09-24-2013 08:47 AM - edited 03-11-2019 07:42 PM
Hi Everyone,
We have external user on dmz and he is trying to connect to their company network over VPN.
HEre is log from internet firewall
i can see the firewall is allowing the rule.
%ASA-6-302013: Built outbound TCP connection 6931561 for outside:200.x.x.x
%ASA-3-305006: regular translation creation failed for protocol 47 src dmz 192.x.x.x
What should i do to fix this issue ?
Regards
MAhesh
Solved! Go to Solution.
09-25-2013 11:44 AM
Hi,
The problem is that GRE is portless. It is just an IP protocol. Not something that we can PAT using a TCP/UDP.
You can try this command. This will add PPTP to the global inspection.
fixup protocol pptp
If this doesn't work an static nat for that host should be required.
HTH
Luis Silva
"If you need PDI (Planning, Design, Implement) assistance feel free to reach us"
http://www.cisco.com/web/partners/tools/pdihd.html
09-25-2013 11:44 AM
Hi,
The problem is that GRE is portless. It is just an IP protocol. Not something that we can PAT using a TCP/UDP.
You can try this command. This will add PPTP to the global inspection.
fixup protocol pptp
If this doesn't work an static nat for that host should be required.
HTH
Luis Silva
"If you need PDI (Planning, Design, Implement) assistance feel free to reach us"
http://www.cisco.com/web/partners/tools/pdihd.html
09-25-2013 12:37 PM
Hi Luis,
Thanks for reply.
I added inspect pptp under global inspection policy and after that ASA allowed GRE tunnel.
Seems pptp is not inspected by default.
Best Regards
Mahesh
09-25-2013 12:39 PM
Yes you are right it is not .
I am glad it helps.
Luis Silva
"If you need PDI (Planning, Design, Implement) assistance feel free to reach us"
http://www.cisco.com/web/partners/tools/pdihd.html
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide