cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1738
Views
0
Helpful
1
Replies

can only access polycom in one direction ASA 5510

admiralrich
Level 1
Level 1

Using packet tracer I get an error saying:

Config

nat(inside) 1.0.0.0.0.0.0.0.0

match ip inside andy inside any

dynamic translaion to pool 1 (matching global)

translate_hits=45236,untranslate_hits=0

I cannot access my polycom unit on 172.20.16.8 via 10.20.60.8

below is my results of show run

Result of the command: "show run"

: Saved

:

ASA Version 8.2(2)

!

hostname ciscoasa-stt

domain-name stt.vidol.gov

enable password qXcSIHaSa9B75GQC encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

name 172.20.16.109 VIDOLAS description Application Server

name 205.171.2.65 ExtDNS_1

name 65.112.145.67 ExtDNS_2

name 65.248.160.66 ExtDNS_3

name 152.46.255.210 ONET description Online Onet Center

name 207.97.245.100 ExchangeEmailService description MLSRVR - Exchange Email Service

name 72.4.117.9 PopEmailService description secure.emailsrvr.com

name 192.168.3.0 ResourceRoom

name 192.168.2.0 bcm_network_stx description St. Croix Telephone network

name 172.20.21.0 DHS-Internal description VI Department of Human Services Network

name 66.248.174.122 DHS-Public description Human Services

name 172.20.2.0 DOF description VI Department of Finance

name 10.20.60.0 STX description St. Croix Office

name 172.20.16.8 PolyComSTT

name 10.20.60.8 PolycomSTX description HDX 7000 Video Conference Unit St.Croix

!

interface Vlan1

nameif inside

security-level 100

ip address 172.20.16.11 255.255.255.0

!

interface Vlan2

nameif vipowernet

security-level 0

ip address 66.248.161.238 255.255.255.128

!

interface Vlan12

nameif innovative-t1

security-level 0

ip address 66.248.182.170 255.255.255.248

!

interface Vlan22

nameif bcm_stt

security-level 100

ip address 192.168.4.250 255.255.255.0

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

switchport access vlan 12

!

interface Ethernet0/3

switchport access vlan 22

!

interface Ethernet0/4

!

interface Ethernet0/5

switchport trunk allowed vlan 1-2,12

!

interface Ethernet0/6

!

interface Ethernet0/7

!

!

time-range WorkingHours

periodic weekdays 8:00 to 16:45

!

boot system disk0:/asa822-k8.bin

ftp mode passive

clock timezone AST -4

dns server-group DefaultDNS

domain-name stt.vidol.gov

same-security-traffic permit inter-interface

same-security-traffic permit intra-interface

object-group network ExternalDNS

network-object host ExtDNS_1

network-object host ExtDNS_2

network-object host ExtDNS_3

object-group network VIDOL-Offices

network-object 172.20.16.0 255.255.255.0

network-object STX 255.255.254.0

object-group network DM_INLINE_NETWORK_3

group-object ExternalDNS

group-object VIDOL-Offices

object-group network EmailServices

network-object host ExchangeEmailService

network-object host PopEmailService

object-group protocol DM_INLINE_PROTOCOL_1

protocol-object ip

protocol-object udp

object-group network DM_INLINE_NETWORK_1

network-object STX 255.255.254.0

network-object bcm_network_stx 255.255.255.0

object-group network DM_INLINE_NETWORK_2

network-object 172.20.16.0 255.255.255.0

network-object 192.168.4.0 255.255.255.0

object-group network DM_INLINE_NETWORK_4

network-object 172.20.16.0 255.255.255.0

object-group network DM_INLINE_NETWORK_5

network-object STX 255.255.254.0

network-object bcm_network_stx 255.255.255.0

object-group network DM_INLINE_NETWORK_6

network-object 172.20.16.0 255.255.255.0

network-object 192.168.4.0 255.255.255.0

object-group network DM_INLINE_NETWORK_7

network-object 172.20.16.0 255.255.255.0

network-object 192.168.4.0 255.255.255.0

object-group network DM_INLINE_NETWORK_8

network-object 172.20.16.0 255.255.255.0

network-object 192.168.4.0 255.255.255.0

object-group protocol DM_INLINE_PROTOCOL_2

protocol-object ip

protocol-object udp

object-group protocol DM_INLINE_PROTOCOL_3

protocol-object ip

protocol-object udp

object-group protocol DM_INLINE_PROTOCOL_4

protocol-object udp

protocol-object tcp

object-group protocol DM_INLINE_PROTOCOL_5

protocol-object ip

protocol-object icmp

object-group service h323 udp

description Polycom Ports

port-object eq sip

access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_2 host 172.20.16.95 any

