04-12-2013 06:40 AM - edited 03-11-2019 06:27 PM
Using packet tracer I get an error saying:
Config
nat(inside) 1.0.0.0.0.0.0.0.0
match ip inside andy inside any
dynamic translaion to pool 1 (matching global)
translate_hits=45236,untranslate_hits=0
I cannot access my polycom unit on 172.20.16.8 via 10.20.60.8
below is my results of show run
Result of the command: "show run"
: Saved
:
ASA Version 8.2(2)
!
hostname ciscoasa-stt
domain-name stt.vidol.gov
enable password qXcSIHaSa9B75GQC encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 172.20.16.109 VIDOLAS description Application Server
name 205.171.2.65 ExtDNS_1
name 65.112.145.67 ExtDNS_2
name 65.248.160.66 ExtDNS_3
name 152.46.255.210 ONET description Online Onet Center
name 207.97.245.100 ExchangeEmailService description MLSRVR - Exchange Email Service
name 72.4.117.9 PopEmailService description secure.emailsrvr.com
name 192.168.3.0 ResourceRoom
name 192.168.2.0 bcm_network_stx description St. Croix Telephone network
name 172.20.21.0 DHS-Internal description VI Department of Human Services Network
name 66.248.174.122 DHS-Public description Human Services
name 172.20.2.0 DOF description VI Department of Finance
name 10.20.60.0 STX description St. Croix Office
name 172.20.16.8 PolyComSTT
name 10.20.60.8 PolycomSTX description HDX 7000 Video Conference Unit St.Croix
!
interface Vlan1
nameif inside
security-level 100
ip address 172.20.16.11 255.255.255.0
!
interface Vlan2
nameif vipowernet
security-level 0
ip address 66.248.161.238 255.255.255.128
!
interface Vlan12
nameif innovative-t1
security-level 0
ip address 66.248.182.170 255.255.255.248
!
interface Vlan22
nameif bcm_stt
security-level 100
ip address 192.168.4.250 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
switchport access vlan 12
!
interface Ethernet0/3
switchport access vlan 22
!
interface Ethernet0/4
!
interface Ethernet0/5
switchport trunk allowed vlan 1-2,12
!
interface Ethernet0/6
!
interface Ethernet0/7
!
!
time-range WorkingHours
periodic weekdays 8:00 to 16:45
!
boot system disk0:/asa822-k8.bin
ftp mode passive
clock timezone AST -4
dns server-group DefaultDNS
domain-name stt.vidol.gov
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network ExternalDNS
network-object host ExtDNS_1
network-object host ExtDNS_2
network-object host ExtDNS_3
object-group network VIDOL-Offices
network-object 172.20.16.0 255.255.255.0
network-object STX 255.255.254.0
object-group network DM_INLINE_NETWORK_3
group-object ExternalDNS
group-object VIDOL-Offices
object-group network EmailServices
network-object host ExchangeEmailService
network-object host PopEmailService
object-group protocol DM_INLINE_PROTOCOL_1
protocol-object ip
protocol-object udp
object-group network DM_INLINE_NETWORK_1
network-object STX 255.255.254.0
network-object bcm_network_stx 255.255.255.0
object-group network DM_INLINE_NETWORK_2
network-object 172.20.16.0 255.255.255.0
network-object 192.168.4.0 255.255.255.0
object-group network DM_INLINE_NETWORK_4
network-object 172.20.16.0 255.255.255.0
object-group network DM_INLINE_NETWORK_5
network-object STX 255.255.254.0
network-object bcm_network_stx 255.255.255.0
object-group network DM_INLINE_NETWORK_6
network-object 172.20.16.0 255.255.255.0
network-object 192.168.4.0 255.255.255.0
object-group network DM_INLINE_NETWORK_7
network-object 172.20.16.0 255.255.255.0
network-object 192.168.4.0 255.255.255.0
object-group network DM_INLINE_NETWORK_8
network-object 172.20.16.0 255.255.255.0
network-object 192.168.4.0 255.255.255.0
object-group protocol DM_INLINE_PROTOCOL_2
protocol-object ip
protocol-object udp
object-group protocol DM_INLINE_PROTOCOL_3
protocol-object ip
protocol-object udp
object-group protocol DM_INLINE_PROTOCOL_4
protocol-object udp
protocol-object tcp
object-group protocol DM_INLINE_PROTOCOL_5
protocol-object ip
protocol-object icmp
object-group service h323 udp
description Polycom Ports
port-object eq sip
access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_2 host 172.20.16.95 any
access-list inside_access_in extended deny object-group DM_INLINE_PROTOCOL_3 any host 172.20.16.95
access-list inside_access_in extended permit ip 172.20.16.0 255.255.255.0 host ONET
access-list inside_access_in extended permit ip 172.20.16.0 255.255.255.0 host PopEmailService
access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 172.20.16.0 255.255.255.0 object-group DM_INLINE_NETWORK_3
access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_7 any
access-list inside_access_in extended permit ip ResourceRoom 255.255.255.0 any
access-list inside_access_in extended permit ip any any inactive
access-list inside_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_NETWORK_5
access-list inside_nat0_outbound extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0
access-list inside_nat0_outbound extended permit ip any 172.20.16.80 255.255.255.252
access-list inside_nat0_outbound extended permit ip 172.20.16.0 255.255.255.0 DOF 255.255.255.0
access-list inside_access_out extended permit ip 172.20.16.0 255.255.255.0 any
access-list inside_access_out extended permit gre host 172.20.16.12 any inactive
access-list inside_access_out extended permit tcp interface inside eq 3389 any eq 3389
access-list Noblis_splitTunnelAcl standard permit 172.20.16.0 255.255.255.0
access-list NoblisVPN-Access extended permit ip any 172.20.16.0 255.255.255.0
access-list bcm_stt_access_in extended permit ip object-group DM_INLINE_NETWORK_8 any
access-list vipowernet_cryptomap_5 extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0
access-list innovative-t1_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_2 object-group DM_INLINE_NETWORK_1
access-list innovative-t1_cryptomap extended permit ip 172.20.16.0 255.255.255.0 DHS-Internal 255.255.255.0
access-list innovative-t1_access_in extended permit ip STX 255.255.254.0 any
access-list innovative-t1_access_in extended permit ip any any inactive
access-list innovative-t1_access_in extended permit object-group DM_INLINE_PROTOCOL_5 host PolycomSTX host PolyComSTT log notifications
access-list innovative-t1_access_in extended permit udp host PolycomSTX host PolyComSTT object-group h323
pager lines 24
logging enable
logging list Event level emergencies
logging buffered warnings
logging asdm debugging
logging from-address helpdesk@vidol.gov
logging recipient-address helpdesk@vidol.gov level errors
flow-export destination inside 172.20.16.10 9996
flow-export template timeout-rate 1
flow-export delay flow-create 60
mtu inside 1500
mtu vipowernet 1500
mtu innovative-t1 1500
mtu bcm_stt 1500
ip local pool vpn_pool 172.20.16.80-172.20.16.81 mask 255.255.255.0
ip local pool vidol_vpn_pool 172.20.16.82-172.20.16.83 mask 255.255.255.0
ipv6 access-list innovative-t1_access_ipv6_in permit ip any any
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
icmp permit any innovative-t1
icmp permit any bcm_stt
asdm image disk0:/asdm-631.bin
asdm history enable
arp timeout 14400
global (vipowernet) 1 interface
global (innovative-t1) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
access-group inside_access_in in interface inside
access-group innovative-t1_access_in in interface innovative-t1
access-group innovative-t1_access_ipv6_in in interface innovative-t1
access-group bcm_stt_access_in in interface bcm_stt
route innovative-t1 0.0.0.0 0.0.0.0 66.248.182.129 1
route innovative-t1 65.112.147.35 255.255.255.255 66.248.182.129 1
route inside 66.248.174.114 255.255.255.255 172.20.16.6 1
route inside 168.162.254.125 255.255.255.255 172.20.16.6 1
route inside DOF 255.255.255.0 172.20.16.2 1
route inside 172.20.8.0 255.255.255.0 172.20.16.21 1
route inside 172.20.25.0 255.255.255.0 172.20.16.2 1
route inside 192.168.1.253 255.255.255.255 172.20.16.21 1
route inside ResourceRoom 255.255.255.0 172.20.16.3 1
route inside 199.221.111.0 255.255.255.0 172.20.16.6 1
route inside 207.24.126.2 255.255.255.255 172.20.16.6 1
route inside 207.24.126.11 255.255.255.255 172.20.16.6 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication telnet console LOCAL
aaa authentication ssh console LOCAL
aaa authorization command LOCAL
http server enable 444
http 172.20.92.119 255.255.255.255 inside
http 172.20.16.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 vipowernet
