<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Open a port on Cisco 1811 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779060#M531229</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I entered the commands that you said and under the edit NAT configuration tab on CCP I have the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Translated Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rule Type&lt;BR /&gt;10.11.101.10 (5950)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FastEthernet0 (5950)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However VNC still isn't working from outside the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't the original address be fastethernet0 and the translated address be 10.11.101.10?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Sep 2011 17:13:32 GMT</pubDate>
    <dc:creator>jsandau</dc:creator>
    <dc:date>2011-09-12T17:13:32Z</dc:date>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779056#M531225</link>
      <description>&lt;P&gt;This is problably a stupid question but how do I open a prot on a cisco 1811? I have a cisco 1811 and a computer that has VNC installed on it. I want to be able to access that computer from out side the network using the external ip address and port 5950. People outside the network will be able to open vnc viewer and type in *external ip address*:5950 and it will be directed to the computer with a static internal ip address of 10.11.101.10. What commands do I use to do this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:23:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779056#M531225</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2019-03-11T21:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779057#M531226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port forwarding on Cisco routers is accomplished using static PAT;&lt;/P&gt;&lt;P&gt;let's suppose the server on inside is located out port f0/0 and public port is f0/1&lt;/P&gt;&lt;P&gt;then you must do following: configure &lt;STRONG&gt;ip nat inside&lt;/STRONG&gt; under f0/0 and &lt;STRONG&gt;ip nat outside&lt;/STRONG&gt; under f0/1&lt;/P&gt;&lt;P&gt;then issue following global config command: &lt;STRONG&gt;ip nat inside source static tcp&amp;nbsp; 10.11.101.10 &lt;/STRONG&gt;&lt;STRONG&gt;5950&lt;/STRONG&gt;&lt;STRONG&gt; interface f0/1 5950&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 21:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779057#M531226</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-09T21:03:36Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779058#M531227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm not quite sure what you mean by F0/0 and F0/1. The outside internet is connnected to port FE0 and the inside computer (the vnc server) is getting an ip address from Vlan1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 21:27:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779058#M531227</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-09T21:27:10Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779059#M531228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain was just trying to make a supposition with the interface names... In your case you need to put the command ip nat outside under your interface FE0 and ip nat inside on whatever interface is connected internally to VLAN1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;__ __ &lt;/P&gt;&lt;P&gt;Pablo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Sep 2011 23:47:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779059#M531228</guid>
      <dc:creator>pablo.nxh</dc:creator>
      <dc:date>2011-09-09T23:47:57Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779060#M531229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I entered the commands that you said and under the edit NAT configuration tab on CCP I have the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Translated Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rule Type&lt;BR /&gt;10.11.101.10 (5950)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FastEthernet0 (5950)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However VNC still isn't working from outside the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't the original address be fastethernet0 and the translated address be 10.11.101.10?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 17:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779060#M531229</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-12T17:13:32Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779061#M531230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No this is how it should be but you also have to add an ACL permitting tcp traffic to the translated address and port 5950. Then apply this ACL to interface outside inbound.&lt;/P&gt;&lt;P&gt;eg: &lt;STRONG&gt;access-list VNC_INBOUND permit tcp any x.x.x.x eq 5950&lt;/STRONG&gt; where x.x.x.x is outside IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;access-group VNC_INBOUND&amp;nbsp; in&lt;/STRONG&gt; &lt;STRONG&gt;interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 19:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779061#M531230</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-12T19:35:04Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779062#M531231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I typed in: &lt;/P&gt;&lt;P&gt; access-list VNC_INBOUND permit tcp any *external IP* eq 5950&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I got Invalid input detected at '^' marker, and the ^ marker is right under the V in VNC_inbound&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 19:44:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779062#M531231</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-12T19:44:41Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779063#M531232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sorry I gave config for an ASA not a router.&lt;/P&gt;&lt;P&gt;if this is a router then you don't nedd an ACL unless you've already got one in place then you have to modify to permit vnc access.