<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5505 site to Client - site to site - CLI Mode configurati in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203452#M859751</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the VPN site to site configuration.&lt;/P&gt;&lt;P&gt;I have created the VPN site to client configuration as you told and it's not working.Please find the below configuration and let me know if anything has to be add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5505-FW&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.26.8.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.97.37.221 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq 3389&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq 445&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.221 eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq ftp&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.200.0 255.255.255.192&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console alerts&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging buffered errors&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging history emergencies&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging mail alerts&lt;/P&gt;&lt;P&gt;logging device-id ipaddress inside&lt;/P&gt;&lt;P&gt;logging host inside 172.26.8.3&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.200.1-192.168.200.62 mask 255.255.255.192&lt;/P&gt;&lt;P&gt;ip audit attack action&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.97.37.229 172.26.8.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.97.37.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.26.8.3 community Airtel&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community Airtel&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;telnet 10.97.37.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN internal&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.88.40.11 10.96.40.12&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; default-domain value netsol.com&lt;/P&gt;&lt;P&gt;tunnel-group IPsecVPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group IPsecVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy IPSecVPN&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 May 2009 06:21:12 GMT</pubDate>
    <dc:creator>ntmanjunath</dc:creator>
    <dc:date>2009-05-18T06:21:12Z</dc:date>
    <item>
      <title>ASA5505 site to Client - site to site - CLI Mode configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203450#M859747</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any one can help for creating site to client and site to site VPN in CLI mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:32:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203450#M859747</guid>
      <dc:creator>ntmanjunath</dc:creator>
      <dc:date>2019-03-11T15:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 site to Client - site to site - CLI Mode configurati</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203451#M859749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the site-to-site VPN I'll post the Cisco configuration documentation so you can understand what's going on and how it works and view the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site-to-Site VPN between ASA 5505s: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080950890.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080950890.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Access VPN with ASA 5505:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Create a VPN pool for the vpn.  This network should not be routed throughout your network already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.200.1-192.168.200.62 mask 255.255.255.192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Create an access-list for split tunnel access. It should include the networks you want to be able to reach across the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split standard permit 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Add entry to your NONAT access list and make sure your nat exemption is configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.200.0 255.255.255.192&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Create a group-policy for the VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN internal&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.10.10 192.168.10.11&lt;/P&gt;&lt;P&gt; dns-server value 192.168.10.10 192.168.10.11&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split&lt;/P&gt;&lt;P&gt; default-domain value yourdomain.local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. Create the tunnel group and assign a pre-shared key for group authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy IPSecVPN&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key Pre$haredk3y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6.  Create a PCF configuration profile with the IPSec VPN client.  Group name would be IPSecVPN, password would be Pre$haredk3y and the remote peer IP is obviously the outside address of your firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 May 2009 12:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203451#M859749</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2009-05-15T12:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 site to Client - site to site - CLI Mode configurati</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203452#M859751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the VPN site to site configuration.&lt;/P&gt;&lt;P&gt;I have created the VPN site to client configuration as you told and it's not working.Please find the below configuration and let me know if anything has to be add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA5505-FW&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.26.8.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.97.37.221 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone IST 5 30&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq 3389&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq 445&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.221 eq telnet&lt;/P&gt;&lt;P&gt;access-list 100 extended permit tcp any host 10.97.37.229 eq ftp&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 192.168.200.0 255.255.255.192&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console alerts&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging buffered errors&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging history emergencies&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging mail alerts&lt;/P&gt;&lt;P&gt;logging device-id ipaddress inside&lt;/P&gt;&lt;P&gt;logging host inside 172.26.8.3&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.200.1-192.168.200.62 mask 255.255.255.192&lt;/P&gt;&lt;P&gt;ip audit attack action&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.97.37.229 172.26.8.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.97.37.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.26.8.3 community Airtel&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community Airtel&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;telnet 10.97.37.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN internal&lt;/P&gt;&lt;P&gt;group-policy IPSecVPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.88.40.11 10.96.40.12&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; default-domain value netsol.com&lt;/P&gt;&lt;P&gt;tunnel-group IPsecVPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group IPsecVPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool vpnpool&lt;/P&gt;&lt;P&gt; default-group-policy IPSecVPN&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group IPSecVPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 May 2009 06:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203452#M859751</guid>
      <dc:creator>ntmanjunath</dc:creator>
      <dc:date>2009-05-18T06:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 site to Client - site to site - CLI Mode configurati</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203453#M859752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What happens when you attempt to launch the connection from the VPN client? Does it connect, or does it give you an error?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it connects, I'm guessing it is probably a routing issue.  Since you used my network I used in the example, 192.168.200.0/26 instead of something that may be routed already, you will probably need to install a route in your internal network pointing that network to the ASA firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 May 2009 13:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-site-to-client-site-to-site-cli-mode-configuration/m-p/1203453#M859752</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2009-05-18T13:16:14Z</dc:date>
    </item>
  </channel>
</rss>