http 0.0.0.0 0.0.0.0 innovative-t1
http STX 255.255.254.0 inside
snmp-server group Authentication_Only v3 auth
snmp-server group No_Authentication_No_Encryption v3 noauth
snmp-server user rross No_Authentication_No_Encryption v3
snmp-server host inside 172.20.16.90 community ***** version 2c
snmp-server location STT
snmp-server contact rross@vidol.gov
snmp-server community *****
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map vipowernet_dyn_map 20 set pfs
crypto dynamic-map vipowernet_dyn_map 20 set transform-set ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-DES-SHA ESP-DES-MD5
crypto map vipowernet_map 6 match address vipowernet_cryptomap_5
crypto map vipowernet_map 6 set transform-set ESP-DES-MD5
crypto map vipowernet_map 65535 ipsec-isakmp dynamic vipowernet_dyn_map
crypto map vipowernet_map interface vipowernet
crypto map innovative-t1_map0 1 set transform-set ESP-DES-MD5
crypto map innovative-t1_map2 1 match address innovative-t1_cryptomap
crypto map innovative-t1_map2 1 set peer DHS-Public
crypto map innovative-t1_map2 1 set transform-set ESP-DES-MD5
crypto map innovative-t1_map2 3 match address innovative-t1_cryptomap_1
crypto map innovative-t1_map2 3 set peer 66.248.169.106
crypto map innovative-t1_map2 3 set transform-set ESP-DES-SHA ESP-DES-MD5
crypto map innovative-t1_map2 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map innovative-t1_map2 interface innovative-t1
crypto isakmp enable inside
crypto isakmp enable innovative-t1
crypto isakmp enable bcm_stt
crypto isakmp policy 30
authentication pre-share
encryption des
hash md5
group 2
lifetime 28800
crypto isakmp policy 35
authentication pre-share
encryption des
hash md5
group 1
lifetime 28800
crypto isakmp policy 40
authentication pre-share
encryption des
hash md5
group 2
lifetime 86400
crypto isakmp policy 50
authentication pre-share
encryption des
hash md5
group 1
lifetime 86400
telnet 172.20.16.0 255.255.255.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 vipowernet
ssh 0.0.0.0 0.0.0.0 innovative-t1
ssh timeout 5
console timeout 0
management-access inside
dhcpd auto_config innovative-t1
!
priority-queue vipowernet
queue-limit 500
tx-ring-limit 250
threat-detection basic-threat
threat-detection statistics host
threat-detection statistics access-list
threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200
ntp server 172.20.16.3 source inside prefer
webvpn
group-policy Noblis internal
group-policy Noblis attributes
wins-server value 172.20.16.3
dns-server value 172.20.16.3
vpn-filter value NoblisVPN-Access
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Noblis_splitTunnelAcl
default-domain value stt.vidol.gov
group-policy DfltGrpPolicy attributes
webvpn
svc dpd-interval client none
svc dpd-interval gateway none
group-policy VIDOL-DHS2 internal
group-policy VIDOL-DHS2 attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter value Noblis_splitTunnelAcl
ipv6-vpn-filter none
vpn-tunnel-protocol l2tp-ipsec
password-storage disable
ip-comp disable
re-xauth enable
group-lock none
pfs disable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
intercept-dhcp disable
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout none
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
msie-proxy server none
msie-proxy method no-modify
msie-proxy except-list none
msie-proxy local-bypass disable
msie-proxy pac-url none
vlan none
nac-settings none
address-pools none
ipv6-address-pools none
smartcard-removal-disconnect enable
client-firewall none
client-access-rule none
webvpn
url-list none
filter none
homepage none
port-forward disable
http-proxy disable
sso-server none
svc dtls enable
svc mtu 1406
svc keep-installer installed
svc keepalive 20
svc rekey time none
svc rekey method none
svc dpd-interval client 30
svc dpd-interval gateway 30
svc compression none
svc modules none
svc ask none default webvpn
keep-alive-ignore 4
http-comp gzip
user-storage none
storage-objects value credentials,cookies
storage-key none
hidden-shares none
smart-tunnel disable
activex-relay enable
file-entry enable
file-browsing enable
url-entry enable
deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.