&lt;/P&gt;&lt;P&gt;Post the output of sh access-list and sh run | i int| ip access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 20:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779063#M531232</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-12T20:47:45Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779064#M531233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the results of the show access-list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;standard IP access list 1&lt;/P&gt;&lt;P&gt; 10 permit 10.11.101.0, wildcard bits 0.0.0.255&lt;/P&gt;&lt;P&gt;Extended IP access list 100&lt;/P&gt;&lt;P&gt; 10 permit ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt; 20 permit ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;Extended IP access list 101&lt;/P&gt;&lt;P&gt; 10 permit ip any host *exteranl ip address*&lt;/P&gt;&lt;P&gt;Extended IP access list 102&lt;/P&gt;&lt;P&gt; 10 permit ip 10.11.101.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;Extended IP access list 103&lt;/P&gt;&lt;P&gt; 10 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;Extended IP access list 104&lt;/P&gt;&lt;P&gt; 10 permit ip host *Site to site VPN address* any&lt;/P&gt;&lt;P&gt;Extended IP access list 105&lt;/P&gt;&lt;P&gt; 10 permit ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;/P&gt;&lt;P&gt;Extended IP access list 106&lt;/P&gt;&lt;P&gt; 10 deny ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt; 20 permit ip 10.11.101.0 0.0.0.255 any (71 matches)&lt;/P&gt;&lt;P&gt;Extended IP access list CCP_IP&lt;/P&gt;&lt;P&gt; 10 permit ip any any&lt;/P&gt;&lt;P&gt;Extended IP access list SDM_AH&lt;/P&gt;&lt;P&gt; 10 permit ahp any any&lt;/P&gt;&lt;P&gt;Extended IP access list SDM_BOOTPC&lt;/P&gt;&lt;P&gt; 10 permit udp any any eq bootpc (2049 matches)&lt;/P&gt;&lt;P&gt;Extended IP access list SDM_ESP&lt;/P&gt;&lt;P&gt; 10 permit esp any any&lt;/P&gt;&lt;P&gt;Extended IP access list SDM_WEBVPN&lt;/P&gt;&lt;P&gt; 10 permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I try the sh run | i int| ip access-group command I get an error&lt;/P&gt;&lt;P&gt;nvalid input detected at '^' marker, and the ^ marker is under the i after the |&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 21:20:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779064#M531233</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-12T21:20:29Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779065#M531234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there must be a space after the first | and before the i but maybe your IOS version doesn't support pipe filtering.&lt;/P&gt;&lt;P&gt;Anyway then do a sh ip interface x/x for your outside and inside interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 07:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779065#M531234</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-13T07:49:10Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779066#M531235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the results of sho ip interface fastethernet0 (the outside interface):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FastEthernet0 is up, line protocol is up&lt;/P&gt;&lt;P&gt; Internet address is *external IP*/22&lt;/P&gt;&lt;P&gt; Broadcast address is 255.255.255.255&lt;/P&gt;&lt;P&gt; Address determined by DHCP&lt;/P&gt;&lt;P&gt; MTU is 1500 bytes&lt;/P&gt;&lt;P&gt; Helper address is not set&lt;/P&gt;&lt;P&gt; Directed broadcast forwarding is disabled&lt;/P&gt;&lt;P&gt; Outgoing access list is not set&lt;/P&gt;&lt;P&gt; Inbound&amp;nbsp; access list is not set&lt;/P&gt;&lt;P&gt; Proxy ARP is disabled&lt;/P&gt;&lt;P&gt; Local Proxy ARP is disabled&lt;/P&gt;&lt;P&gt; Security level is default&lt;/P&gt;&lt;P&gt; Split horizon is enabled&lt;/P&gt;&lt;P&gt; ICMP redirects are never sent&lt;/P&gt;&lt;P&gt; ICMP unreachables are never sent&lt;/P&gt;&lt;P&gt; ICMP mask replies are never sent&lt;/P&gt;&lt;P&gt; IP fast switching is enabled&lt;/P&gt;&lt;P&gt; IP fast switching on the same interface is disabled&lt;/P&gt;&lt;P&gt; IP Flow switching is disabled&lt;/P&gt;&lt;P&gt; IP CEF switching is enabled&lt;/P&gt;&lt;P&gt; IP CEF switching turbo vector&lt;/P&gt;&lt;P&gt; IP multicast fast switching is enabled&lt;/P&gt;&lt;P&gt; IP multicast distributed fast switching is disabled&lt;/P&gt;&lt;P&gt; IP route-cache flags are Fast, CEF&lt;/P&gt;&lt;P&gt; Router Discovery is disabled&lt;/P&gt;&lt;P&gt; IP output packet accounting is disabled&lt;/P&gt;&lt;P&gt; IP access violation accounting is disabled&lt;/P&gt;&lt;P&gt; TCP/IP header compression is disabled&lt;/P&gt;&lt;P&gt; RTP/IP header compression is disabled&lt;/P&gt;&lt;P&gt; Policy routing is disabled&lt;/P&gt;&lt;P&gt; Network address translation is enabled, interface in domain outside&lt;/P&gt;&lt;P&gt; BGP Policy Mapping is disabled&lt;/P&gt;&lt;P&gt; Input features: Stateful Inspection, Ingress-NetFlow, Virtual Fragment Reassem&lt;/P&gt;&lt;P&gt;bly, IPSec input classification, Virtual Fragment Reassembly After IPSec Decrypt&lt;/P&gt;&lt;P&gt;ion, NAT Outside, MCI Check&lt;/P&gt;&lt;P&gt; Output features: Post-routing NAT Outside, Stateful Inspection, IPSec output c&lt;/P&gt;&lt;P&gt;lassification, CCE Post NAT Classification, Firewall (firewall component), Post-&lt;/P&gt;&lt;P&gt;Ingress-NetFlow, IPSec: to crypto engine, Post-encryption output features&lt;/P&gt;&lt;P&gt; WCCP Redirect outbound is disabled&lt;/P&gt;&lt;P&gt; WCCP Redirect inbound is disabled&lt;/P&gt;&lt;P&gt; WCCP Redirect exclude is disabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Here is the results fr show ip interface vlan 1 (inside interface):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vlan1 is up, line protocol is up&lt;/P&gt;&lt;P&gt; Internet address is 10.11.101.1/24&lt;/P&gt;&lt;P&gt; Broadcast address is 255.255.255.255&lt;/P&gt;&lt;P&gt; Address determined by non-volatile memory&lt;/P&gt;&lt;P&gt; MTU is 1500 bytes&lt;/P&gt;&lt;P&gt; Helper address is not set&lt;/P&gt;&lt;P&gt; Directed broadcast forwarding is disabled&lt;/P&gt;&lt;P&gt; Outgoing access list is not set&lt;/P&gt;&lt;P&gt; Inbound&amp;nbsp; access list is not set&lt;/P&gt;&lt;P&gt; Proxy ARP is disabled&lt;/P&gt;&lt;P&gt; Local Proxy ARP is disabled&lt;/P&gt;&lt;P&gt; Security level is default&lt;/P&gt;&lt;P&gt; Split horizon is enabled&lt;/P&gt;&lt;P&gt; ICMP redirects are never sent&lt;/P&gt;&lt;P&gt; ICMP unreachables are never