cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1450
Views
0
Helpful
5
Replies

How to open pptp server to public internet on ASA5510

cisco_fun_4899
Level 1
Level 1

Hi,

I'v successed to open webserver to public internet by following command on ASA5510.

access-list DMZ_nat_static extended permit tcp host 192.168.10.210 eq www any

static (DMZ,pppoe) tcp 200.200.200.10 www access-list DMZ_nat_static

I can connect [Web server] from internet. (http://200.200.200.10).

[Question]

How to open MS-Windows pptp server to public internet (TCP:1723 and GRE).

*****************************

[internet] IP16 (ISP provides 200.200.200.1 to 200.200.200.16 by pppoe)

 |

 |

 |eth0/0 [Interface name : pppoe] 200.200.200.1

[ASA5510]

 |eth0/1 [Interface name : DMZ]

 |

 +---

 +---[Web server] 192.168.10.210 : 80 (⇒200.200.200.10 : 80)

 +---[pptp server] 192.168.10.208 (TCP:1723 & GRE) ⇒ 200.200.200.8 (TCP:1723 & GRE)

*****************************

Regards,

okumura

3 Accepted Solutions

Accepted Solutions

Jennifer Halim
Cisco Employee
Cisco Employee

You can perform 1:1 static NAT between the PPTP server 192.168.10.208 to 200.200.200.8, and also you would need to allow TCP/1723 on ACL applied to the pppoe interface, and lastly to enable "inspect pptp".

The following is the 3 things that need to be configured:

1) Static 1:1 NAT for 192.168.10.208 to 200.200.200.8

2) ACL to allow TCP/1723 on the pppoe interface

3) Enable "inspect pptp" on your global_policy policy-map.

Hope that answers your question.

View solution in original post

Assuming that you already have the following configured:

service-policy global_policy global

--> you can check by issueing: sh run service-policy

If you already have that, then here is how you would enable pptp inspection:

policy-map global_policy

     class inspection_default

          inspect pptp

View solution in original post

Cheers, and thanks for the ratings.

View solution in original post

5 Replies 5

Jennifer Halim
Cisco Employee
Cisco Employee

You can perform 1:1 static NAT between the PPTP server 192.168.10.208 to 200.200.200.8, and also you would need to allow TCP/1723 on ACL applied to the pppoe interface, and lastly to enable "inspect pptp".

The following is the 3 things that need to be configured:

1) Static 1:1 NAT for 192.168.10.208 to 200.200.200.8

2) ACL to allow TCP/1723 on the pppoe interface

3) Enable "inspect pptp" on your global_policy policy-map.

Hope that answers your question.

Hi, Jennifer.

Thank you for your reply!

3) Enable "inspect pptp" on your global_policy policy-map.

⇒ Could you tell me sample command about this?

Regards,

okumura

Assuming that you already have the following configured:

service-policy global_policy global

--> you can check by issueing: sh run service-policy

If you already have that, then here is how you would enable pptp inspection:

policy-map global_policy

     class inspection_default

          inspect pptp

Hi, Jennifer.

Thank you for your help!

My question has been resolved.

Regards,

okumura

Cheers, and thanks for the ratings.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: