<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SR520 PPTP Pass Through Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568532#M598686</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASAs i have seen this work with inspection for pptp but on routers i have seen this not work more often than it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in any case, for the GRE traffic do you see drops in the logs? Try adding the below config lines and see if it helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 111 permit gre any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect PPTP_GRE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;match access-group 111&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect sdm-inspect-voip-in&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class type inspect PPTP_GRE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After adding this config as well, please check the logs to see if you see any drops. Let me know how it goes!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Nov 2010 15:23:42 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-11-12T15:23:42Z</dc:date>
    <item>
      <title>SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568527#M598671</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I just installed a new SR520-FE-K9 at a customer's business.&amp;nbsp; I can't see anyway in CCA 2.1 to configure a pass through PPTP VPN to their Windows 2003 server, which acts as the VPN server.&amp;nbsp; You can easily configure port forwarding for port 1723 to the server, but there is no provision to forward protocol 47 (GRE) to the server.&amp;nbsp;&amp;nbsp; I looked at the CLI script and the CCA configuration created a whole lot of script with which I am not familiar.&amp;nbsp; I tried adding what I thought would do the trick but it it is lacking something in the firewall access list configuration, so I removed the entry.&amp;nbsp; Can anyone lend a hand on this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Also, there doesn't seem to be any way to enable remote access to the firewall through CCA.&amp;nbsp; At least I can't find it.&amp;nbsp; And when I created a IPsec VPN server on the firewall to be used with the Cisco client, the connection is made easily enough.&amp;nbsp; However the CCA did not create the necessary firewall access list to permit traffic into the remote network.&amp;nbsp; I am hesitant to start adding my own access lists for fear I will screw up the CCA configuration .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;I'm not a Cisco router/firewall guru, but I've configured my share of routers and ASA 5500's in my time.&amp;nbsp; I even held a CCNA for a while until it expired.&amp;nbsp; It would seem that the SR520 is unnecessarily complicated to configure and the CCA configuration interface is incomplete.&amp;nbsp; I looked around for sample configurations to learn more about what was in the script, but could find nothing (if anyone knows where to find samples, please, let me know).&amp;nbsp; The point is I could have had a WatchGuard Firebox up in 30 minutes, while the basic SR520 configuration took much longer-hours when the research and test configurations are counted.&amp;nbsp; It shouldn't be that hard.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Any help will be much appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;amp;quot;Arial&amp;amp;quot;, &amp;amp;quot;sans-serif&amp;amp;quot;; color: #333333; font-size: 10pt;"&gt;Tony&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:07:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568527#M598671</guid>
      <dc:creator>txlombardi_2</dc:creator>
      <dc:date>2019-03-11T19:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568528#M598674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PPTP connections will not work thorugh the zone-based firewall with a PAT. The reason i am saying it will not work is because we can port forward GRE traffic as you mentioned. Only option we have is to have a 1:1 NAT for the PPTP server and not port-forward TCP/1723. Hope that clears things about PPTP. if you have a free public IP address, try performing a 1:1 NAT to that and see if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Coming to the VPN config, it looks alright to me. Enable the debugs "debug cry isa" and "debug cry ips" and then try connecting from a VPN client and forward those debugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, i see you have "ip inspect log drop-pkt" enabled. When trying to connect to the VPN, do you see any syslogs for dropped packets by the zone based firewall there?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 15:30:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568528#M598674</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-11T15:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568529#M598677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;Thank you for your reply, Prapanch, and insight into the problem.&amp;nbsp; However, this can't be right - the SR520 is not capable of forwarding the GRE protocol into an internal server?&amp;nbsp; The simplest and cheapest routers can do that function.&amp;nbsp; A Netopia the SR520 replaced did it easily.&amp;nbsp; If that is truly the case, it is a serious shortcoming of this device and I will have to return it to the distributor and go buy a competing product to install at the customer site, which is something I don't want to do.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt;"&gt;Anyone else have some ideas about this.&amp;nbsp; Please, note that this is not an attempt to "port forward" GRE.&amp;nbsp; GRE is a protocol.&amp;nbsp; The SR520 just needs to forward all traffic for GRE into a single internal IP address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Nov 2010 21:09:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568529#M598677</guid>
      <dc:creator>txlombardi_2</dc:creator>