sent&lt;/P&gt;&lt;P&gt; ICMP mask replies are never sent&lt;/P&gt;&lt;P&gt; IP fast switching is enabled&lt;/P&gt;&lt;P&gt; IP fast switching on the same interface is disabled&lt;/P&gt;&lt;P&gt; IP Flow switching is disabled&lt;/P&gt;&lt;P&gt; IP CEF switching is enabled&lt;/P&gt;&lt;P&gt; IP CEF switching turbo vector&lt;/P&gt;&lt;P&gt; IP Null turbo vector&lt;/P&gt;&lt;P&gt; IP multicast fast switching is enabled&lt;/P&gt;&lt;P&gt; IP multicast distributed fast switching is disabled&lt;/P&gt;&lt;P&gt; IP route-cache flags are Fast, CEF&lt;/P&gt;&lt;P&gt; Router Discovery is disabled&lt;/P&gt;&lt;P&gt; IP output packet accounting is disabled&lt;/P&gt;&lt;P&gt; IP access violation accounting is disabled&lt;/P&gt;&lt;P&gt; TCP/IP header compression is disabled&lt;/P&gt;&lt;P&gt; RTP/IP header compression is disabled&lt;/P&gt;&lt;P&gt; Policy routing is disabled&lt;/P&gt;&lt;P&gt; Network address translation is enabled, interface in domain inside&lt;/P&gt;&lt;P&gt; BGP Policy Mapping is disabled&lt;/P&gt;&lt;P&gt; Input features: Stateful Inspection, Ingress-NetFlow, Virtual Fragment Reassem&lt;/P&gt;&lt;P&gt;bly, Virtual Fragment Reassembly After IPSec Decryption, MCI Check, TCP Adjust M&lt;/P&gt;&lt;P&gt;SS&lt;/P&gt;&lt;P&gt; Output features: NAT Inside, Stateful Inspection, CCE Post NAT Classification,&lt;/P&gt;&lt;P&gt; Firewall (firewall component), TCP Adjust MSS, Post-Ingress-NetFlow&lt;/P&gt;&lt;P&gt; WCCP Redirect outbound is disabled&lt;/P&gt;&lt;P&gt; WCCP Redirect inbound is disabled&lt;/P&gt;&lt;P&gt; WCCP Redirect exclude is disabled&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 20:26:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779066#M531235</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-13T20:26:36Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779067#M531236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you post the show run output please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 07:26:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779067#M531236</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-14T07:26:27Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779068#M531237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here is the show run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 12201 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname *Host Name*&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;security authentication failure rate 3 log&lt;/P&gt;&lt;P&gt;security passwords min-length 6&lt;/P&gt;&lt;P&gt;logging message-counter syslog&lt;/P&gt;&lt;P&gt;logging buffered 51200&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret 5 $1$3R6c$adcoV0cvM5hTzxOoPBByc0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login ciscocp_vpn_xauth_ml_1 local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone PCTime -7&lt;/P&gt;&lt;P&gt;clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;enrollment selfsigned&lt;/P&gt;&lt;P&gt;subject-name cn=IOS-Self-Signed-Certificate-1097866965&lt;/P&gt;&lt;P&gt;revocation-check none&lt;/P&gt;&lt;P&gt;rsakeypair TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;certificate self-signed 01&lt;/P&gt;&lt;P&gt;30820256 308201BF A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;/P&gt;&lt;P&gt;31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;/P&gt;&lt;P&gt;69666963 6174652D 31303937 38363639 3635301E 170D3131 30393039 31383130 &lt;/P&gt;&lt;P&gt;32355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;/P&gt;&lt;P&gt;4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 30393738 &lt;/P&gt;&lt;P&gt;36363936 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;/P&gt;&lt;P&gt;8100B1C3 0B9F3231 E9911C7A 7A84E566 F4530769 16830F32 4A61F775 12CDDB5C &lt;/P&gt;&lt;P&gt;23227963 5A53E5C5 2C0E8945 640DB32C ACD17F1A 2C52EC96 7C274099 5D4BBD26 &lt;/P&gt;&lt;P&gt;6E7C4DA9 32C5162B 0A54D437 64B719B9 36904DDA 7B23FC3C E7763F5E BF651874 &lt;/P&gt;&lt;P&gt;1870462E FA0ABE9C 37918D53 2B5B13A7 4FADFC9E 1D8B0B64 141733A7 8DC61C03 &lt;/P&gt;&lt;P&gt;80E90203 010001A3 7E307C30 0F060355 1D130101 FF040530 030101FF 30290603 &lt;/P&gt;&lt;P&gt;551D1104 22302082 1E426F77 5F49736C 616E6453 43414441 2E796F75 72646F6D &lt;/P&gt;&lt;P&gt;61696E2E 636F6D30 1F060355 1D230418 30168014 0AEF8942 249D4EF1 A18B1BA6 &lt;/P&gt;&lt;P&gt;389822CB 16CB4922 301D0603 551D0E04 1604140A EF894224 9D4EF1A1 8B1BA638 &lt;/P&gt;&lt;P&gt;9822CB16 CB492230 0D06092A 864886F7 0D010104 05000381 81008DC2 DFF3604C &lt;/P&gt;&lt;P&gt;93BE4175 7078AC30 7391F8AF 4A15E116 C53D523E 12F6B5F4 15CA5635 C12576F7 &lt;/P&gt;&lt;P&gt;0D5D1A2A F330F781 459F3418 7E82FFBD 2679E17C CDF07A4F A257B599 E7CCC9C6 &lt;/P&gt;&lt;P&gt;38617B96 F2E66F0D 6BFBC000 524B377B 969D51BD 48A9BF8F 8C0220D4 BB249435 &lt;/P&gt;&lt;P&gt;08688D18 794CAFB3 1F74F2F9 4E0C0245 AEA8E55A 2AE758A0 36CC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.11.101.1 10.11.101.99&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool ccp-pool1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 10.11.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 10.11.101.1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip domain name yourdomain.com&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username *username* privilege 15 secret 5 $1$1O79$nIJGrBD9hCpDqheT3mDsC1&lt;/P&gt;&lt;P&gt;username VPNuser secret 5 $1$nPz8$Cni5jyIWv9zlKAU3B5no9.