svc df-bit-ignore disable
group-policy VIDOL-DHS internal
group-policy VIDOL-DHS attributes
banner none
wins-server none
dns-server none
dhcp-network-scope none
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter none
ipv6-vpn-filter none
vpn-tunnel-protocol IPSec l2tp-ipsec
password-storage disable
ip-comp disable
re-xauth disable
group-lock none
pfs disable
ipsec-udp disable
ipsec-udp-port 10000
split-tunnel-policy tunnelall
split-tunnel-network-list none
default-domain none
split-dns none
intercept-dhcp disable
secure-unit-authentication disable
user-authentication disable
user-authentication-idle-timeout none
ip-phone-bypass disable
leap-bypass disable
nem disable
backup-servers keep-client-config
msie-proxy server none
msie-proxy method no-modify
msie-proxy except-list none
msie-proxy local-bypass disable
msie-proxy pac-url none
vlan none
nac-settings none
address-pools none
ipv6-address-pools none
smartcard-removal-disconnect enable
client-firewall none
client-access-rule none
webvpn
url-list none
filter none
homepage none
port-forward disable
http-proxy disable
sso-server none
svc dtls enable
svc mtu 1406
svc keep-installer installed
svc keepalive 20
svc rekey time none
svc rekey method none
svc dpd-interval client 30
svc dpd-interval gateway 30
svc compression none
svc modules none
svc ask none default webvpn
customization value DfltCustomization
keep-alive-ignore 4
http-comp gzip
user-storage none
storage-objects value credentials,cookies
storage-key none
hidden-shares none
smart-tunnel disable
activex-relay enable
file-entry enable
file-browsing enable
url-entry enable
deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.
smart-tunnel auto-signon disable
svc df-bit-ignore disable
svc routing-filtering-ignore disable
group-policy VIDOL internal
group-policy VIDOL attributes
wins-server value 172.20.16.3 172.20.16.4
dns-server value 172.20.16.3 172.20.16.4
vpn-filter value NoblisVPN-Access
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Noblis_splitTunnelAcl
username ccomissiong password XViyJkNcpvsGx3tV encrypted privilege 0
username ccomissiong attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username rross password 5hGcrNg1MqNTRr8h encrypted privilege 0
username rross attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username srini password C5Qvbp4R9LymjrdT encrypted privilege 0
username srini attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username techsupport password NKdBZ05pogIBqt71 encrypted privilege 0
username techsupport attributes
vpn-group-policy Noblis
username carnold password Vvdhx.in9hycjwz7 encrypted privilege 0
username carnold attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username omni password 6nBdnRIePQ/ROtMl encrypted privilege 15
username omni attributes
vpn-group-policy Noblis
username omni2 password 6nBdnRIePQ/ROtMl encrypted privilege 15
username pdseales password uhQz870Epo8.s/GN encrypted privilege 0
username pdseales attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username vrgrant password 76RkQDvGfG4vOVhl encrypted privilege 0
username vrgrant attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username adegazon password 2zfzpiXv.RtiJcGl encrypted privilege 0
username adegazon attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username susan password QpC1nFawrkEwlZYg encrypted privilege 0
username susan attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username jrhyne password LtH.cNixkNPbaXb2 encrypted privilege 0
username jrhyne attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username dnieves password 8ZyyqIv30sbkiH9i encrypted privilege 0
username dnieves attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username rnieves password S2RKEsNXoDdA9x3k encrypted privilege 0
username rnieves attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username jvvelez password XeyZJt3zlweZSw1o encrypted privilege 0
username jvvelez attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
username xencarnacion password epKkIJv7j4ibiZ.p encrypted privilege 0
username xencarnacion attributes
vpn-group-policy Noblis
username jdcomissiong password KzBkTag9t60yOOjY encrypted privilege 0
username jdcomissiong attributes
vpn-group-policy VIDOL
vpn-simultaneous-logins 1
vpn-idle-timeout 45
vpn-filter value NoblisVPN-Access
username mcomstock password nOFjiUsiuEThgnyK encrypted privilege 0
username mcomstock attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username tjones password rhqKU7LpWxYU3TIf encrypted privilege 0
username tjones attributes
vpn-group-policy Noblis
