<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec VPN Client -&amp;gt; ASA -&amp;gt; Win2K3 DHCP Server connectivity i in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-client-gt-asa-gt-win2k3-dhcp-server-connectivity/m-p/1275193#M785253</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone got any insight on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Nov 2009 16:56:34 GMT</pubDate>
    <dc:creator>JimFranklin1338</dc:creator>
    <dc:date>2009-11-27T16:56:34Z</dc:date>
    <item>
      <title>IPSec VPN Client -&gt; ASA -&gt; Win2K3 DHCP Server connectivity issues</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-client-gt-asa-gt-win2k3-dhcp-server-connectivity/m-p/1275192#M785252</link>
      <description>&lt;P&gt;I've currently got a remote access VPN configured on my ASA that is set give clients an IP address from the internal DHCP server on the inside interface of the ASA. The clients authenticate and get an IP but are unable to connect to any devices on the internal network, even with ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm running ASA5505 on v8.2(1). There are no other (layer 3) devices between the ASA and the DHCP server. The DHCP server is on the corporate LAN. There is a working VPN config (called RA-VPN) that works with using an IP Address Pool on the ASA. The RA-VPN-temp config is to use the DHCP server. The config is sanitised, but here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;ASA Version 8.2(1)&lt;BR /&gt;!&lt;BR /&gt;hostname FW&lt;BR /&gt;domain-name site.company.local&lt;BR /&gt;enable password * encrypted&lt;BR /&gt;passwd * encrypted&lt;BR /&gt;names&lt;BR /&gt;name 1.2.3.4 host_External&lt;BR /&gt;name 10.10.10.0 net_LAN&lt;BR /&gt;name 10.10.10.7 srv_DHCP&lt;BR /&gt;name 172.16.10.0 net_COMPANY-VPN-Clients&lt;BR /&gt;name 10.10.0.0 net_WAN&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.10.10.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address host_External 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa821-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name site.company.local&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list RA-VPN_splitTunnelACL standard permit net_WAN 255.255.0.0&lt;BR /&gt;access-list ACL_NoNAT extended permit ip any net_COMPANY-VPN-Clients 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip net_LAN 255.255.255.0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 51200&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging console debugging&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool VPNUSERS 172.16.10.1-172.16.10.254 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface inside&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ip verify reverse-path interface management&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list ACL_NoNAT&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 84.12.4.241 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 15&lt;BR /&gt;http 0.0.0.0 0.0.0.0 management&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 15&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;console timeout 15&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection scanning-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec webvpn&lt;BR /&gt;group-policy GrpPolVPN internal&lt;BR /&gt;group-policy GrpPolVPN attributes&lt;BR /&gt; dns-server value 10.10.10.7 10.10.10.25&lt;BR /&gt; vpn-idle-timeout 1800&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value RA-VPN_splitTunnelACL&lt;BR /&gt; default-domain value site.company.local&lt;BR /&gt; split-dns value site.company.local&lt;BR /&gt;username Admin password * encrypted privilege 15&lt;BR /&gt;tunnel-group RA-VPN type remote-access&lt;BR /&gt;tunnel-group RA-VPN general-attributes&lt;BR /&gt; address-pool VPNUSERS&lt;BR /&gt; default-group-policy GrpPolVPN&lt;BR /&gt;tunnel-group RA-VPN ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp ikev1-user-authentication none&lt;BR /&gt;tunnel-group RA-VPN-temp type remote-access&lt;BR /&gt;tunnel-group RA-VPN-temp general-attributes&lt;BR /&gt; default-group-policy GrpPolVPN&lt;BR /&gt; dhcp-server srv_DHCP&lt;BR /&gt;tunnel-group RA-VPN-temp ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp ikev1-user-authentication none&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:84e2bc6c9b48765bf01c883379f6445b&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:43:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-client-gt-asa-gt-win2k3-dhcp-server-connectivity/m-p/1275192#M785252</guid>
      <dc:creator>JimFranklin1338</dc:creator>
      <dc:date>2019-03-11T16:43:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Client -&gt; ASA -&gt; Win2K3 DHCP Server connectivity i</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-client-gt-asa-gt-win2k3-dhcp-server-connectivity/m-p/1275193#M785253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone got any insight on this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Nov 2009 16:56:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-client-gt-asa-gt-win2k3-dhcp-server-connectivity/m-p/1275193#M785253</guid>
      <dc:creator>JimFranklin1338</dc:creator>
      <dc:date>2009-11-27T16:56:34Z</dc:date>
    </item>
  </channel>
</rss>