&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key *key* address *External VPN IP address*&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group VPN_Users&lt;/P&gt;&lt;P&gt;key *Key*&lt;/P&gt;&lt;P&gt;pool VPN_Pool&lt;/P&gt;&lt;P&gt;acl 102&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map SDM_CMAP_1 1 ipsec-isakmp &lt;/P&gt;&lt;P&gt;description Tunnel to*External VPN IP address*&lt;/P&gt;&lt;P&gt;set peer *External VPN IP address*&lt;/P&gt;&lt;P&gt;set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;match address 103&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt;log config&lt;/P&gt;&lt;P&gt;hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip tcp synwait-time 10&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_BOOTPC&lt;/P&gt;&lt;P&gt;match access-group name SDM_BOOTPC&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;match access-group 105&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_DHCP_CLIENT_PT&lt;/P&gt;&lt;P&gt;match class-map SDM_BOOTPC&lt;/P&gt;&lt;P&gt;class-map type inspect match-all CCP_SSLVPN&lt;/P&gt;&lt;P&gt;match access-group name CCP_IP&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_AH&lt;/P&gt;&lt;P&gt;match access-group name SDM_AH&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_WEBVPN&lt;/P&gt;&lt;P&gt;match access-group name SDM_WEBVPN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt;match class-map SDM_WEBVPN&lt;/P&gt;&lt;P&gt;match access-group 101&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-cls-bootps&lt;/P&gt;&lt;P&gt;match protocol bootps&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_ESP&lt;/P&gt;&lt;P&gt;match access-group name SDM_ESP&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_VPN_TRAFFIC&lt;/P&gt;&lt;P&gt;match protocol isakmp&lt;/P&gt;&lt;P&gt;match protocol ipsec-msft&lt;/P&gt;&lt;P&gt;match class-map SDM_AH&lt;/P&gt;&lt;P&gt;match class-map SDM_ESP&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_VPN_PT&lt;/P&gt;&lt;P&gt;match access-group 104&lt;/P&gt;&lt;P&gt;match class-map SDM_VPN_TRAFFIC&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;match protocol cuseeme&lt;/P&gt;&lt;P&gt;match protocol dns&lt;/P&gt;&lt;P&gt;match protocol ftp&lt;/P&gt;&lt;P&gt;match protocol h323&lt;/P&gt;&lt;P&gt;match protocol https&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;match protocol imap&lt;/P&gt;&lt;P&gt;match protocol pop3&lt;/P&gt;&lt;P&gt;match protocol netshow&lt;/P&gt;&lt;P&gt;match protocol shell&lt;/P&gt;&lt;P&gt;match protocol realmedia&lt;/P&gt;&lt;P&gt;match protocol rtsp&lt;/P&gt;&lt;P&gt;match protocol smtp extended&lt;/P&gt;&lt;P&gt;match protocol sql-net&lt;/P&gt;&lt;P&gt;match protocol streamworks&lt;/P&gt;&lt;P&gt;match protocol tftp&lt;/P&gt;&lt;P&gt;match protocol vdolive&lt;/P&gt;&lt;P&gt;match protocol tcp&lt;/P&gt;&lt;P&gt;match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt;match access-group 100&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-protocol-http&lt;/P&gt;&lt;P&gt;match protocol http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-bootps&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;class type inspect CCP_SSLVPN&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;class type inspect ccp-invalid-src&lt;/P&gt;&lt;P&gt;drop log&lt;/P&gt;&lt;P&gt;class type inspect ccp-protocol-http&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class type inspect ccp-insp-traffic&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt;class type inspect SDM_VPN_PT&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class type inspect SDM_DHCP_CLIENT_PT&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone security sslvpn-zone&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-VPNOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect sdm-pol-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;description $ES_WAN$$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt;ip address dhcp client-id FastEthernet0&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;zone-member security out-zone&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Virtual-Template1&lt;/P&gt;&lt;P&gt;ip unnumbered FastEthernet0&lt;/P&gt;&lt;P&gt;zone-member security sslvpn-zone&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;description $ETH-SW-LAUNCH$$INTF-INFO-FE 2$$ES_LAN$$FW_INSIDE$&lt;/P&gt;&lt;P&gt;ip address 10.11.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;zone-member security in-zone&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;encapsulation slip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool VPN_Pool 10.11.101.50 10.11.101.99&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.11.101.10 5950 interface FastEthernet0 5950&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended CCP_IP&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_AH&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit ahp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_BOOTPC&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_ESP&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit esp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_WEBVPN&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;/P&gt;&lt;P&gt;access-list 1 remark CCP_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.11.101.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 70.65.185.156&lt;/P&gt;&lt;P&gt;access-list 102 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 10.11.101.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 103 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 103 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 104 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 104 permit ip host *External VPN IP address* any&lt;/P&gt;&lt;P&gt;access-list 105 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 105 permit ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 106 remark CCP_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 106 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 106 deny&amp;nbsp;&amp;nbsp; ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 106 permit ip 10.11.101.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_1 permit 1&lt;/P&gt;&lt;P&gt;match ip address 106&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner exec ^C&lt;/P&gt;&lt;P&gt;% Password expiration warning.&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Configuration Professional (Cisco CP) is installed on this device &lt;/P&gt;&lt;P&gt;and it provides the default username "cisco" for one-time use. If you have &lt;/P&gt;&lt;P&gt;already used the username "cisco" to login to the router and your IOS image &lt;/P&gt;&lt;P&gt;supports the "one-time" user option, then this username has already expired. &lt;/P&gt;&lt;P&gt;You will not be able to login to the router with this username after you exit &lt;/P&gt;&lt;P&gt;this session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is strongly suggested that you create a new username with a privilege level &lt;/P&gt;&lt;P&gt;of 15 using the following command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username &lt;MYUSER&gt; privilege 15 secret 0 &lt;MYPASSWORD&gt;&lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace &lt;MYUSER&gt; and &lt;MYPASSWORD&gt; with the username and password you want to &lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;^C&lt;/P&gt;&lt;P&gt;banner login ^CAuthorized access only!