Thanks so much, Herbert. As an alternative to what you suggest, what do you think of this? I got it from Cisco's support document, http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a0080094634.shtml I would delete these lines: no ip nat inside source static tcp 10.10.10.95 80 [outside IP) 80 extendable no ip nat inside source static udp 10.10.10.95 80 [outside IP) 80 extendable no ip nat inside source static tcp 10.10.10.95 443 [outside IP) 443 extendable no ip nat inside source static udp 10.10.10.95 443 [outside IP) 443 extendable no ip nat inside source static tcp 10.10.10.30 80 [outside IP) 80 extendable and replace with these ip nat inside source static tcp 10.10.10.95 80 [outside IP) 80 route-map nonat extendable ip nat inside source static udp 10.10.10.95 80 [outside IP) 80 route-map nonat extendable ip nat inside source static tcp 10.10.10.95 443 [outside IP) 443 route-map nonat extendable ip nat inside source static udp 10.10.10.95 443 [outside IP) 443 route-map nonat extendable ip nat inside source static tcp 10.10.10.30 80 [outside IP) 80 route-map nonat extendable Then add: access-list 150 deny ip host 10.10.10.95 10.10.10.160 0.0.0.31 access-list 150 deny ip host 10.10.10.95 172.16.8.0 0.0.3.255 access-list 150 deny ip host 10.10.10.130 10.10.10.160 0.0.0.31 access-list 150 deny ip host 10.10.10.130 172.16.8.0 0.0.3.255 access-list 150 permit ip host 10.10.10.95 any access-list 150 permit ip host 10.10.10.130 any ! route-map nonat permit 10 match ip address 150
... View more
Thanks, Somu. But I am confused. First, the link you provided id dead. Second, the document http://www.cisco.com/en/US/docs/routers/access/interfaces/nm/hardware/installation/guide/InstNetM.html states: Note The following routers do not support online insertion and removal (OIR) of service modules or network modules: •Cisco 1900 series •Cisco 2600 series •Cisco 2811 •Cisco 2821 •Cisco 2851 •Cisco 2900 series •Cisco 3620 •Cisco 3640 •Cisco MWR 1941-DC To avoid damaging the router, turn off electrical power and disconnect network cables before inserting or removing a network module into these routers.
... View more
On my 2911 router, can I have both an Easy VPN server, and a site-to-site VPN? Also, with an Easy VPN, is it possible to specify another internet (outside) IP address in my assigned range as the address remote users use . . . rather than the specific IP address assigned to the interface? Thanks!
... View more
Thanks, Ajay. Are you saying that the Cisco VPN client works with "EasyVPN" but the SSL VPN requires "AnyConnect"? I initially used the EasyVPN wizard in CCP, then deleted the EasyVPN. Were renants left in my config file? What do I need to delete to get rid of the EasyVPN completely?
... View more
The answer is that I misunderstood the instructions (or lack thereof) on the web form where I register the feature licenses I purchased. The form asks for a PID and serial number. Although the instructions on the form do not specify this, both of these pertain to the hardware appliance, not the license; i.e. I entered the PID of the license--which the form accepted--but the resultant key file could not be installed on the appliance. I opened a TAC support case and had the license re-keyed with the PID and S/N of the appliance. Now it works.
... View more
I am new to Cisco . . . I want a simple remote client-initiated VPN for employees to access corporate resources from home simultaneously with being able to access the internet. I am using CCP and seem to have several options including Easy VPN server, SSL VPN. I also can choose "Full Tunnel" or not. I have a 2911 router. I have a static range of internet IP addresses. The router is already functioning with inside to outside and outside to inside NAT, etc. I am confused with all the options. Which one makes most sense in this straighforward situation?
... View more
I think I found the problem. The IOS version is 12.2, whereas 12.4 is required: http://www.cisco.com/en/US/prod/collateral/routers/ps9422/data_sheet_c78_462210.html
... View more
I removed that command. Result is the same (Discovery Details: Connection to the device could not be established. Either the device is not reachable or the HTTP service is not enabled on the device.) Building configuration... Current configuration : 1982 bytes ! ! Last configuration change at 00:37:12 UTC Tue Mar 2 2010 by admin1 ! NVRAM config last updated at 00:37:22 UTC Tue Mar 2 2010 by admin1 ! version 12.2 service timestamps debug datetime msec service timestamps log datetime msec service password-encryption ! hostname Peters_Gallery ! logging queue-limit 100 enable secret 5 xxxxxxxxx username xxxx privilege 15 password 7 xxxx username xxx privilege 15 password 7 xxxx ip subnet-zero ! ! ip domain name gpgallery.com ! ip cef ! ! ! ! interface FastEthernet0 description corp lan ip address 10.10.10.126 255.255.255.128 ip access-group 100 in speed auto ! interface Serial0 ip address 10.3.0.37 255.255.255.252 ! ip classless ip route 0.0.0.0 0.0.0.0 10.10.10.1 ip route 10.10.10.128 255.255.255.224 10.3.0.38 ip route 172.16.4.0 255.255.252.0 10.3.0.38 ip http server ip http authentication local ip http timeout-policy idle 60 life 86400 requests 10000 ! ! ! access-list 100 remark MRC access-list 100 permit tcp 10.10.10.0 0.0.0.127 host 10.10.10.126 eq telnet access-list 100 permit tcp 10.10.10.0 0.0.0.127 host 10.10.10.126 eq 22 access-list 100 permit tcp 10.10.10.0 0.0.0.127 host 10.10.10.126 eq www access-list 100 permit tcp 10.10.10.0 0.0.0.127 host 10.10.10.126 eq cmd access-list 100 deny tcp any host 10.10.10.126 eq telnet access-list 100 deny tcp any host 10.10.10.126 eq 22 access-list 100 deny tcp any host 10.10.10.126 eq www access-list 100 deny tcp any host 10.10.10.126 eq cmd access-list 100 permit ip any any access-list 101 remark MRC access-list 101 permit ip 10.10.10.0 0.0.0.127 any access-list 101 permit ip 10.10.10.128 0.0.0.31 any access-list 102 permit ip 10.10.10.128 0.0.0.31 any access-list 102 permit ip 10.10.10.0 0.0.0.127 any ! ! line con 0 line aux 0 line vty 0 4 access-class 102 in login local transport input telnet line vty 5 15 access-class 101 in login local transport input telnet ! no scheduler allocate end
... View more