cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Bookmark
|
Subscribe
|
925
Views
0
Helpful
2
Replies

Accessing HTTPS Intranet Site?

lyonadmiral
Level 1
Level 1

Using VPN Client 5.0 to a 800 Router running IOS 15.4; the connection successfully establishes I can connect to network drives, I can ping an important intranet web server, but can't view its HTTP/S pages.  Someone suggested I need to do something to the config to allow its particular ports 8443 in this case to route through the VPN and I'm not 100% sure how to do that.

2 Replies 2

balaji.bandi
Hall of Fame
Hall of Fame

on your VPN IP range, what ACL you have add port 8443 port to allow access.

or post the configuraiton so we can suggest you.

 

BB

***** Rate All Helpful Responses *****

How to Ask The Cisco Community for Help

Is this what you are looking for?  If it is not, what command could I use to add port 8443 to allow access?

 

access-list 101 remark CCP_ACL Category=18
access-list 101 deny ip any 192.168.1.0 0.0.0.255
access-list 101 deny ip any 192.168.3.0 0.0.0.255
access-list 101 deny ip any 192.168.4.0 0.0.0.255
access-list 101 deny ip any 192.168.5.0 0.0.0.255
access-list 101 deny ip any 192.168.6.0 0.0.0.255
access-list 101 deny ip any 192.168.7.0 0.0.0.255
access-list 101 deny ip any 192.168.8.0 0.0.0.255
access-list 101 deny ip any 192.168.10.0 0.0.0.255
access-list 101 deny ip any 192.168.11.0 0.0.0.255
access-list 101 deny ip any 192.168.12.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.8.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 101 deny ip 192.168.2.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 101 deny ip any 192.168.2.0 0.0.0.255
access-list 101 permit ip 192.168.0.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.12.0 0.0.0.255
access-list 101 permit ip 172.16.20.0 0.0.0.255 any
access-list 101 permit ip 172.16.30.0 0.0.0.255 any
access-list 101 permit ip 172.16.40.0 0.0.0.255 any
access-list 101 permit esp host 13.90.25.139 host 216.130.229.42
access-list 101 permit udp host 13.90.25.139 eq isakmp host 216.130.229.42
access-list 101 permit udp host 13.90.25.139 eq non500-isakmp host 216.130.229.42
access-list 106 permit ip 10.0.0.0 0.0.255.255 any
access-list 106 permit ip 10.1.0.0 0.0.255.255 any
access-list 106 permit ip 192.168.2.0 0.0.0.255 any
access-list 106 permit ip 192.168.0.0 0.0.0.255 any
access-list 106 permit ip 192.168.1.0 0.0.0.255 any
access-list 120 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 130 permit ip any 192.168.3.0 0.0.0.255
access-list 130 permit ip 192.168.0.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 140 permit ip 192.168.0.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 150 permit ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 160 permit ip 192.168.0.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 170 permit ip 192.168.0.0 0.0.0.255 192.168.8.0 0.0.0.255
access-list 180 permit ip 192.168.0.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 185 permit ip 192.168.0.0 0.0.0.255 192.168.12.0 0.0.0.255
access-list 190 permit ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255