&lt;/P&gt;&lt;P&gt;Disconnect IMMEDIATELY if you are not an authorized user!^C&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;transport output telnet&lt;/P&gt;&lt;P&gt;line 1&lt;/P&gt;&lt;P&gt;modem InOut&lt;/P&gt;&lt;P&gt;stopbits 1&lt;/P&gt;&lt;P&gt;speed 115200&lt;/P&gt;&lt;P&gt;flowcontrol hardware&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;transport output telnet&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler interval 500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn gateway gateway_1&lt;/P&gt;&lt;P&gt;ip address *External IP Address*port 443 &lt;/P&gt;&lt;P&gt;http-redirect port 80&lt;/P&gt;&lt;P&gt;ssl trustpoint TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn install svc flash:/webvpn/sslclient-win-1.1.4.179-anyconnect.pkg sequence 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn install svc flash:/webvpn/sslclient-win-1.1.4.179.pkg sequence 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn context VPN_Pool&lt;/P&gt;&lt;P&gt;secondary-color white&lt;/P&gt;&lt;P&gt;title-color #CCCC66&lt;/P&gt;&lt;P&gt;text-color black&lt;/P&gt;&lt;P&gt;ssl authenticate verify all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy group policy_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; functions svc-enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; svc address-pool "VPN_Pool"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; svc keep-client-installed&lt;/P&gt;&lt;P&gt;virtual-template 1&lt;/P&gt;&lt;P&gt;default-group-policy policy_1&lt;/P&gt;&lt;P&gt;aaa authentication list ciscocp_vpn_xauth_ml_1&lt;/P&gt;&lt;P&gt;gateway gateway_1&lt;/P&gt;&lt;P&gt;inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 14:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779068#M531237</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-14T14:49:30Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779069#M531238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;ip access-list extended VNC&lt;/P&gt;&lt;P&gt; permit tcp any host 10.11.101.10 eq 5950&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect VNC_CLASS&lt;/P&gt;&lt;P&gt; match access-group name VNC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect VNC_POLICY&lt;/P&gt;&lt;P&gt;&amp;nbsp; class VNC_CLASS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security VNC_OUT_IN source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect VNC_POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 18:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779069#M531238</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-14T18:03:36Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779070#M531239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; That didn't work. Here is the new running config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration : 12519 bytes&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service tcp-keepalives-in&lt;/P&gt;&lt;P&gt;service tcp-keepalives-out&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;service sequence-numbers&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname *Host Name*&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;security authentication failure rate 3 log&lt;/P&gt;&lt;P&gt;security passwords min-length 6&lt;/P&gt;&lt;P&gt;logging message-counter syslog&lt;/P&gt;&lt;P&gt;logging buffered 51200&lt;/P&gt;&lt;P&gt;logging console critical&lt;/P&gt;&lt;P&gt;enable secret 5 $1$3R6c$adcoV0cvM5hTzxOoPBByc0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa authentication login default local&lt;/P&gt;&lt;P&gt;aaa authentication login ciscocp_vpn_xauth_ml_1 local&lt;/P&gt;&lt;P&gt;aaa authorization exec default local &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone PCTime -7&lt;/P&gt;&lt;P&gt;clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;enrollment selfsigned&lt;/P&gt;&lt;P&gt;subject-name cn=IOS-Self-Signed-Certificate-1097866965&lt;/P&gt;&lt;P&gt;revocation-check none&lt;/P&gt;&lt;P&gt;rsakeypair TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;certificate self-signed 01&lt;/P&gt;&lt;P&gt;30820256 308201BF A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;/P&gt;&lt;P&gt;31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;/P&gt;&lt;P&gt;69666963 6174652D 31303937 38363639 3635301E 170D3131 30393039 31383130 &lt;/P&gt;&lt;P&gt;32355A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;/P&gt;&lt;P&gt;4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 30393738 &lt;/P&gt;&lt;P&gt;36363936 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;/P&gt;&lt;P&gt;8100B1C3 0B9F3231 E9911C7A 7A84E566 F4530769 16830F32 4A61F775 12CDDB5C &lt;/P&gt;&lt;P&gt;23227963 5A53E5C5 2C0E8945 640DB32C ACD17F1A 2C52EC96 7C274099 5D4BBD26 &lt;/P&gt;&lt;P&gt;6E7C4DA9 32C5162B 0A54D437 64B719B9 36904DDA 7B23FC3C E7763F5E BF651874 &lt;/P&gt;&lt;P&gt;1870462E FA0ABE9C 37918D53 2B5B13A7 4FADFC9E 1D8B0B64 141733A7 8DC61C03 &lt;/P&gt;&lt;P&gt;80E90203 010001A3 7E307C30 0F060355 1D130101 FF040530 030101FF 30290603 &lt;/P&gt;&lt;P&gt;551D1104 22302082 1E426F77 5F49736C 616E6453 43414441 2E796F75 72646F6D &lt;/P&gt;&lt;P&gt;61696E2E 636F6D30 1F060355 1D230418 30168014 0AEF8942 249D4EF1 A18B1BA6 &lt;/P&gt;&lt;P&gt;389822CB 16CB4922 301D0603 551D0E04 1604140A EF894224 9D4EF1A1 8B1BA638 &lt;/P&gt;&lt;P&gt;9822CB16 CB492230 0D06092A 864886F7 0D010104 05000381 81008DC2 DFF3604C &lt;/P&gt;&lt;P&gt;93BE4175 7078AC30 7391F8AF 4A15E116 C53D523E 12F6B5F4 15CA5635 C12576F7 &lt;/P&gt;&lt;P&gt;0D5D1A2A F330F781 459F3418 7E82FFBD 2679E17C CDF07A4F A257B599 E7CCC9C6 &lt;/P&gt;&lt;P&gt;38617B96 F2E66F0D 6BFBC000 524B377B 969D51BD 48A9BF8F 8C0220D4 BB249435 &lt;/P&gt;&lt;P&gt;08688D18 794CAFB3 1F74F2F9 4E0C0245 AEA8E55A 2AE758A0 36CC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;dot11 syslog&lt;/P&gt;&lt;P&gt;no ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.11.101.1 10.11.101.99&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool ccp-pool1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 10.11.101.