<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1621003#M594264</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear it's working, Francisco. Thanks for the invite..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Jan 2011 22:52:38 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-17T22:52:38Z</dc:date>
    <item>
      <title>Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1620995#M594256</link>
      <description>&lt;P&gt;First of all, sorry for my English. My problem is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA5510 Firewall with one router in the outside interface doing NAT (It is also a VPN Server) and another one in inside interface. When I tried to open a remote desktop from Internet using VPN to an internal PC, this PC does not respond, but I launch a Ping command from the internal PC to the outside firewall interface and then I relaunch the remote desktop connection, it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. Regards.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:35:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1620995#M594256</guid>
      <dc:creator>fmartos</dc:creator>
      <dc:date>2019-03-11T19:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1620996#M594257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you please share the output of the following show commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run interface&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as well as the ip address of the remote desktop server. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 09:28:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1620996#M594257</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-14T09:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1620997#M594258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, Jennifer, for your quickly answer. This is the output of commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SA5510# sh run inter&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.101.2 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.102.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif DMZ&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.50.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address Management-Interface 255.255.255.0&lt;BR /&gt; management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510-CEPC# sh run nat&lt;BR /&gt;nat (Inside) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;ASA5510-CEPC#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510-CEPC# sh run static&lt;BR /&gt;ASA5510-CEPC#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5510-CEPC# sh run global&lt;BR /&gt;ASA5510-CEPC#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, find attach a file with a scheme of the solution. Thanks a lot for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 11:05:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1620997#M594258</guid>
      <dc:creator>fmartos</dc:creator>
      <dc:date>2011-01-14T11:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1620998#M594259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The diagram was not uploaded - CiscoExpert.jpg (75.9 K) &lt;STRONG&gt;QUEUED&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per the configuration, you have the following configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which is a dynamic NAT exemption.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be able to initiate the connection from the outside towards the inside, please kindly change the above nat statement to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip any any&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;no nat (Inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"clear xlate" after the above changes, and try to initiate the RDP connection again from the VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 11:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1620998#M594259</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-14T11:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1620999#M594260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank very much, Jennifer. A personal problem requires my attention out of the office. I will do on Monday, I hope, and I will inform you about the result.This is the graphic. Talk to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/9/1/10192-CiscoExpert.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 11:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1620999#M594260</guid>
      <dc:creator>fmartos</dc:creator>
      <dc:date>2011-01-14T11:55:34Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1621000#M594261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How did you configure NAT on the router? Have you configured a policy-NAT in the router that allows the internal hosts to go un-natted to the VPN clients? Can you share your NAT configurations on the router here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Jan 2011 22:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1621000#M594261</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2011-01-14T22:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1621001#M594262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Nagaraja; as you requested, this is the NAT configuration. I have included the Easy VPN configuration. As you can see I have deleted the rest of configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left;"&gt;cisco2821#sh run&lt;BR /&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deleted&lt;BR /&gt;!&lt;BR /&gt;version 12.4&lt;BR /&gt;parser config cache interface&lt;BR /&gt;parser config interface&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime msec&lt;BR /&gt;service timestamps log datetime msec&lt;BR /&gt;service password-encryption&lt;BR /&gt;service sequence-numbers&lt;BR /&gt;!&lt;BR /&gt;hostname cisco2821&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 512000 warnings&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login Remotos local&lt;BR /&gt;aaa authorization exec default local &lt;BR /&gt;aaa authorization network Remotos local &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;username soft_vpn_client password 7 1235040541085C0E7A39772F3F3479030607&lt;BR /&gt;! &lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 1&lt;BR /&gt; encr 3des&lt;BR /&gt; authentication pre-share&lt;BR /&gt; group 2&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp client configuration group Serikat&lt;BR /&gt; key xxxxxxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt; pool Serikat&lt;BR /&gt; acl 121&lt;BR /&gt; save-password&lt;BR /&gt; max-users 1&lt;BR /&gt; max-logins 1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set REMOTOS esp-3des esp-sha-hmac &lt;BR /&gt;!&lt;BR /&gt;crypto dynamic-map ACCESOS_REMOTOS 1&lt;BR /&gt; set transform-set REMOTOS &lt;BR /&gt; reverse-route&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto map REMOTOS client authentication list Remotos&lt;BR /&gt;crypto map REMOTOS isakmp authorization list Remotos&lt;BR /&gt;crypto map REMOTOS client configuration address respond&lt;BR /&gt;crypto map REMOTOS 1 ipsec-isakmp dynamic ACCESOS_REMOTOS &lt;BR /&gt;!&lt;BR /&gt;archive&lt;BR /&gt; log config&lt;BR /&gt;&amp;nbsp; hidekeys&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; description Conexion con Firewall-Outside&lt;BR /&gt; ip address 192.168.101.1 255.255.255.252&lt;BR /&gt; ip nat inside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; description $ES_LAN$&lt;BR /&gt; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface ATM0/0/0&lt;BR /&gt; description CONEXION CON INTERNET&lt;BR /&gt; ip address x.x.x.x 255.255.255.192&lt;BR /&gt; ip nbar protocol-discovery&lt;BR /&gt; ip nat outside&lt;BR /&gt; ip virtual-reassembly&lt;BR /&gt; no atm ilmi-keepalive&lt;BR /&gt; dsl operating-mode auto &lt;BR /&gt; crypto map REMOTOS&lt;BR /&gt; pvc telefonica 8/32 &lt;BR /&gt;&amp;nbsp; protocol ip x.x.x.x&lt;BR /&gt;&amp;nbsp; encapsulation aal5snap&lt;BR /&gt; !&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/0&lt;BR /&gt;&amp;nbsp; no ip address&lt;BR /&gt; shutdown&lt;BR /&gt; negotiation auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1/0.1&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;ip local pool Serikat 10.14.81.233&lt;BR /&gt;deleted&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;ip nat inside source route-map NAT interface ATM0/0/0 overload&lt;BR /&gt;!&lt;BR /&gt;deleted&lt;BR /&gt;deleted&lt;BR /&gt;access-list 103 deny&amp;nbsp;&amp;nbsp; ip 10.14.81.0 0.0.0.255 host 10.14.81.233&lt;BR /&gt;deleted&lt;BR /&gt;access-list 103 permit ip 10.14.81.0 0.0.0.255 any&lt;BR /&gt;deleted&lt;BR /&gt;access-list 121 permit ip host 10.14.81.172 host 10.14.81.233&lt;BR /&gt;delted&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;route-map NAT permit 1&lt;BR /&gt; match ip address 103&lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;deleted&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco2821#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2011 12:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1621001#M594262</guid>
      <dc:creator>fmartos</dc:creator>
      <dc:date>2011-01-17T12:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1621002#M594263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jennifer, Nagaraja, thanks a lot for your help. After write the commands proposes by Jennifer, the connections from vpn client to internal IP works. I am really very happy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, thanks a lot&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You are invited to have coffe if you come to Spain sometime: my email is &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:fmartos@cepc.es"&gt;fmartos@cepc.es&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2011 15:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1621002#M594263</guid>
      <dc:creator>fmartos</dc:creator>
      <dc:date>2011-01-17T15:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Access problem</title>
      <link>https://community.cisco.com/t5/network-security/access-problem/m-p/1621003#M594264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear it's working, Francisco. Thanks for the invite..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jan 2011 22:52:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-problem/m-p/1621003#M594264</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-17T22:52:38Z</dc:date>
    </item>
  </channel>
</rss>

