Accessing HTTPS Intranet Site?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-24-2020 07:49 AM
Using VPN Client 5.0 to a 800 Router running IOS 15.4; the connection successfully establishes I can connect to network drives, I can ping an important intranet web server, but can't view its HTTP/S pages. Someone suggested I need to do something to the config to allow its particular ports 8443 in this case to route through the VPN and I'm not 100% sure how to do that.
- Labels:
-
Other VPN Topics
-
VPN
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-24-2020 08:04 AM
on your VPN IP range, what ACL you have add port 8443 port to allow access.
or post the configuraiton so we can suggest you.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
09-24-2020 08:21 AM
Is this what you are looking for? If it is not, what command could I use to add port 8443 to allow access?
access-list 101 remark CCP_ACL Category=18
access-list 101 deny ip any 192.168.1.0 0.0.0.255
access-list 101 deny ip any 192.168.3.0 0.0.0.255
access-list 101 deny ip any 192.168.4.0 0.0.0.255
access-list 101 deny ip any 192.168.5.0 0.0.0.255
access-list 101 deny ip any 192.168.6.0 0.0.0.255
access-list 101 deny ip any 192.168.7.0 0.0.0.255
access-list 101 deny ip any 192.168.8.0 0.0.0.255
access-list 101 deny ip any 192.168.10.0 0.0.0.255
access-list 101 deny ip any 192.168.11.0 0.0.0.255
access-list 101 deny ip any 192.168.12.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.8.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 101 deny ip 192.168.2.0 0.0.0.255 192.168.2.0 0.0.0.255
access-list 101 deny ip any 192.168.2.0 0.0.0.255
access-list 101 permit ip 192.168.0.0 0.0.0.255 any
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 101 deny ip 192.168.0.0 0.0.0.255 192.168.12.0 0.0.0.255
access-list 101 permit ip 172.16.20.0 0.0.0.255 any
access-list 101 permit ip 172.16.30.0 0.0.0.255 any
access-list 101 permit ip 172.16.40.0 0.0.0.255 any
access-list 101 permit esp host 13.90.25.139 host 216.130.229.42
access-list 101 permit udp host 13.90.25.139 eq isakmp host 216.130.229.42
access-list 101 permit udp host 13.90.25.139 eq non500-isakmp host 216.130.229.42
access-list 106 permit ip 10.0.0.0 0.0.255.255 any
access-list 106 permit ip 10.1.0.0 0.0.255.255 any
access-list 106 permit ip 192.168.2.0 0.0.0.255 any
access-list 106 permit ip 192.168.0.0 0.0.0.255 any
access-list 106 permit ip 192.168.1.0 0.0.0.255 any
access-list 120 permit ip 192.168.0.0 0.0.0.255 192.168.1.0 0.0.0.255
access-list 130 permit ip any 192.168.3.0 0.0.0.255
access-list 130 permit ip 192.168.0.0 0.0.0.255 192.168.3.0 0.0.0.255
access-list 140 permit ip 192.168.0.0 0.0.0.255 192.168.6.0 0.0.0.255
access-list 150 permit ip 192.168.0.0 0.0.0.255 192.168.7.0 0.0.0.255
access-list 160 permit ip 192.168.0.0 0.0.0.255 192.168.4.0 0.0.0.255
access-list 170 permit ip 192.168.0.0 0.0.0.255 192.168.8.0 0.0.0.255
access-list 180 permit ip 192.168.0.0 0.0.0.255 192.168.5.0 0.0.0.255
access-list 185 permit ip 192.168.0.0 0.0.0.255 192.168.12.0 0.0.0.255
access-list 190 permit ip 192.168.0.0 0.0.0.255 192.168.10.0 0.0.0.255
