserved for internal DHCP server on the network, the Cisco ASA log indicates no mistake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you spanish?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 12:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163513#M361627</guid>
      <dc:creator>alexispino</dc:creator>
      <dc:date>2013-02-22T12:32:01Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163514#M361628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hola Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Si , si quieres me explicas en espa;ol para ver si te entiendo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saludos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 16:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163514#M361628</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-02-22T16:34:26Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163515#M361629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hola:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bueno principlamente es lo siguiente , en la puesta en produccion de un Cisco AsA realice la conexion hacia internet sin problemas luego configure un grupo de vpn para comenzar a trabajar y dar soporte&amp;nbsp; pero al conectar hacia la red interna lan este provoco la caida de la red especialmente del servicio dhcp y con esto los usuarios finales les daba el error de ip en conflicto , hoy analice mejor la configuracion y existia un error adjunto la configuracion y el cambio, creo esa era la situacion ahora estoy esperando la ventana de tiempo para poder levantar la conexion de la ethernet 0/1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;principalmente el error era el nat con esto estaba activando las traslaciones pero en sentido inverso con sus proxy arp. para los usuarios vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (internet,inside) source static VpnLAN VpnLAN destination static VpnCliente VpnCliente&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;el cambio&lt;/P&gt;&lt;P&gt;nat (inside,internet) source static VpnLAN VpnLAN destination static VpnCliente VpnCliente&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description INTERNET&lt;/P&gt;&lt;P&gt; nameif internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 201.238.221.21 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.30.17.1 255.255.254.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa845-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name linde.cl&lt;/P&gt;&lt;P&gt;object-group network VpnLAN&lt;/P&gt;&lt;P&gt; description Permisos administracion red interna&lt;/P&gt;&lt;P&gt; network-object 10.30.16.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object 10.218.131.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network VpnCliente&lt;/P&gt;&lt;P&gt; description usuarios vpn soporte&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.20&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.21&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.22&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.23&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.24&lt;/P&gt;&lt;P&gt; network-object host 10.30.17.25&lt;/P&gt;&lt;P&gt;access-list vpn_client extended permit ip object-group VpnLAN object-group VpnCliente &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm debugging&lt;/P&gt;&lt;P&gt;mtu internet 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool Soporte 10.30.17.20-10.30.17.25 mask 255.255.254.0&lt;/P&gt;&lt;P&gt;ip local pool user-corp 10.30.17.26-10.30.17.40 mask 255.255.254.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface internet&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface inside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711-52.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,internet) source static VpnLAN VpnLAN destination static VpnCliente VpnCliente&lt;/P&gt;&lt;P&gt;route internet 0.0.0.0 0.0.0.0 201.238.221.17 1&lt;/P&gt;&lt;P&gt;route inside 10.218.131.0 255.255.255.0 10.30.16.11 1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto ipsec ikev1 transform-set usuarioremoto esp-aes esp-sha-hmac &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;crypto dynamic-map clienteremoto 65535 set ikev1 transform-set usuarioremoto&lt;/P&gt;&lt;P&gt;crypto map segurovpn 200 ipsec-isakmp dynamic clienteremoto&lt;/P&gt;&lt;P&gt;crypto map segurovpn interface internet&lt;/P&gt;&lt;P&gt;crypto isakmp identity address &lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 30&lt;/P&gt;&lt;P&gt;crypto ikev1 enable internet&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 1800&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;threat-detection basic-threat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt;group-policy cliente internal&lt;/P&gt;&lt;P&gt;group-policy cliente attributes&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; vpn-tunnel-protocol ikev1 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value vpn_client&lt;/P&gt;&lt;P&gt; address-pools value Soporte-Hiway&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group Soporte2013 type remote-access&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;tunnel-group Soporte2013 general-attributes&lt;/P&gt;&lt;P&gt; address-pool Soporte&lt;/P&gt;&lt;P&gt; default-group-policy cliente&lt;/P&gt;&lt;P&gt; password-management&lt;/P&gt;&lt;P&gt;tunnel-group Soporte2013 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 20:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163515#M361629</guid>
      <dc:creator>alexispino</dc:creator>
      <dc:date>2013-02-22T20:15:31Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163516#M361630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hola Alex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Es correcto, el NAT lo pusiste de OUT hacia IN cuando normalmente se configura de IN a OUT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Revisando la configuracion veo que el IP local pool esta en el mismo broadcast domain que la red interna, por ende te recomendaria cambiar eso tan pronto como sea posible ( utilizar un subnet dedicado para lo que es los VPN users)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luego cambiar el NAT y listo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Saludos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2013 20:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163516#M361630</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-02-22T20:53:52Z</dc:date>
    </item>
    <item>
      <title>asa server internal dchp</title>
      <link>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163517#M361631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hola en el dia de ayer aplique los cambios anteriores del nat y la situacion fue totalmente normal , en resumen al activar el nat desde una interface de menor nivel de seguridad a una de mayor nivel de seguridad se activa el proxy arp esto afecta a los servicios especificamente dhcp y con esto la red comienza a tener problemas de acceso y los usuarios dejan de tener este servicio y se produce la denegacion de este . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;saludos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 21:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-server-internal-dchp/m-p/2163517#M361631</guid>
      <dc:creator>alexispino</dc:creator>
      <dc:date>2013-02-27T21:17:50Z</dc:date>
    </item>
  </channel>
</rss>

