cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
391
Views
0
Helpful
1
Replies

ASA Passthrough L2TP

tom
Level 1
Level 1

Hi,

I have been battling this all day...

I'm trying to pass L2TP through to a Windows RRAS but its not working, I have configured PPTP a OK. 

Config below:


: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz
:
ASA Version 9.1(6)
!

!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.20.253 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
pppoe client vpdn group Internet
ip address pppoe
!
ftp mode passive
object network SERVER
host 192.168.20.3
access-list OUTSIDE-IN remark PPTP
access-list OUTSIDE-IN remark L2TP
access-list OUTSIDE-IN remark PPTP
access-list OUTSIDE-IN remark PPTP
access-list OUTSIDE-IN remark L2TP
access-list OUTSIDE-IN remark L2TP
access-list OUTSIDE-IN remark PPTP
access-list OUTSIDE-IN extended permit tcp any object SERVER eq pptp
access-list OUTSIDE-IN extended permit gre any object SERVER
access-list OUTSIDE-IN remark L2TP
access-list OUTSIDE-IN extended permit udp any object SERVER eq 1701
access-list OUTSIDE-IN extended permit udp any object SERVER eq isakmp
access-list OUTSIDE-IN extended permit esp any object SERVER
access-list OUTSIDE-IN extended permit ah any object SERVER
access-list OUTSIDE-IN extended permit udp any object SERVER eq 4500
pager lines 24
logging console emergencies
logging asdm informational
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
!
object network SERVER
nat (inside,outside) static interface
!
nat (inside,outside) after-auto source dynamic any interface
access-group OUTSIDE-IN in interface outside
route outside 0.0.0.0 0.0.0.0 88.215.57.240 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication serial console LOCAL
http server enable
http 192.168.20.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec security-association pmtu-aging infinite
crypto ca trustpool policy
crypto ikev1 enable outside
telnet timeout 5
no ssh stricthostkeycheck
ssh 192.168.20.0 255.255.255.0 inside
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
vpdn group Gamma request dialout pppoe
vpdn group Gamma localname *****
vpdn group Gamma ppp authentication pap
vpdn group Internet request dialout pppoe
vpdn group Internet localname ****
vpdn group Internet ppp authentication chap
vpdn username username@username.com password ***** store-local

dhcpd auto_config outside
!
dhcpd address 192.168.20.10-192.168.20.36 inside
dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy DfltGrpPolicy attributes
vpn-tunnel-protocol ikev1 ikev2 ssl-clientless
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect ipsec-pass-thru iptmap
parameters
esp per-client-max 10 timeout 0:11:00
ah per-client-max 5 timeout 0:06:00
policy-map global_policy
class inspection_default
inspect pptp
inspect ftp
inspect h323 h225
inspect h323 ras
inspect ip-options
inspect netbios
inspect rsh
inspect rtsp
inspect skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect tftp
inspect sip
inspect xdmcp
inspect ipsec-pass-thru iptmap
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
Cryptochecksum:2fb18b23cb47db1dda11151b85e3eb3a
: end
no asdm history enable

Is there anything wrong with the config?

Thanks

1 Reply 1

pjain2
Cisco Employee
Cisco Employee

can you attach the output of debug l2tp 255 and debug crypto isakmp 127, debug crypto ipsec 127