access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_3 any host 172.20.16.95

access-list inside_access_in extended permit ip 172.20.16.0 255.255.255.0 host ONET

access-list inside_access_in extended permit ip 172.20.16.0 255.255.255.0 host PopEmailService

access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 172.20.16.0 255.255.255.0 object-group DM_INLINE_NETWORK_3

access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any

access-list inside_access_in extended permit ip ResourceRoom 255.255.255.0 any

access-list inside_access_in extended permit ip any any inactive

access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_NETWORK_5

access-list inside_nat0_outbound extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0

access-list inside_nat0_outbound extended permit ip any 172.20.16.80 255.255.255.252

access-list inside_nat0_outbound extended permit ip 172.20.16.0 255.255.255.0 DOF 255.255.255.0

access-list inside_access_out extended permit ip 172.20.16.0 255.255.255.0 any

access-list inside_access_out extended permit gre host 172.20.16.12 any inactive

access-list inside_access_out extended permit tcp interface inside eq 3389 any eq 3389

access-list Noblis_splitTunnelAcl standard permit 172.20.16.0 255.255.255.0

access-list NoblisVPN-Access extended permit ip any 172.20.16.0 255.255.255.0

access-list bcm_stt_access_in extended permit ip object-group DM_INLINE_NETWORK_8 any

access-list vipowernet_cryptomap_5 extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0

access-list innovative-t1_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_1

access-list innovative-t1_cryptomap extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0

access-list innovative-t1_access_in extended permit ip STX 255.255.254.0 any

access-list innovative-t1_access_in extended permit ip any any inactive

access-list innovative-t1_access_in extended permit object-group DM_INLINE_PROTOCOL_5 host PolycomSTX host PolyComSTT log notifications

access-list innovative-t1_access_in extended permit udp host PolycomSTX host PolyComSTT object-group h323

pager lines 24

logging enable

logging list Event level emergencies

logging buffered warnings

logging asdm debugging

logging from-address helpdesk@vidol.gov

logging recipient-address helpdesk@vidol.gov level errors

flow-export destination inside 172.20.16.10 9996

flow-export template timeout-rate 1

flow-export delay flow-create 60

mtu inside 1500

mtu vipowernet 1500

mtu innovative-t1 1500

mtu bcm_stt 1500

ip local pool vpn_pool 172.20.16.80-172.20.16.81 mask 255.255.255.0

ip local pool vidol_vpn_pool 172.20.16.82-172.20.16.83 mask 255.255.255.0

ipv6 access-list innovative-t1_access_ipv6_in permit ip any any

no failover

icmp unreachable rate-limit 1 burst-size 1

icmp permit any inside

icmp permit any innovative-t1

icmp permit any bcm_stt

asdm image disk0:/asdm-631.bin

asdm history enable

arp timeout 14400

global (vipowernet) 1 interface

global (innovative-t1) 1 interface

nat (inside) 0 access-list inside_nat0_outbound

nat (inside) 1 0.0.0.0 0.0.0.0

access-group inside_access_in in interface inside

access-group innovative-t1_access_in in interface innovative-t1

access-group innovative-t1_access_ipv6_in in interface innovative-t1

access-group bcm_stt_access_in in interface bcm_stt

route innovative-t1 0.0.0.0 0.0.0.0 66.248.182.129 1

route innovative-t1 65.112.147.35 255.255.255.255 66.248.182.129 1

route inside 66.248.174.114 255.255.255.255 172.20.16.6 1

route inside 168.162.254.125 255.255.255.255 172.20.16.6 1

route inside DOF 255.255.255.0 172.20.16.2 1

route inside 172.20.8.0 255.255.255.0 172.20.16.21 1

route inside 172.20.25.0 255.255.255.0 172.20.16.2 1

route inside 192.168.1.253 255.255.255.255 172.20.16.21 1

route inside ResourceRoom 255.255.255.0 172.20.16.3 1

route inside 199.221.111.0 255.255.255.0 172.20.16.6 1

route inside 207.24.126.2 255.255.255.255 172.20.16.6 1

route inside 207.24.126.11 255.255.255.255 172.20.16.6 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication telnet console LOCAL

aaa authentication ssh console LOCAL

aaa authorization command LOCAL

http server enable 444

http 172.20.92.119 255.255.255.255 inside

http 172.20.16.0 255.255.255.0 inside

http 0.0.0.0 0.0.0.0 vipowernet

http 0.0.0.0 0.0.0.0 innovative-t1

http STX 255.255.254.0 inside

snmp-server group Authentication_Only v3 auth

snmp-server group No_Authentication_No_Encryption v3 noauth

snmp-server user rross No_Authentication_No_Encryption v3

snmp-server host inside 172.20.16.90 community ***** version 2c

snmp-server location STT

snmp-server contact rross@vidol.gov

snmp-server community *****

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map vipowernet_dyn_map 20 set pfs

