cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1500
Views
0
Helpful
5
Replies

How to open pptp server to public internet on ASA5510

cisco_fun_4899
Level 1
Level 1

Hi,

I'v successed to open webserver to public internet by following command on ASA5510.

access-list DMZ_nat_static extended permit tcp host 192.168.10.210 eq www any

static (DMZ,pppoe) tcp 200.200.200.10 www access-list DMZ_nat_static

I can connect [Web server] from internet. (http://200.200.200.10).

[Question]

How to open MS-Windows pptp server to public internet (TCP:1723 and GRE).

*****************************

[internet] IP16 (ISP provides 200.200.200.1 to 200.200.200.16 by pppoe)

 |

 |

 |eth0/0 [Interface name : pppoe] 200.200.200.1

[ASA5510]

 |eth0/1 [Interface name : DMZ]

 |

 +---

 +---[Web server] 192.168.10.210 : 80 (⇒200.200.200.10 : 80)

 +---[pptp server] 192.168.10.208 (TCP:1723 & GRE) ⇒ 200.200.200.8 (TCP:1723 & GRE)

*****************************

Regards,

okumura

3 Accepted Solutions

Accepted Solutions

Jennifer Halim
Cisco Employee
Cisco Employee

You can perform 1:1 static NAT between the PPTP server 192.168.10.208 to 200.200.200.8, and also you would need to allow TCP/1723 on ACL applied to the pppoe interface, and lastly to enable "inspect pptp".

The following is the 3 things that need to be configured:

1) Static 1:1 NAT for 192.168.10.208 to 200.200.200.8

2) ACL to allow TCP/1723 on the pppoe interface

3) Enable "inspect pptp" on your global_policy policy-map.

Hope that answers your question.

View solution in original post

Assuming that you already have the following configured:

service-policy global_policy global

--> you can check by issueing: sh run service-policy

If you already have that, then here is how you would enable pptp inspection:

policy-map global_policy

     class inspection_default

          inspect pptp

View solution in original post

Cheers, and thanks for the ratings.

View solution in original post

5 Replies 5

Jennifer Halim
Cisco Employee
Cisco Employee

You can perform 1:1 static NAT between the PPTP server 192.168.10.208 to 200.200.200.8, and also you would need to allow TCP/1723 on ACL applied to the pppoe interface, and lastly to enable "inspect pptp".

The following is the 3 things that need to be configured:

1) Static 1:1 NAT for 192.168.10.208 to 200.200.200.8

2) ACL to allow TCP/1723 on the pppoe interface

3) Enable "inspect pptp" on your global_policy policy-map.

Hope that answers your question.

Hi, Jennifer.

Thank you for your reply!

3) Enable "inspect pptp" on your global_policy policy-map.

⇒ Could you tell me sample command about this?

Regards,

okumura

Assuming that you already have the following configured:

service-policy global_policy global

--> you can check by issueing: sh run service-policy

If you already have that, then here is how you would enable pptp inspection:

policy-map global_policy

     class inspection_default

          inspect pptp

Hi, Jennifer.

Thank you for your help!

My question has been resolved.

Regards,

okumura

Cheers, and thanks for the ratings.