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 10.11.101.1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;no ip bootp server&lt;/P&gt;&lt;P&gt;no ip domain lookup&lt;/P&gt;&lt;P&gt;ip domain name yourdomain.com&lt;/P&gt;&lt;P&gt;ip inspect log drop-pkt&lt;/P&gt;&lt;P&gt;no ipv6 cef&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;multilink bundle-name authenticated&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username *UserName* privilege 15 secret 5 $1$1O79$nIJGrBD9hCpDqheT3mDsC1&lt;/P&gt;&lt;P&gt;username VPNuser secret 5 $1$nPz8$Cni5jyIWv9zlKAU3B5no9.&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 1&lt;/P&gt;&lt;P&gt;encr 3des&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key *Key* address *External VPN IP Address*&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp client configuration group VPN_Users&lt;/P&gt;&lt;P&gt;key *Key*&lt;/P&gt;&lt;P&gt;pool *VPN_pool*&lt;/P&gt;&lt;P&gt;acl 102&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map SDM_CMAP_1 1 ipsec-isakmp &lt;/P&gt;&lt;P&gt;description Tunnel to*External VPN IP Address*&lt;/P&gt;&lt;P&gt;set peer *External VPN IP Address*&lt;/P&gt;&lt;P&gt;set transform-set ESP-3DES-SHA &lt;/P&gt;&lt;P&gt;match address 103&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt;log config&lt;/P&gt;&lt;P&gt;hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip tcp synwait-time 10&lt;/P&gt;&lt;P&gt;ip ssh time-out 60&lt;/P&gt;&lt;P&gt;ip ssh authentication-retries 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_BOOTPC&lt;/P&gt;&lt;P&gt;match access-group name SDM_BOOTPC&lt;/P&gt;&lt;P&gt;class-map type inspect match-all sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;match access-group 105&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_DHCP_CLIENT_PT&lt;/P&gt;&lt;P&gt;match class-map SDM_BOOTPC&lt;/P&gt;&lt;P&gt;class-map type inspect match-all CCP_SSLVPN&lt;/P&gt;&lt;P&gt;match access-group name CCP_IP&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_AH&lt;/P&gt;&lt;P&gt;match access-group name SDM_AH&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_WEBVPN&lt;/P&gt;&lt;P&gt;match access-group name SDM_WEBVPN&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt;match class-map SDM_WEBVPN&lt;/P&gt;&lt;P&gt;match access-group 101&lt;/P&gt;&lt;P&gt;class-map type inspect match-any sdm-cls-bootps&lt;/P&gt;&lt;P&gt;match protocol bootps&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_ESP&lt;/P&gt;&lt;P&gt;match access-group name SDM_ESP&lt;/P&gt;&lt;P&gt;class-map type inspect match-any SDM_VPN_TRAFFIC&lt;/P&gt;&lt;P&gt;match protocol isakmp&lt;/P&gt;&lt;P&gt;match protocol ipsec-msft&lt;/P&gt;&lt;P&gt;match class-map SDM_AH&lt;/P&gt;&lt;P&gt;match class-map SDM_ESP&lt;/P&gt;&lt;P&gt;class-map type inspect match-all SDM_VPN_PT&lt;/P&gt;&lt;P&gt;match access-group 104&lt;/P&gt;&lt;P&gt;match class-map SDM_VPN_TRAFFIC&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;match protocol cuseeme&lt;/P&gt;&lt;P&gt;match protocol dns&lt;/P&gt;&lt;P&gt;match protocol ftp&lt;/P&gt;&lt;P&gt;match protocol h323&lt;/P&gt;&lt;P&gt;match protocol https&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;match protocol imap&lt;/P&gt;&lt;P&gt;match protocol pop3&lt;/P&gt;&lt;P&gt;match protocol netshow&lt;/P&gt;&lt;P&gt;match protocol shell&lt;/P&gt;&lt;P&gt;match protocol realmedia&lt;/P&gt;&lt;P&gt;match protocol rtsp&lt;/P&gt;&lt;P&gt;match protocol smtp extended&lt;/P&gt;&lt;P&gt;match protocol sql-net&lt;/P&gt;&lt;P&gt;match protocol streamworks&lt;/P&gt;&lt;P&gt;match protocol tftp&lt;/P&gt;&lt;P&gt;match protocol vdolive&lt;/P&gt;&lt;P&gt;match protocol tcp&lt;/P&gt;&lt;P&gt;match protocol udp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-insp-traffic&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-insp-traffic&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;match protocol icmp&lt;/P&gt;&lt;P&gt;class-map type inspect match-all VNC_CLASS&lt;/P&gt;&lt;P&gt;match access-group name VNC&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-icmp-access&lt;/P&gt;&lt;P&gt;match class-map ccp-cls-icmp-access&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-invalid-src&lt;/P&gt;&lt;P&gt;match access-group 100&lt;/P&gt;&lt;P&gt;class-map type inspect match-all ccp-protocol-http&lt;/P&gt;&lt;P&gt;match protocol http&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-bootps&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect ccp-icmp-access&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;policy-map type inspect VNC_POLICY&lt;/P&gt;&lt;P&gt;class type inspect VNC_CLASS&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;class type inspect CCP_SSLVPN&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect sdm-pol-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;class type inspect sdm-cls-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;class type inspect ccp-invalid-src&lt;/P&gt;&lt;P&gt;drop log&lt;/P&gt;&lt;P&gt;class type inspect ccp-protocol-http&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class type inspect ccp-insp-traffic&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect ccp-permit&lt;/P&gt;&lt;P&gt;class type inspect SDM_VPN_PT&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class type inspect SDM_WEBVPN_TRAFFIC&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;class type inspect SDM_DHCP_CLIENT_PT&lt;/P&gt;&lt;P&gt;pass&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;drop&lt;/P&gt;&lt;P&gt;policy-map type inspect VNC-POLICY&lt;/P&gt;&lt;P&gt;class type inspect VNC_CLASS&lt;/P&gt;&lt;P&gt;inspect &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;zone security out-zone&lt;/P&gt;&lt;P&gt;zone security in-zone&lt;/P&gt;&lt;P&gt;zone security sslvpn-zone&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-self-out source self destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-permit-icmpreply&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-in-out source in-zone destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-inspect&lt;/P&gt;&lt;P&gt;zone-pair security ccp-zp-out-self source out-zone destination self&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-permit&lt;/P&gt;&lt;P&gt;zone-pair security zp-out-zone-sslvpn-zone source out-zone destination sslvpn-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-sslvpn-zone-out-zone source sslvpn-zone destination