<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP Client in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960102#M440556</link>
    <description>&lt;P&gt;Hello Support Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with VPN Passthrough with a NCP Client and Cisco ASA 5520 Version 8.4(3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A VPN IPSec Connection with a Cisco VPN Client through the Cisco ASA works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NCP Client establish a connection with Source and Destination UDP 4500 to the remote VPN Gateway and the connection setup is aborted.&lt;/P&gt;&lt;P&gt;If I establish a connection with a NCP Client on a Virtual Machine with NAT , the connection setup works fine.&lt;/P&gt;&lt;P&gt;A connection setup under VM in Bridge mode is also aborted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN Passthrough problem with the NCP Client started with the Update to version 8.4(3)&lt;/P&gt;&lt;P&gt;The connection worked very well until version 8.2(5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Someone knows the problem?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:21:58 GMT</pubDate>
    <dc:creator>stephan.brunst</dc:creator>
    <dc:date>2019-03-11T23:21:58Z</dc:date>
    <item>
      <title>Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP Client</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960102#M440556</link>
      <description>&lt;P&gt;Hello Support Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with VPN Passthrough with a NCP Client and Cisco ASA 5520 Version 8.4(3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A VPN IPSec Connection with a Cisco VPN Client through the Cisco ASA works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NCP Client establish a connection with Source and Destination UDP 4500 to the remote VPN Gateway and the connection setup is aborted.&lt;/P&gt;&lt;P&gt;If I establish a connection with a NCP Client on a Virtual Machine with NAT , the connection setup works fine.&lt;/P&gt;&lt;P&gt;A connection setup under VM in Bridge mode is also aborted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN Passthrough problem with the NCP Client started with the Update to version 8.4(3)&lt;/P&gt;&lt;P&gt;The connection worked very well until version 8.2(5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Someone knows the problem?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960102#M440556</guid>
      <dc:creator>stephan.brunst</dc:creator>
      <dc:date>2019-03-11T23:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960103#M440557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have encountered a very similar problem.&amp;nbsp; Some customers and partners require us to use a remote access VPN to support them.&amp;nbsp; When the firewall was running 8.2(5) it worked fine.&amp;nbsp; It now requires some annoying hacks to make it work on 8.4(3).&amp;nbsp; My least favorite of these hacks is a 'magical' NAT that prevents inside hosts from stealing port 500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I did and it seems to be working (but is definitely ugly):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="margin: 0px 0px 10px; padding: 5px; font-size: 14px; vertical-align: baseline; background-color: #eeeeee; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif; overflow: auto; max-height: 600px; color: #000000; line-height: 18px;"&gt;&lt;CODE style="vertical-align: baseline; font-family: Consolas, Menlo, Monaco, 'Lucida Console', 'Liberation Mono', 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Courier New', monospace, serif;"&gt;configure terminal
 object network VPN-endpoint
&amp;nbsp; description Prevent inside hosts from stealing VPN endpoint with PAT
&amp;nbsp; host 172.16.0.1
&amp;nbsp; nat (any,outside) static interface service udp isakmp isakmp
&amp;nbsp; exit
 access-list ipsecpassthroughacl extended permit udp any any eq isakmp
 access-list ipsecpassthroughacl extended permit object-group TCPUDP any any eq 4500
 class-map ipsecpassthru-traffic
&amp;nbsp; match access-list ipsecpassthroughacl
&amp;nbsp; exit
 policy-map type inspect ipsec-pass-thru iptmap
&amp;nbsp; parameters
&amp;nbsp;&amp;nbsp; esp
&amp;nbsp;&amp;nbsp; ah
&amp;nbsp;&amp;nbsp; exit
&amp;nbsp; exit
 policy-map inspection_policy
&amp;nbsp; class ipsecpassthru-traffic
&amp;nbsp;&amp;nbsp; inspect ipsec-pass-thru iptmap
&amp;nbsp;&amp;nbsp; exit
&amp;nbsp; exit
 service-policy inspection_policy interface outside
 exit&lt;/CODE&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jun 2012 12:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960103#M440557</guid>
      <dc:creator>AlainODea</dc:creator>
      <dc:date>2012-06-26T12:04:23Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP Clien</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960104#M440558</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Alain,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try it next week.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 13:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960104#M440558</guid>
      <dc:creator>stephan.brunst</dc:creator>
      <dc:date>2012-07-02T13:57:20Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP Clien</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960105#M440559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Stephan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is correct, there is a bug about what Alain just told you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have worked on this issues and the thing is that the ASA is unable to hold or safe those ports for the VPN connections ( he starts doing PAT on ports 500 and 4500).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are some work-arounds like using TCP based ( 10000) but I have seen how it behaves the same way, so my recomendation would be to do an upgrade ASAP to make this work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will provide you the bug ID tomorrow morning .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960105#M440559</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-03T03:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960106#M440560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Julio &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this issue fixed in 8.4(4.1)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 12:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960106#M440560</guid>
      <dc:creator>AlainODea</dc:creator>
      <dc:date>2012-07-04T12:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP C</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960107#M440561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCtq32213&amp;nbsp;&amp;nbsp;&amp;nbsp; VPN ports not removed from pat port pool when crypto map is applied.&lt;/P&gt;&lt;P&gt;The issue is that if you have a client which uses outbound vpn other through your ASA (like one of your consultant from your network trying&lt;/P&gt;&lt;P&gt; to connect to his company vpn),&lt;/P&gt;&lt;P&gt;it will create an xlate for 4500 udp port, if you have the dynamic NAT given for your outside interface IP.&lt;/P&gt;&lt;P&gt; This will engage the 4500 UDP port on ASA and will not release this xlate entry and will remain there. &lt;/P&gt;&lt;P&gt;This will limit users from connecting to our vpn where the gateway is our ASA's outside IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;"&gt;Workaround:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 12px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 12px; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Use the 'clear xlate' command to clear the dynamically created xlate if the problem occurs. To prevent the problem from occurring in the first place, remove the 'flow-export destination &lt;/P&gt;&lt;P&gt; ' command from the configuration and reload the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; text-align: -webkit-auto; background-color: #eeeeee;"&gt;Fixed-In &lt;/STRONG&gt;&lt;A href="http://tools.cisco.com/Support/BugToolKit/images/Field%20Definitions.html" style="color: #003399; font-size: 12px; font-family: Arial, Helvetica, sans-serif; text-align: -webkit-auto; background-color: #eeeeee;" target="_blank"&gt;&lt;IMG alt="Fixed-in" border="0" height="14" id="Fixed_Image" name="Fixed_Image" src="http://tools.cisco.com/Support/BugToolKit/images/icon_info.gif" style="text-decoration: none;" width="13" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.4(4)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jul 2012 17:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960107#M440561</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-04T17:17:42Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA Version 8.4(3): VPN Passthrough Problem with NCP Clien</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960108#M440562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="gt-res-content"&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the update to version 8.4 (4.1) has fixed the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;DIV dir="ltr" style="zoom: 1;"&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Aug 2012 14:43:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-version-8-4-3-vpn-passthrough-problem-with-ncp-client/m-p/1960108#M440562</guid>
      <dc:creator>stephan.brunst</dc:creator>
      <dc:date>2012-08-23T14:43:46Z</dc:date>
    </item>
  </channel>
</rss>

