<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problems allowing VPN connections in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467639#M614615</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your prompt response, but didn't make the trick &lt;IMG border="0" src="http://i.dslr.net/v2/lite/sad.gif" width="15" /&gt;&lt;BR /&gt;I removed the static NAT and enabled the PPTP inspection but no joy...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From the clients, I get a 800 error. I am investigating it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Aug 2010 12:57:05 GMT</pubDate>
    <dc:creator>robertovd</dc:creator>
    <dc:date>2010-08-12T12:57:05Z</dc:date>
    <item>
      <title>Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467637#M614613</link>
      <description>&lt;P&gt;Good morning!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry but I am not very networking related, and after checking more posts, and made changes after recommendations, cannot get it to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure my ASA 5505 to be able to accept incoming request to the port 1723 and being forwarded to our Windows VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The scenario is the following:&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.202 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 83.244.*.* 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN machine has 192.168.1.211.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created the security policies:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip 192.168.1.0 255.255.255.0 192.168.0.0 255.255.0.0&lt;BR /&gt;access-list outside_access_in extended permit icmp host 94.185.144.62 any&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 83.244.*.* object-group DM_INLINE_TCPUDP_1&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 83.244.*.* eq 1111&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 83.244.*.* eq 3389&lt;BR /&gt;access-list outside_access_in extended permit udp any any&lt;BR /&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any 83.244.*.* 255.255.255.224 eq pptp&lt;BR /&gt;access-list outside_access_in extended permit gre any 83.244.*.* 255.255.255.224 &lt;/STRONG&gt;&lt;BR /&gt;access-list outside_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 172.17.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to this, I permit traffic to the port 1723 and the GRE service for the PPTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, I created the NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list 101&lt;BR /&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;static (outside,inside) tcp 192.168.1.203 3389 83.244.*.* 3389 netmask 255.255.255.255&lt;BR /&gt;&lt;STRONG&gt;static (inside,outside) tcp interface pptp 192.168.1.211 pptp netmask 255.255.255.255&lt;BR /&gt;static (outside,inside) tcp 192.168.1.211 pptp 83.244.*.* pptp netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside &lt;/STRONG&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 83.244.*.* 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I created 2 different static NAT because I don't really know which one is the valid one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use also the ASA as a DHCP server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;dhcpd option 4 ip 130.88.200.4&lt;BR /&gt;dhcpd option 156 ascii ftpservers=192.168.1.203&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.1-192.168.1.199 inside&lt;BR /&gt;dhcpd dns 192.168.1.212 192.168.1.219 interface inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN is working correctly from the inside network, but cannot access from outside...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I spent many days reading Cisco articles and change the configuration many times, but no joy...&lt;BR /&gt;Can anybody help me with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a nice day!&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;rob&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467637#M614613</guid>
      <dc:creator>robertovd</dc:creator>
      <dc:date>2019-03-11T18:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467638#M614614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to remove the following line:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (outside,inside) tcp 192.168.1.211 pptp 83.244.*.* pptp netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also add "inspect pptp" under your global policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 11:49:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467638#M614614</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-08-12T11:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467639#M614615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your prompt response, but didn't make the trick &lt;IMG border="0" src="http://i.dslr.net/v2/lite/sad.gif" width="15" /&gt;&lt;BR /&gt;I removed the static NAT and enabled the PPTP inspection but no joy...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;From the clients, I get a 800 error. I am investigating it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 12:57:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467639#M614615</guid>
      <dc:creator>robertovd</dc:creator>
      <dc:date>2010-08-12T12:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467640#M614616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you also "clear xlate" after removing the static NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also where is it failing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does TCP/1723 connect? and GRE is failing? or none are working?&lt;/P&gt;&lt;P&gt;Have you tried to telnet on port 1723 from the outside towards the public ip address of the ASA firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your static NAT uses the ASA outside interface ip address, can you try to use a spare public ip address that you have instead?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need to configure the following:&lt;/P&gt;&lt;P&gt;static (inside,outside) 83.244.x.x 192.168.1.211 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate" and test it again. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 13:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467640#M614616</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-08-12T13:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467641#M614617</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;I cannot put a different public IP address because the firewall is connected to the firewall of the building. In the building firewall is already opened the port 1723 and allowing GRE protocol and forwarded to the outside interface ip address of the Cisco (83.244.*.*)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to telnet the ip address on the port 1723 but seems that cannot connect, however, doing a port scanning on that ip address shows the port open.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, after deleting the static nat, I executed the clear xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 13:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467641#M614617</guid>
      <dc:creator>robertovd</dc:creator>
      <dc:date>2010-08-12T13:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467642#M614618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying the pptp-ping tool and seems that I am having some problems with the GRE/PPTP packets...&lt;/P&gt;&lt;P&gt;Will try to first solve this issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 15:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467642#M614618</guid>
      <dc:creator>robertovd</dc:creator>
      <dc:date>2010-08-12T15:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Problems allowing VPN connections</title>
      <link>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467643#M614619</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot halijenn. I had a problem with the PPTP and GRE traffic. Now it is working fine.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Robert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Aug 2010 07:16:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-allowing-vpn-connections/m-p/1467643#M614619</guid>
      <dc:creator>robertovd</dc:creator>
      <dc:date>2010-08-13T07:16:32Z</dc:date>
    </item>
  </channel>
</rss>