out-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-in-zone-sslvpn-zone source in-zone destination sslvpn-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security zp-sslvpn-zone-in-zone source sslvpn-zone destination in-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect ccp-sslvpn-pol&lt;/P&gt;&lt;P&gt;zone-pair security sdm-zp-VPNOutsideToInside-1 source out-zone destination in-zone&lt;/P&gt;&lt;P&gt;service-policy type inspect sdm-pol-VPNOutsideToInside-1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;description $ES_WAN$$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt;ip address dhcp client-id FastEthernet0&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;zone-member security out-zone&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;duplex auto&lt;/P&gt;&lt;P&gt;speed auto&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Virtual-Template1&lt;/P&gt;&lt;P&gt;ip unnumbered FastEthernet0&lt;/P&gt;&lt;P&gt;zone-member security sslvpn-zone&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;description $ETH-SW-LAUNCH$$INTF-INFO-FE 2$$ES_LAN$$FW_INSIDE$&lt;/P&gt;&lt;P&gt;ip address 10.11.101.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;ip flow ingress&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;ip virtual-reassembly&lt;/P&gt;&lt;P&gt;zone-member security in-zone&lt;/P&gt;&lt;P&gt;ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;no ip redirects&lt;/P&gt;&lt;P&gt;no ip unreachables&lt;/P&gt;&lt;P&gt;no ip proxy-arp&lt;/P&gt;&lt;P&gt;encapsulation slip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool *VPN_pool* 10.11.101.50 10.11.101.99&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.11.101.10 5950 interface FastEthernet0 5950&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet0 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended CCP_IP&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;permit ip any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_AH&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit ahp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_BOOTPC&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;permit udp any any eq bootpc&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_ESP&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit esp any any&lt;/P&gt;&lt;P&gt;ip access-list extended SDM_WEBVPN&lt;/P&gt;&lt;P&gt;remark CCP_ACL Category=1&lt;/P&gt;&lt;P&gt;permit tcp any any eq 443&lt;/P&gt;&lt;P&gt;ip access-list extended VNC&lt;/P&gt;&lt;P&gt;permit tcp any host 10.11.101.10 eq 5950&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;access-list 1 remark INSIDE_IF=Vlan1&lt;/P&gt;&lt;P&gt;access-list 1 remark CCP_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 1 permit 10.11.101.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 255.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 127.0.0.0 0.255.255.255 any&lt;/P&gt;&lt;P&gt;access-list 101 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any host 70.65.185.156&lt;/P&gt;&lt;P&gt;access-list 102 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 10.11.101.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 103 remark CCP_ACL Category=4&lt;/P&gt;&lt;P&gt;access-list 103 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 104 remark CCP_ACL Category=128&lt;/P&gt;&lt;P&gt;access-list 104 permit ip host *External VPN IP Address* any&lt;/P&gt;&lt;P&gt;access-list 105 remark CCP_ACL Category=0&lt;/P&gt;&lt;P&gt;access-list 105 permit ip 10.11.100.0 0.0.0.255 10.11.101.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 106 remark CCP_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 106 remark IPSec Rule&lt;/P&gt;&lt;P&gt;access-list 106 deny&amp;nbsp;&amp;nbsp; ip 10.11.101.0 0.0.0.255 10.11.100.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 106 permit ip 10.11.101.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_1 permit 1&lt;/P&gt;&lt;P&gt;match ip address 106&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner exec ^C&lt;/P&gt;&lt;P&gt;% Password expiration warning.&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Configuration Professional (Cisco CP) is installed on this device &lt;/P&gt;&lt;P&gt;and it provides the default username "cisco" for one-time use. If you have &lt;/P&gt;&lt;P&gt;already used the username "cisco" to login to the router and your IOS image &lt;/P&gt;&lt;P&gt;supports the "one-time" user option, then this username has already expired. &lt;/P&gt;&lt;P&gt;You will not be able to login to the router with this username after you exit &lt;/P&gt;&lt;P&gt;this session.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is strongly suggested that you create a new username with a privilege level &lt;/P&gt;&lt;P&gt;of 15 using the following command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;username &lt;MYUSER&gt; privilege 15 secret 0 &lt;MYPASSWORD&gt;&lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace &lt;MYUSER&gt; and &lt;MYPASSWORD&gt; with the username and password you want to &lt;/MYPASSWORD&gt;&lt;/MYUSER&gt;&lt;/P&gt;&lt;P&gt;use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;^C&lt;/P&gt;&lt;P&gt;banner login ^CAuthorized access only!&lt;/P&gt;&lt;P&gt;Disconnect IMMEDIATELY if you are not an authorized user!^C&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt;transport output telnet&lt;/P&gt;&lt;P&gt;line 1&lt;/P&gt;&lt;P&gt;modem InOut&lt;/P&gt;&lt;P&gt;stopbits 1&lt;/P&gt;&lt;P&gt;speed 115200&lt;/P&gt;&lt;P&gt;flowcontrol hardware&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;transport output telnet&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;line vty 5 15&lt;/P&gt;&lt;P&gt;transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler interval 500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn gateway gateway_1&lt;/P&gt;&lt;P&gt;ip address *External IP Address*port 443 &lt;/P&gt;&lt;P&gt;http-redirect port 80&lt;/P&gt;&lt;P&gt;ssl trustpoint TP-self-signed-1097866965&lt;/P&gt;&lt;P&gt;inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn install svc flash:/webvpn/sslclient-win-1.1.4.179-anyconnect.pkg sequence 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn install svc flash:/webvpn/sslclient-win-1.1.4.179.pkg sequence 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;webvpn context *VPN_pool*&lt;/P&gt;&lt;P&gt;secondary-color white&lt;/P&gt;&lt;P&gt;title-color #CCCC66&lt;/P&gt;&lt;P&gt;text-color black&lt;/P&gt;&lt;P&gt;ssl authenticate verify all&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy group policy_1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; functions svc-enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; svc address-pool "*VPN_pool*"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; svc keep-client-installed&lt;/P&gt;&lt;P&gt;virtual-template 1&lt;/P&gt;&lt;P&gt;default-group-policy policy_1&lt;/P&gt;&lt;P&gt;aaa authentication list ciscocp_vpn_xauth_ml_1&lt;/P&gt;&lt;P&gt;gateway gateway_1&lt;/P&gt;&lt;P&gt;inservice&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 19:33:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779070#M531239</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-14T19:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779071#M531240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So at least you did get a logging message telling you the packet was dropped?&lt;/P&gt;&lt;P&gt;How are you connected to the device? if it is with telnet then issue &lt;STRONG&gt;terminal monitor&lt;/STRONG&gt; command&amp;nbsp; &lt;STRONG&gt;and logging buffered 6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and&lt;STRONG&gt;&amp;nbsp; logging monitor 6.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Post the output of the log message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 07:46:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779071#M531240</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-15T07:46:12Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779072#M531241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the terminal monitor log:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;000719: *Sep 15 14:03:24.926 PCTime: %FW-6-DROP_PKT: Dropping tcp session 70.xxx.xxx.xxx:1382 72.xxx.xxx.xxx:443 due to RST inside current window with ip ident 0&lt;/P&gt;&lt;P&gt;000720: *Sep 15 14:05:28.594 PCTime: %FW-6-DROP_PKT: Dropping tcp session 58.xxx.xxx.xxx:12200 70.xxx.xxx.xxx:2479 on zone-pair ccp-zp-out-self class class-defau&lt;/P&gt;&lt;P&gt;lt due to DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;000721: *Sep 15 14:05:52.066 PCTime: %FW-6-LOG_SUMMARY: 1 packet were dropped from 58.xxx.xxx.xxx:12200 =&amp;gt; 70. xxx.xxx.xxx:2479 (target:class)-(ccp-zp-out-self:class-default)&lt;/P&gt;&lt;P&gt;000722: *Sep 15 14:05:52.066 PCTime: %FW-6-LOG_SUMMARY: 1 packet were dropped from 58.xxx.xxx.xxx:12200 =&amp;gt; 70. xxx.xxx.xxx:3246 (target:class)-(ccp-zp-out-self:class-default)&lt;/P&gt;&lt;P&gt;000723: *Sep 15 14:06:36.002 PCTime: %FW-6-DROP_PKT: Dropping tcp session 142. xxx.xxx.xxx:20088 10.11.101.10:5950 on zone-pair sdm-zp-VPNOutsideToInside-1 class&lt;/P&gt;&lt;P&gt;class-default due to DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;000724: *Sep 15 14:06:52.066 PCTime: %FW-6-LOG_SUMMARY: 3 packets were dropped f&lt;/P&gt;&lt;P&gt;rom 142. xxx.xxx.xxx:20088 =&amp;gt; 10.11.101.10:5950 (target:class)-(sdm-zp-VPNOutsideToInside-1:class-default)&lt;/P&gt;&lt;P&gt;000725: *Sep 15 14:07:19.834 PCTime: %FW-6-DROP_PKT: Dropping tcp session 88. xxx.xxx.xxx:21171 70. xxx.xxx.xxx:3389 on zone-pair ccp-zp-out-self class class-default due to DROP action found in policy-map with ip ident 0&lt;/P&gt;&lt;P&gt;000726: *Sep 15 14:07:52.066 PCTime: %FW-6-LOG_SUMMARY: 2 packets were dropped from 88. xxx.xxx.xxx:21171 =&amp;gt; 70. xxx.xxx.xxx:3389 (target:class)-(ccp-zp-out-self:class-default)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 20:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779072#M531241</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-15T20:15:47Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779073#M531242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok now we know why my config is not working:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LOG_SUMMARY: 3 packets were dropped f&lt;/P&gt;&lt;P&gt;rom 142. xxx.xxx.xxx:20088 =&amp;gt; 10.11.101.10:5950 (target:class)-(&lt;STRONG&gt;sdm-zp-VPNOutsideToInside-1:class-default&lt;/STRONG&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; the traffic is matched by class default in the service-policy for VPN created by sdm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in your latest config I don't see this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security VNC_OUT_IN source out-zone destination in-zone&lt;/P&gt;&lt;P&gt; service-policy type inspect VNC_POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you add it and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 20:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779073#M531242</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-15T20:39:50Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779074#M531243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; When I type in&amp;nbsp; zone-pair security VNC_OUT_IN source out-zone destination in-zone I get this. I don't know if it is an error or just a warning perhaps:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;% Already zone-pair sdm-zp-VPNOutsideToInside-1 exists for the specified source&lt;/P&gt;&lt;P&gt;and destination zones&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and whe I type in service-policy type inspect VNC_POLICY I get:&lt;/P&gt;&lt;P&gt;Invalid input marker detected at ^. The ^ is a t the - in service-policy&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Sep 2011 20:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779074#M531243</guid>
      <dc:creator>jsandau</dc:creator>
      <dc:date>2011-09-15T20:52:12Z</dc:date>
    </item>
    <item>
      <title>Open a port on Cisco 1811</title>
      <link>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779075#M531244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ok so we'll have to modify the existing policy.&lt;/P&gt;&lt;P&gt;I'll post the config when I get to work in about an hour.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2011 05:48:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-a-port-on-cisco-1811/m-p/1779075#M531244</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-16T05:48:03Z</dc:date>
    </item>
  </channel>
</rss>