crypto dynamic-map vipowernet_dyn_map 20 set transform-set ESP-DES-MD5

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-DES-SHA ESP-DES-MD5

crypto map vipowernet_map 6 match address vipowernet_cryptomap_5

crypto map vipowernet_map 6 set transform-set ESP-DES-MD5

crypto map vipowernet_map 65535 ipsec-isakmp dynamic vipowernet_dyn_map

crypto map vipowernet_map interface vipowernet

crypto map innovative-t1_map0 1 set transform-set ESP-DES-MD5

crypto map innovative-t1_map2 1 match address innovative-t1_cryptomap

crypto map innovative-t1_map2 1 set peer DHS-Public

crypto map innovative-t1_map2 1 set transform-set ESP-DES-MD5

crypto map innovative-t1_map2 3 match address innovative-t1_cryptomap_1

crypto map innovative-t1_map2 3 set peer 66.248.169.106

crypto map innovative-t1_map2 3 set transform-set ESP-DES-SHA ESP-DES-MD5

crypto map innovative-t1_map2 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

crypto map innovative-t1_map2 interface innovative-t1

crypto isakmp enable inside

crypto isakmp enable innovative-t1

crypto isakmp enable bcm_stt

crypto isakmp policy 30

authentication pre-share

encryption des

hash md5

group 2

lifetime 28800

crypto isakmp policy 35

authentication pre-share

encryption des

hash md5

group 1

lifetime 28800

crypto isakmp policy 40

authentication pre-share

encryption des

hash md5

group 2

lifetime 86400

crypto isakmp policy 50

authentication pre-share

encryption des

hash md5

group 1

lifetime 86400

telnet 172.20.16.0 255.255.255.0 inside

telnet timeout 5

ssh 0.0.0.0 0.0.0.0 vipowernet

ssh 0.0.0.0 0.0.0.0 innovative-t1

ssh timeout 5

console timeout 0

management-access inside

dhcpd auto_config innovative-t1

!

priority-queue vipowernet

  queue-limit   500

  tx-ring-limit 250

threat-detection basic-threat

threat-detection statistics host

threat-detection statistics access-list

threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200

ntp server 172.20.16.3 source inside prefer

webvpn

group-policy Noblis internal

group-policy Noblis attributes

wins-server value 172.20.16.3

dns-server value 172.20.16.3

vpn-filter value NoblisVPN-Access

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value Noblis_splitTunnelAcl

default-domain value stt.vidol.gov

group-policy DfltGrpPolicy attributes

webvpn

  svc dpd-interval client none

  svc dpd-interval gateway none

group-policy VIDOL-DHS2 internal

group-policy VIDOL-DHS2 attributes

banner none

wins-server none

dns-server none

dhcp-network-scope none

vpn-access-hours none

vpn-simultaneous-logins 3

vpn-idle-timeout 30

vpn-session-timeout none

vpn-filter value Noblis_splitTunnelAcl

ipv6-vpn-filter none

vpn-tunnel-protocol l2tp-ipsec

password-storage disable

ip-comp disable

re-xauth enable

group-lock none

pfs disable

ipsec-udp disable

ipsec-udp-port 10000

split-tunnel-policy tunnelall

split-tunnel-network-list none

default-domain none

split-dns none

intercept-dhcp disable

secure-unit-authentication disable

user-authentication disable

user-authentication-idle-timeout none

ip-phone-bypass disable

leap-bypass disable

nem disable

backup-servers keep-client-config

msie-proxy server none

msie-proxy method no-modify

msie-proxy except-list none

msie-proxy local-bypass disable

msie-proxy pac-url none

vlan none

nac-settings none

address-pools none

ipv6-address-pools none

smartcard-removal-disconnect enable

client-firewall none

client-access-rule none

webvpn

  url-list none

  filter none

  homepage none

  port-forward disable

  http-proxy disable

  sso-server none

  svc dtls enable

  svc mtu 1406

  svc keep-installer installed

  svc keepalive 20

  svc rekey time none

  svc rekey method none

  svc dpd-interval client 30

  svc dpd-interval gateway 30

  svc compression none

  svc modules none

  svc ask none default webvpn

  keep-alive-ignore 4

  http-comp gzip

  user-storage none

  storage-objects value credentials,cookies

  storage-key none

  hidden-shares none

  smart-tunnel disable

  activex-relay enable

  file-entry enable

  file-browsing enable

  url-entry enable

  deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.