vpn-filter value NoblisVPN-Access
password-storage enable
username rmphillip password .eaQELtGbR.sU1pZ encrypted privilege 0
username rmphillip attributes
vpn-group-policy VIDOL
vpn-filter value NoblisVPN-Access
tunnel-group 66.248.165.73 type ipsec-l2l
tunnel-group 66.248.165.73 ipsec-attributes
pre-shared-key *****
tunnel-group Noblis type remote-access
tunnel-group Noblis general-attributes
address-pool vpn_pool
default-group-policy Noblis
tunnel-group Noblis ipsec-attributes
pre-shared-key *****
tunnel-group VIDOL type remote-access
tunnel-group VIDOL general-attributes
address-pool vidol_vpn_pool
authorization-server-group LOCAL
default-group-policy VIDOL
tunnel-group VIDOL ipsec-attributes
pre-shared-key *****
tunnel-group 66.248.174.122 type ipsec-l2l
tunnel-group 66.248.174.122 general-attributes
default-group-policy VIDOL-DHS
tunnel-group 66.248.174.122 ipsec-attributes
pre-shared-key *****
tunnel-group 66.248.184.210 type ipsec-l2l
tunnel-group 66.248.184.210 general-attributes
default-group-policy VIDOL-DHS2
tunnel-group 66.248.184.210 ipsec-attributes
pre-shared-key *****
tunnel-group 66.248.169.106 type ipsec-l2l
tunnel-group 66.248.169.106 ipsec-attributes
pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
inspect pptp
!
service-policy global_policy global
privilege cmd level 3 mode exec command perfmon
privilege cmd level 3 mode exec command ping
privilege cmd level 3 mode exec command who
privilege cmd level 3 mode exec command logging
privilege cmd level 3 mode exec command failover
privilege show level 5 mode exec command running-config
privilege show level 3 mode exec command reload
privilege show level 3 mode exec command mode
privilege show level 3 mode exec command firewall
privilege show level 3 mode exec command interface
privilege show level 3 mode exec command clock
privilege show level 3 mode exec command dns-hosts
privilege show level 3 mode exec command access-list
privilege show level 3 mode exec command logging
privilege show level 3 mode exec command ip
privilege show level 3 mode exec command failover
privilege show level 3 mode exec command asdm
privilege show level 3 mode exec command arp
privilege show level 3 mode exec command route
privilege show level 3 mode exec command ospf
privilege show level 3 mode exec command aaa-server
privilege show level 3 mode exec command aaa
privilege show level 3 mode exec command crypto
privilege show level 3 mode exec command vpn-sessiondb
privilege show level 3 mode exec command ssh
privilege show level 3 mode exec command dhcpd
privilege show level 3 mode exec command vpn
privilege show level 3 mode exec command blocks
privilege show level 3 mode exec command uauth
privilege show level 3 mode configure command interface
privilege show level 3 mode configure command clock
privilege show level 3 mode configure command access-list
privilege show level 3 mode configure command logging
privilege show level 3 mode configure command ip
privilege show level 3 mode configure command failover
privilege show level 5 mode configure command asdm
privilege show level 3 mode configure command arp
privilege show level 3 mode configure command route
privilege show level 3 mode configure command aaa-server
privilege show level 3 mode configure command aaa
privilege show level 3 mode configure command crypto
privilege show level 3 mode configure command ssh
privilege show level 3 mode configure command dhcpd
privilege show level 5 mode configure command privilege
privilege clear level 3 mode exec command dns-hosts
privilege clear level 3 mode exec command logging
privilege clear level 3 mode exec command arp
privilege clear level 3 mode exec command aaa-server
privilege clear level 3 mode exec command crypto
privilege cmd level 3 mode configure command failover
privilege clear level 3 mode configure command logging
privilege clear level 3 mode configure command arp
privilege clear level 3 mode configure command crypto
privilege clear level 3 mode configure command aaa-server
prompt hostname context
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:19e6b42340cafbdbc41a81afa3823654
: end
04-24-2013 01:16 AM
Hi Bro
Before you proceed to add the line shown below, I'm guessing you're unable to access and PING 172.20.16.8 once you've successfully VPN in, am I right? If yes, which groupname and username did you use? Lastly, did you use IPSEC VPN Client or WebVPN?
access-list inside_nat0_outbound extended permit ip 10.20.60.0 255.255.255.0 172.20.16.0 255.255.255.0
Regards,
Ram
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide