Thank you burt for your fast reply.
In fact I can ping everything in the same subnet,but not ISA itself.My problem is ISA can ping the Router and the Router's subnet,Router can ping all the subnet except the ISA server.without seeing ISA it is not possible to see the third LAN that has the site to site VPN connection with this ISA server.
I can not telnet to the ISA,it says:the connection failed,
Can Cisco connect to any device via telnet Burt???Or only Cisco-to-Cisco ?
I post the results of sh ip route nad sh run here:
Jordan#sh ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is 192.168.1.1 to network 0.0.0.0
192.168.110.0/24 is variably subnetted, 2 subnets, 2 masks
S 192.168.110.3/32 [1/0] via 192.168.200.3
S 192.168.110.0/24 [1/0] via 192.168.1.1
C 192.168.144.0/24 is directly connected, FastEthernet0/0
192.168.200.0/24 is variably subnetted, 2 subnets, 2 masks
S 192.168.200.0/24 [1/0] via 192.168.1.1
S 192.168.200.3/32 [1/0] via 192.168.1.1
10.0.0.0/32 is subnetted, 1 subnets
S 10.10.10.3 is directly connected, FastEthernet0/0
192.168.1.0/30 is subnetted, 1 subnets
C 192.168.1.0 is directly connected, Serial0/0
S* 0.0.0.0/0 [1/0] via 192.168.1.1
Jordan#
And also sh run results:
Jordan#sh run
Building configuration...
Current configuration : 2707 bytes
!
version 12.3
service timestamps debug uptime
service timestamps log datetime msec localtime
service password-encryption
!
hostname Jordan
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$8zxj$xqEhorrkwU8HQsyBMvtY7.
enable password 7 0201135104140B2042
!
username delaram password 7 01030716481F0303
clock timezone IR 3 30
no network-clock-participate slot 1
no network-clock-participate wic 0
aaa new-model
!
!
aaa session-id common
ip subnet-zero
ip cef
!
!
!
ip name-server 192.168.200.96
no ftp-server write-enable
!
!
!
!
interface Loopback0
no ip address
shutdown
!
interface FastEthernet0/0
ip address 192.168.144.10 255.255.255.0
ip nat inside
speed auto
full-duplex
no cdp enable
no mop enabled
!
interface Serial0/0
ip address 192.168.1.2 255.255.255.252
ip nat outside
no cdp enable
!
interface Serial0/1
no ip address
shutdown
no cdp enable
!
ip nat pool NAT 84.241.57.108 84.241.57.108 netmask 255.255.255.252
ip nat inside source list 1 pool NAT overload
ip classless
ip route 0.0.0.0 0.0.0.0 192.168.1.1
ip route 192.168.110.0 255.255.255.0 192.168.1.1
ip route 192.168.110.3 255.255.255.255 192.168.200.3
ip route 192.168.200.0 255.255.255.0 192.168.1.1
ip route 192.168.200.3 255.255.255.255 192.168.1.1
no ip http server
!
logging trap debugging
logging 192.168.200.96
access-list 1 permit 192.168.144.32 0.0.0.31
access-list 101 deny 55 any any
access-list 101 deny 77 any any
access-list 101 deny udp any any eq tftp
access-list 101 deny udp any any eq 135
access-list 101 deny tcp any any eq 135
access-list 101 deny tcp any any eq 137
access-list 101 deny udp any any eq netbios-ns
access-list 101 deny udp any any eq netbios-dgm
access-list 101 deny tcp any any eq 138
access-list 101 deny tcp any any eq 139
access-list 101 deny udp any any eq netbios-ss
access-list 101 deny udp any any eq 136
access-list 101 deny tcp any any eq 136
access-list 101 deny tcp any any eq 445
access-list 101 deny tcp any any eq 593
access-list 101 deny udp any any eq 593
access-list 101 deny udp any any eq 445
access-list 101 deny udp any any range 990 1000
access-list 101 deny udp any any eq 8998
access-list 101 deny udp any any eq 4444
access-list 101 deny tcp any any eq 4444
access-list 101 deny tcp any any eq 1434
access-list 101 deny udp any any eq 1434
access-list 101 deny tcp any any range 3127 3198
access-list 101 permit ip any any
dialer-list 1 protocol ip permit
no cdp run
snmp-server community khiar RO
snmp-server enable traps tty
alias exec ct config term
alias exec sr show run
alias exec ver sh version
!
line con 0
line aux 0
line vty 0 4
!
!
!
end
The IP:192.168.200.3 is the IP of the ISA server.
This router via 192.168.1.0 which is connected via leased line to the 3660 router which has subnet 192.168.200.0
Subnet 192.168.110.0 is the subnet of the LAN which is connected to ISA via VPN.
The ACL does not apply to any Interface.
Thank you for all of your helps and advices.
Sogol