  svc df-bit-ignore disable

group-policy VIDOL-DHS internal

group-policy VIDOL-DHS attributes

banner none

wins-server none

dns-server none

dhcp-network-scope none

vpn-access-hours none

vpn-simultaneous-logins 3

vpn-idle-timeout 30

vpn-session-timeout none

vpn-filter none

ipv6-vpn-filter none

vpn-tunnel-protocol IPSec l2tp-ipsec

password-storage disable

ip-comp disable

re-xauth disable

group-lock none

pfs disable

ipsec-udp disable

ipsec-udp-port 10000

split-tunnel-policy tunnelall

split-tunnel-network-list none

default-domain none

split-dns none

intercept-dhcp disable

secure-unit-authentication disable

user-authentication disable

user-authentication-idle-timeout none

ip-phone-bypass disable

leap-bypass disable

nem disable

backup-servers keep-client-config

msie-proxy server none

msie-proxy method no-modify

msie-proxy except-list none

msie-proxy local-bypass disable

msie-proxy pac-url none

vlan none

nac-settings none

address-pools none

ipv6-address-pools none

smartcard-removal-disconnect enable

client-firewall none

client-access-rule none

webvpn

  url-list none

  filter none

  homepage none

  port-forward disable

  http-proxy disable

  sso-server none

  svc dtls enable

  svc mtu 1406

  svc keep-installer installed

  svc keepalive 20

  svc rekey time none

  svc rekey method none

  svc dpd-interval client 30

  svc dpd-interval gateway 30

  svc compression none

  svc modules none

  svc ask none default webvpn

  customization value DfltCustomization

  keep-alive-ignore 4

  http-comp gzip

  user-storage none

  storage-objects value credentials,cookies

  storage-key none

  hidden-shares none

  smart-tunnel disable

  activex-relay enable

  file-entry enable

  file-browsing enable

  url-entry enable

  deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.

  smart-tunnel auto-signon disable

  svc df-bit-ignore disable

  svc routing-filtering-ignore disable

group-policy VIDOL internal

group-policy VIDOL attributes

wins-server value 172.20.16.3 172.20.16.4

dns-server value 172.20.16.3 172.20.16.4

vpn-filter value NoblisVPN-Access

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value Noblis_splitTunnelAcl

username ccomissiong password XViyJkNcpvsGx3tV encrypted privilege 0

username ccomissiong attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username rross password 5hGcrNg1MqNTRr8h encrypted privilege 0

username rross attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username srini password C5Qvbp4R9LymjrdT encrypted privilege 0

username srini attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username techsupport password NKdBZ05pogIBqt71 encrypted privilege 0

username techsupport attributes

vpn-group-policy Noblis

username carnold password Vvdhx.in9hycjwz7 encrypted privilege 0

username carnold attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username omni password 6nBdnRIePQ/ROtMl encrypted privilege 15

username omni attributes

vpn-group-policy Noblis

username omni2 password 6nBdnRIePQ/ROtMl encrypted privilege 15

username pdseales password uhQz870Epo8.s/GN encrypted privilege 0

username pdseales attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username vrgrant password 76RkQDvGfG4vOVhl encrypted privilege 0

username vrgrant attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username adegazon password 2zfzpiXv.RtiJcGl encrypted privilege 0

username adegazon attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username susan password QpC1nFawrkEwlZYg encrypted privilege 0

username susan attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username jrhyne password LtH.cNixkNPbaXb2 encrypted privilege 0

username jrhyne attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username dnieves password 8ZyyqIv30sbkiH9i encrypted privilege 0

username dnieves attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username rnieves password S2RKEsNXoDdA9x3k encrypted privilege 0

username rnieves attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username jvvelez password XeyZJt3zlweZSw1o encrypted privilege 0

username jvvelez attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

username xencarnacion password epKkIJv7j4ibiZ.p encrypted privilege 0

username xencarnacion attributes

vpn-group-policy Noblis

username jdcomissiong password KzBkTag9t60yOOjY encrypted privilege 0

username jdcomissiong attributes

vpn-group-policy VIDOL

vpn-simultaneous-logins 1

vpn-idle-timeout 45

vpn-filter value NoblisVPN-Access

username mcomstock password nOFjiUsiuEThgnyK encrypted privilege 0

username mcomstock attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username tjones password rhqKU7LpWxYU3TIf encrypted privilege 0

