<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Putting a PPTP server behing an ASA firewall ... in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412676#M730124</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;sanjaynadarajah wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a scenario whereby the PPTP server is internet facing. Refer to the current setup.&lt;/P&gt;&lt;P&gt;The aim is to do the new setup which is to put the PPTP server behind the Cisco ASA firewall.&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;BR /&gt;Question :-&lt;BR /&gt;1) Pls advice if I am missing anything else for this setup ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;2) What are the relevant show commands should I be using to check if this is working ?&amp;nbsp; I am pretty new&lt;BR /&gt;&amp;nbsp;&amp;nbsp; to this kind of setup.&lt;BR /&gt;3) Do I need to allow forwading GRE protocol type 47 ?&lt;BR /&gt;3) Any good URL's that have this information ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't read visio's but there is a specific document for allowing PPTP through an ASA/Pix firewall so you may want to check your config against that -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;PPTP through firewall&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Feb 2010 13:21:55 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2010-02-18T13:21:55Z</dc:date>
    <item>
      <title>Putting a PPTP server behing an ASA firewall ...</title>
      <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412675#M730123</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a scenario whereby the PPTP server is internet facing. Refer to the current setup.&lt;/P&gt;&lt;P&gt;The aim is to do the new setup which is to put the PPTP server behind the Cisco ASA firewall.&lt;/P&gt;&lt;P&gt;The way I plan to do this is as follows :-&lt;BR /&gt;1. Create a static NAT for the PPTP server on the ASA firewall.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2. Add this piece of command :-&lt;/P&gt;&lt;P&gt;For versions 7.x and 8.0 using the inspect command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add PPTP inspection to the default policy-map using the default class-map.&lt;/P&gt;&lt;P&gt;pixfirewall(config)#policy-map global_policy&lt;BR /&gt;pixfirewall(config-pmap)#class inspection_default&lt;BR /&gt;pixfirewall(config-pmap-c)#inspect pptp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Inspects PPTP traffic via PAT.&lt;/P&gt;&lt;P&gt;pixfirewall(config)#nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;pixfirewall(config)#global (outside) 1 interface&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;4. Allow outside access to get to the host, &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 125.125.125.126 eq 1723&lt;BR /&gt;!&lt;BR /&gt;5. Arp entry to the ASA box &lt;BR /&gt;!&lt;BR /&gt;arp outside 125.125.125.126 001d.abcd.7cf8 alias&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;6. Static NAT from the outisde IP to the inside IP.&lt;BR /&gt;static (inside,outside) tcp 125.125.125.126 1723 172.16.1.2 1723 netmask 255.255.255.255 &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;write mem&lt;BR /&gt;!&lt;BR /&gt; &lt;BR /&gt;Question :-&lt;BR /&gt;1) Pls advice if I am missing anything else for this setup ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;2) What are the relevant show commands should I be using to check if this is working ?&amp;nbsp; I am pretty new&lt;BR /&gt;&amp;nbsp;&amp;nbsp; to this kind of setup.&lt;BR /&gt;3) Do I need to allow forwading GRE protocol type 47 ?&lt;BR /&gt;3) Any good URL's that have this information ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412675#M730123</guid>
      <dc:creator>sanjaynadarajah</dc:creator>
      <dc:date>2019-03-11T17:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Putting a PPTP server behing an ASA firewall ...</title>
      <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412676#M730124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;sanjaynadarajah wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a scenario whereby the PPTP server is internet facing. Refer to the current setup.&lt;/P&gt;&lt;P&gt;The aim is to do the new setup which is to put the PPTP server behind the Cisco ASA firewall.&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;BR /&gt;Question :-&lt;BR /&gt;1) Pls advice if I am missing anything else for this setup ?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;2) What are the relevant show commands should I be using to check if this is working ?&amp;nbsp; I am pretty new&lt;BR /&gt;&amp;nbsp;&amp;nbsp; to this kind of setup.&lt;BR /&gt;3) Do I need to allow forwading GRE protocol type 47 ?&lt;BR /&gt;3) Any good URL's that have this information ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can't read visio's but there is a specific document for allowing PPTP through an ASA/Pix firewall so you may want to check your config against that -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="active_link" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;PPTP through firewall&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Feb 2010 13:21:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412676#M730124</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-02-18T13:21:55Z</dc:date>
    </item>
    <item>
      <title>Re: Putting a PPTP server behing an ASA firewall ...</title>
      <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412677#M730125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In other words you will need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect ppt&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And opening up gre on your interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Feb 2010 21:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412677#M730125</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-18T21:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: Putting a PPTP server behing an ASA firewall ...</title>
      <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412678#M730128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;GRE will be allowed automatically with inspect pptp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. read this command reference link for inspect pptp:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1741718"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/i2.html#wp1741718&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;When enabled, PPTP application inspection inspects PPTP protocol packets and dynamically creates the GRE connections and xlates necessary to permit PPTP traffic. Only Version 1, as defined in RFC 2637, is supported. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The link that Joh provide has examples to allow PPTP. Pls. follow that. I am enclosing the same link again.&lt;/P&gt;&lt;P&gt;1. for client on the inside&lt;/P&gt;&lt;P&gt;2. for server on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Feb 2010 00:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412678#M730128</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-19T00:02:16Z</dc:date>
    </item>
    <item>
      <title>Re: Putting a PPTP server behing an ASA firewall ...</title>
      <link>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412679#M730134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well from this&amp;nbsp; URL : &lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094a5a.shtml&lt;/A&gt;, it seems that the inspect command is only used if the PPTP client is behind the ASA box. In my setup, the PPTP client is at a different location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it looks to me what is needed here is the ACL and the static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Feb 2010 08:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/putting-a-pptp-server-behing-an-asa-firewall/m-p/1412679#M730134</guid>
      <dc:creator>sanjaynadarajah</dc:creator>
      <dc:date>2010-02-21T08:28:30Z</dc:date>
    </item>
  </channel>
</rss>