      <dc:date>2010-11-11T21:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568530#M598680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router will be able to forward GRE packets to the inside host. The problem comes with PPTP which works with TCP 1723 and GRE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your configuration, the PPTP server is behind the firewall and hence you have configured the below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip nat inside source static tcp 192.168.133.15 1723 interface FastEthernet4 1723&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now with this configuration, if the router receives a GRE packet on the outside interface, it will not know how to NAT that packet. This because of the fact that GRE has no port numbers like TCP. This is not a shortcoming of this router but is an issue in general.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 04:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568530#M598680</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-12T04:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568531#M598684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your followup reply.&amp;nbsp; I understand the technical aspects of getting GRE passed through the firewall.&amp;nbsp; GRE actually hits the interface but is blocked there.&amp;nbsp; You can see it happening when you do a "show ip nat translations pptp."&amp;nbsp; Below is the actual nat translation from the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pro Inside global&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside global&lt;BR /&gt;gre 96.254.126.75:20611&amp;nbsp;&amp;nbsp; 192.168.133.15:20611&amp;nbsp; 72.91.252.39:20611&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.91.252.39:20611&lt;BR /&gt;gre 96.254.126.75:65506&amp;nbsp;&amp;nbsp; 192.168.133.15:65506&amp;nbsp; 72.91.252.39:65506&amp;nbsp;&amp;nbsp;&amp;nbsp; 72.91.252.39:65506&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, an access list is needed.&amp;nbsp; That is the problem I am having because of my &lt;SPAN style="line-height: 115%; font-family: &amp;quot;Arial&amp;quot;, &amp;quot;sans-serif&amp;quot;; color: #333333; font-size: 10pt; mso-fareast-font-family: Calibri; mso-fareast-theme-font: minor-latin; mso-ansi-language: EN-US; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;"&gt;unfamiliarity &lt;/SPAN&gt;with the "zone" configuration.&amp;nbsp; As you can see below, it is possible to get GRE through a firewall.&amp;nbsp; The snipit is from an ASA5505, which I configured at another customer's office.&amp;nbsp; This works and they use the PPTP passthrough VPN all the time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface pop3 192.168.2.10 pop3 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface www 192.168.2.10 www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 4125 192.168.2.10 4125 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 444 192.168.2.10 444 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface pptp 192.168.2.10 pptp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 4343 192.168.2.10 4343 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface 8059 192.168.2.10 8059 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Mail smtp 192.168.2.10 smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp RDP 3389 192.168.2.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Mail https 192.168.2.10 https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any interface outside eq pptp &lt;BR /&gt;access-list outside_in extended permit udp any interface outside eq 1723 &lt;BR /&gt;access-list outside_in extended permit gre any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, I appreciate your help.&amp;nbsp; I guess I just don't fully understand the issue.&amp;nbsp; This type of configuration has never been a problem on the lowly Linksys router, Netopias, WatchGuard, and many of the other Cisco firewalls and routers.&amp;nbsp; I've contacted my distributor about returning the device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 13:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568531#M598684</guid>
      <dc:creator>txlombardi_2</dc:creator>
      <dc:date>2010-11-12T13:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568532#M598686</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On ASAs i have seen this work with inspection for pptp but on routers i have seen this not work more often than it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in any case, for the GRE traffic do you see drops in the logs? Try adding the below config lines and see if it helps!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list 111 permit gre any any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class-map type inspect PPTP_GRE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;match access-group 111&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map type inspect sdm-inspect-voip-in&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;class type inspect PPTP_GRE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;inspect&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After adding this config as well, please check the logs to see if you see any drops. Let me know how it goes!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Nov 2010 15:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568532#M598686</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-11-12T15:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: SR520 PPTP Pass Through Configuration</title>
      <link>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568533#M598691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delayed response to your last post.&amp;nbsp; I have not had a chance to go back to the client site to try your suggestion to create a hole for GRE to pass through to an internal server, but I intend to do so next week.&amp;nbsp; In the mean time, I would like to point out a link to the technical specifications on the SR 520.&amp;nbsp; If you read through the specs, you will see that the Cisco literature clearly states that the SR 520 supports PPTP pass-through.&amp;nbsp; It is my belief, once you configure it to pass-through PPTP, GRE should be automatic when using the CCA for configuration.&amp;nbsp; It appears to me there is an issue with the CCA tool or the SR 520 IOS and it would be appropriate at this point to escalate the matter to the next level of support.&amp;nbsp; Can you do that and if not, what is the procedure for me to do it without a Smartnet contract?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please, let me know your thoughts on this as soon as possible.&amp;nbsp; I have a sale for another of these appliances, which I am holding until this is resolved favorably.&amp;nbsp; If it is not, I am going to have to go to WatchGuard, which I don't want to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/partner/prod/collateral/routers/ps9305/data_sheet_c78-484356.html"&gt;http://www.cisco.com/en/US/partner/prod/collateral/routers/ps9305/data_sheet_c78-484356.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Nov 2010 21:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sr520-pptp-pass-through-configuration/m-p/1568533#M598691</guid>
      <dc:creator>txlombardi_2</dc:creator>
      <dc:date>2010-11-23T21:08:02Z</dc:date>
    </item>
  </channel>
</rss>