username tjones attributes

vpn-group-policy Noblis

vpn-filter value NoblisVPN-Access

password-storage enable

username rmphillip password .eaQELtGbR.sU1pZ encrypted privilege 0

username rmphillip attributes

vpn-group-policy VIDOL

vpn-filter value NoblisVPN-Access

tunnel-group 66.248.165.73 type ipsec-l2l

tunnel-group 66.248.165.73 ipsec-attributes

pre-shared-key *****

tunnel-group Noblis type remote-access

tunnel-group Noblis general-attributes

address-pool vpn_pool

default-group-policy Noblis

tunnel-group Noblis ipsec-attributes

pre-shared-key *****

tunnel-group VIDOL type remote-access

tunnel-group VIDOL general-attributes

address-pool vidol_vpn_pool

authorization-server-group LOCAL

default-group-policy VIDOL

tunnel-group VIDOL ipsec-attributes

pre-shared-key *****

tunnel-group 66.248.174.122 type ipsec-l2l

tunnel-group 66.248.174.122 general-attributes

default-group-policy VIDOL-DHS

tunnel-group 66.248.174.122 ipsec-attributes

pre-shared-key *****

tunnel-group 66.248.184.210 type ipsec-l2l

tunnel-group 66.248.184.210 general-attributes

default-group-policy VIDOL-DHS2

tunnel-group 66.248.184.210 ipsec-attributes

pre-shared-key *****

tunnel-group 66.248.169.106 type ipsec-l2l

tunnel-group 66.248.169.106 ipsec-attributes

pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny 

  inspect sunrpc

  inspect xdmcp

  inspect sip 

  inspect netbios

  inspect tftp

  inspect ip-options

  inspect pptp

!

service-policy global_policy global

privilege cmd level 3 mode exec command perfmon

privilege cmd level 3 mode exec command ping

privilege cmd level 3 mode exec command who

privilege cmd level 3 mode exec command logging

privilege cmd level 3 mode exec command failover

privilege show level 5 mode exec command running-config

privilege show level 3 mode exec command reload

privilege show level 3 mode exec command mode

privilege show level 3 mode exec command firewall

privilege show level 3 mode exec command interface

privilege show level 3 mode exec command clock

privilege show level 3 mode exec command dns-hosts

privilege show level 3 mode exec command access-list

privilege show level 3 mode exec command logging

privilege show level 3 mode exec command ip

privilege show level 3 mode exec command failover

privilege show level 3 mode exec command asdm

privilege show level 3 mode exec command arp

privilege show level 3 mode exec command route

privilege show level 3 mode exec command ospf

privilege show level 3 mode exec command aaa-server

privilege show level 3 mode exec command aaa

privilege show level 3 mode exec command crypto

privilege show level 3 mode exec command vpn-sessiondb

privilege show level 3 mode exec command ssh

privilege show level 3 mode exec command dhcpd

privilege show level 3 mode exec command vpn

privilege show level 3 mode exec command blocks

privilege show level 3 mode exec command uauth

privilege show level 3 mode configure command interface

privilege show level 3 mode configure command clock

privilege show level 3 mode configure command access-list

privilege show level 3 mode configure command logging

privilege show level 3 mode configure command ip

privilege show level 3 mode configure command failover

privilege show level 5 mode configure command asdm

privilege show level 3 mode configure command arp

privilege show level 3 mode configure command route

privilege show level 3 mode configure command aaa-server

privilege show level 3 mode configure command aaa

privilege show level 3 mode configure command crypto

privilege show level 3 mode configure command ssh

privilege show level 3 mode configure command dhcpd

privilege show level 5 mode configure command privilege

privilege clear level 3 mode exec command dns-hosts

privilege clear level 3 mode exec command logging

privilege clear level 3 mode exec command arp

privilege clear level 3 mode exec command aaa-server

privilege clear level 3 mode exec command crypto

privilege cmd level 3 mode configure command failover

privilege clear level 3 mode configure command logging

privilege clear level 3 mode configure command arp

privilege clear level 3 mode configure command crypto

privilege clear level 3 mode configure command aaa-server

prompt hostname context

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:19e6b42340cafbdbc41a81afa3823654

: end

1 Reply 1

Hi Bro

Before you proceed to add the line shown below, I'm guessing you're unable to access and PING 172.20.16.8 once you've successfully VPN in, am I right? If yes, which groupname and username did you use? Lastly, did you use IPSEC VPN Client or WebVPN?

access-list inside_nat0_outbound extended permit ip 10.20.60.0 255.255.255.0 172.20.16.0 255.255.255.0

Regards,

Ram

Warm regards,
Ramraj Sivagnanam Sivajanam
Review Cisco Networking for a $25 gift card