<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Blocking VPN access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373777#M713623</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for immediate reponse....Where/how to check for errors? r u asking errors are getting on clinet/ASA side..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Jun 2010 15:25:35 GMT</pubDate>
    <dc:creator>sateeshk10</dc:creator>
    <dc:date>2010-06-17T15:25:35Z</dc:date>
    <item>
      <title>ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373766#M713537</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've set up a client to site vpn using Windows XP client which works fine when connecting wirelessly via a Vodafone dongle. I have just installed a new ASA 5510 in a brand new branch office network. When connecting through the ASA from the new network, it tries to verify and then I get a 619 error and cannot connect. I have added a rule to the ouside interface coming in. What do I need to do to let it authenticate?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Egg&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373766#M713537</guid>
      <dc:creator>Eggzter100</dc:creator>
      <dc:date>2019-03-11T17:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373767#M713538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What VPN client are you using? Is this IPSec VPN Client or SSL VPN Client? or other type of client (PPTP client)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also just want to double check that the VPN connection is passing through the ASA, not terminating on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it's passing through the ASA, and assuming you have configured static NAT, please advise what access-list you have configured to allow access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 11:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373767#M713538</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-16T11:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373768#M713541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm just using the Windows XP PPTP client passing through the ASA conecting to a Watchguard FireBox. I have configured NAT as type Dynamic, source any, interface outside, address outside. I have set up an access-list (outside incoming) allowing the remote network to the internal network for IP and the default inside any IP to any less secure networks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 15:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373768#M713541</guid>
      <dc:creator>Eggzter100</dc:creator>
      <dc:date>2010-04-16T15:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373769#M713544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you check if inspect pptp is enabled under the global policy map, although I think that maybe if you were connecting to a pptp server on the outside from the inside, and since you have an outside acl then it should work. Try setting the logging level to debug and check the logs to see if anything weird is happening. In any case give the following link a check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 15:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373769#M713544</guid>
      <dc:creator>Kelvin Willacey</dc:creator>
      <dc:date>2010-04-16T15:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373770#M713547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, what do you mean by you configure dynamic NAT on the outside? That will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that the connection is inbound from outside to inside (low to high security level), you would need to configure static translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;For example&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;If your PPTP server ip is 10.1.1.1, and translated to 200.1.1.1, you should configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 200.1.1.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 200.1.1.1 eq 1723&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add "inspect pptp" in your global policy map as KWillacey advised earlier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 22:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373770#M713547</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-16T22:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373771#M713549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, to clarify, I'm using ASA ver 8.2(1). I have set up my nat as follows:&lt;/P&gt;&lt;P&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 101 interface&lt;/P&gt;&lt;P&gt;Do I need to set up a static nat as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 08:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373771#M713549</guid>
      <dc:creator>Eggzter100</dc:creator>
      <dc:date>2010-04-19T08:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373772#M713563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you definitely need a static NAT for the PPTP server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 08:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373772#M713563</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-19T08:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373773#M713583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a bit slow but all is working now after adding inspect pptp to the global_policy. According to the link posted earlier, you do not need to define a static mapping because the ASA 8.0 now inspects PPTP traffic. You can use PAT or define a static mapping. Thanks for all your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;&lt;A name="new"&gt;Commands to Add for Versions 7.x and 8.0 using inspection&lt;/A&gt;&lt;/H3&gt;&lt;P&gt;Complete these steps to add commands for versions 7.x and 8.0 using the &lt;STRONG&gt;inspect&lt;/STRONG&gt; command:&lt;/P&gt;&lt;OL start="1" type="1"&gt;&lt;LI&gt;&lt;P&gt;Add PPTP inspection to the default policy-map using the default class-map.&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config)#&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config-pmap)#&lt;STRONG&gt;class inspection_default&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config-pmap-c)#&lt;STRONG&gt;inspect pptp&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;You do not need to define a static mapping because the PIX now inspects PPTP traffic. You can use PAT.&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config)#&lt;STRONG&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/STRONG&gt;

pixfirewall(config)#&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;OR&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H3&gt;&lt;A name="acl"&gt;Commands to Add for Versions 7.x and 8.0 using ACL&lt;/A&gt;&lt;/H3&gt;&lt;P&gt;Complete these steps to add commands for versions 7.x and 8.0 using ACL.&lt;/P&gt;&lt;OL start="1" type="1"&gt;&lt;LI&gt;&lt;P&gt;Define the static mapping for the inside PC. The address seen on the outside is 192.168.201.5.&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config)#&lt;STRONG&gt;static (inside,outside) 192.168.201.5&amp;nbsp; 10.48.66.106
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; netmask 255.255.255.255 0 0&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Configure and apply the ACL to permit the GRE return traffic from the PPTP server to the PPTP client.&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config)#&lt;STRONG&gt;access-list acl-out permit gre host 192.168.201.25 
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.201.5 &lt;/STRONG&gt;
pixfirewall(config)#&lt;STRONG&gt;access-list acl-out permit tcp host 192.168.201.25 
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.201.5 eq 1723&lt;/STRONG&gt;
&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Apply the ACL.&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;&lt;PRE&gt;pixfirewall(config)#&lt;STRONG&gt;access-group acl-out in interface outside&lt;/STRONG&gt;&lt;/PRE&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 09:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373773#M713583</guid>
      <dc:creator>Eggzter100</dc:creator>
      <dc:date>2010-04-19T09:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373774#M713595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct for outbound PPTP connection. For inbound PPTP connection, you would still need to configure static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Apr 2010 10:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373774#M713595</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-19T10:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373775#M713606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound PPTP is not working with below mentioned config..Do I need to add anything apart from this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;pixfirewall(config)#policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;pixfirewall(config-pmap)#class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Calibri; color: #000000; font-size: 12pt;"&gt;pixfirewall(config-pmap-c)#inspect pptp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 15:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373775#M713606</guid>
      <dc:creator>sateeshk10</dc:creator>
      <dc:date>2010-06-17T15:01:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373776#M713618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check the notes for PPTP inspection:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1432892"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/inspect_basic.html#wp1432892&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you getting any errors?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 15:09:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373776#M713618</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-17T15:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373777#M713623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for immediate reponse....Where/how to check for errors? r u asking errors are getting on clinet/ASA side..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;kumar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 15:25:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373777#M713623</guid>
      <dc:creator>sateeshk10</dc:creator>
      <dc:date>2010-06-17T15:25:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Blocking VPN access</title>
      <link>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373778#M713629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes,&lt;/P&gt;&lt;P&gt;You're saying that outbound PPTP is not working through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you getting any messages either on the client or server side?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the PPTP server ''inside'' or ''outside'' the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 15:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-blocking-vpn-access/m-p/1373778#M713629</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-17T15:40:00Z</dc:date>
    </item>
  </channel>
</rss>

