cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Bookmark
|
Subscribe
|
2888
Views
0
Helpful
17
Replies

PPTP Traffic Not Passing

Muhammad.Eissa
Level 1
Level 1

Hello,

i have issue in my network , as part of the work we need to connect to outside PPTP server but its always fail , works only if we connect directly to the gateway router.

back behind the ASA  the client cant connect ,  what is driving me crazy  is  when i do packet tracer with ASDM its show everything working fine ,

the below configuration is all i need to connect from client to outside server . also i have tried connect wireless and wired , but nothing

class-map inspection_default
 match default-inspection-traffic

policy-map global_policy
 class inspection_default
  inspect pptp

service-policy global_policy global

17 Replies 17

Philip D'Ath
VIP Alumni
VIP Alumni

That should work.  Is it definitely using PPTP and not L2TP over IPSec (aka, is the client VPN configuration left on automatic and you have assumed it is PPTP)?

Using the ASDM log when trying to connect do you see anything being blocked or any warnings?

this is the debug from the asa  for two connection try ,  its always fail after the unknown -message show up

What version of software are you using on your ASA?

I meant just the normal ASDM logging, not debugging (although the above is interesting to see).  Are any packets getting dropped?

The above makes it looks like the workstation is doing the disconnect.

we are working with Version 9.4(2) 5545 with firepower module what is driving me crazy that when i do packet tracer on the ASDM it show success for all steps and its working fine if i connect from anywhere and direct to the router , but not the ASA

I'm not really a fan of the 9.4(x) train, as I have had other issues with it.

I don't think it is likely to fix it, but I would be tempted to go to 9.5(2)200.  That train has been working well for me.

i will keep looking and let you know the final result , thank you for the advice

I have a same problems.How did you solve it ?

i didn't solve it  yet , i also found a line to go with

: SFR requested to drop GRE packet from outside  , this was message from the syslog server that the ASA  send log to it , so now i know where is the issue

but it was totally hidden  as no alarm on IPS or  blocked by any rules

i will tell you in details when i get it to work

Hi

I solved it simple creating a rule as you can see attached.

Hope to have helped you.

thank you for this advice , but i have tried this before and didn't solve the case :D

i think i have another issue.

i am sorry for my late reply, i found the solve.

i am using SSL Inspection , we has to remove the SSL Policy from the access policy after that its working, for now the TAC didn`t respond why that issue happen as its up-normal.

Hi

I have the same problem.

Can you be more specific when you says .. :

"...we has to remove the SSL Policy from the access policy after that its working".

Remove SSL Policy .. ?? Where ??

I have tried to do a Global Inspection specific that make the GRE pass.

After another inspection that redirect to SFR.

Same problem.....

Thanks for help...

Bnnetwork:

Please tell me what version of FireSIGHt do u have, and i will try to explain based on it.

Hi

Thanks for the answer

I have 6.0.0-1005

Thanks again

Review Cisco Networking for a $25 gift card