Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Help with config

Status
Not open for further replies.

g8orade

Technical User
Aug 24, 2000
92
US
This is my first try with the asa 5510. I can get a tunnel out through the ending 106 address. But cant get the tunnel to *.*.*.192 up. What am I doing wrong.
G8orade



asdm image disk0:/asdm504.bin
asdm location 10.100.50.6 255.255.255.255 Inside
asdm location ftp 255.255.255.255 Inside
asdm location MOM 255.255.255.255 Inside
no asdm history enable
: Saved
:
ASA Version 7.0(4)
!
hostname ciscoasa
domain-name one.lie.org
enable password rNbKiTOk0Jooou8Zm encrypted
names
name 10.100.50.7 ftp
name 10.100.50.5 MOM
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address *.*.*.106 255.255.255.248
!
interface Ethernet0/1
nameif Inside
security-level 0
ip address 10.100.50.1 255.255.0.0
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
management-only
!
passwd 2KFQnbNIdI.2KYOU encrypted
ftp mode passive
same-security-traffic permit inter-interface
object-group service everybody tcp-udp
port-object range 20 2000
object-group service Mom1 tcp-udp
port-object range 3299 3299
object-group service rgl-1 tcp-udp
port-object range 21 21
port-object range 2000 2045
port-object range 990 990
port-object range 1723 1723
port-object range 20 20
access-list Outside_pnat_outbound_V1 extended permit ip interface Outside interface Inside
access-list Outside_pnat_outbound_V2 extended permit tcp interface Outside eq ftp-data host ftp eq ftp-data
access-list Inside_access_in extended permit ip any any
access-list Inside_pnat_outbound extended permit ip 10.100.0.0 255.255.0.0 any
access-list Inside_pnat_outbound_V1 extended permit ip host ftp any
access-list Outside_access_in extended permit tcp any host *.*.*.108
access-list Outside_access_in extended permit udp any host *.*.*.107 object-group rgl-1
access-list Outside_access_in extended permit ip any host *.*.*.107
access-list Outside_access_in extended permit tcp any host *.*.*.107 object-group rgl-1
access-list Outside_access_in extended permit tcp any host *.*.*.109
access-list Inside_nat0_outbound extended permit ip 10.100.50.0 255.255.255.0 10.56.0.0 255.255.0.0
access-list Inside_nat0_outbound extended permit ip 10.100.0.0 255.255.0.0 10.130.50.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip 10.100.0.0 255.255.0.0 10.130.1.0 255.255.255.0
access-list Outside_cryptomap_20 extended permit ip 10.100.50.0 255.255.255.0 10.56.0.0 255.255.0.0
access-list management_nat0_outbound extended permit ip any 10.100.100.0 255.255.255.248
access-list Outside_cryptomap_dyn_20 extended permit ip any 10.100.100.0 255.255.255.248
access-list Inside_pnat_outbound_V2 extended permit ip host MOM any
access-list Inside_pnat_outbound_V3 extended permit ip host ftp any
access-list Outside_cryptomap_40_1 extended permit ip 10.100.0.0 255.255.0.0 10.130.50.0 255.255.255.0
access-list Outside_cryptomap_40_1 extended permit ip 10.100.0.0 255.255.0.0 10.130.1.0 255.255.255.0
access-list 1 webtype permit url any
pager lines 24
logging enable
logging asdm informational
mtu Outside 1500
mtu Inside 1500
mtu management 1500
ip local pool temp 10.100.100.1-10.100.100.5 mask 255.255.0.0
ERROR: Command requires failover license
ERROR: Command requires failover license
asdm image disk0:/asdm504.bin
no asdm history enable
arp timeout 14400
nat-control
global (Outside) 10 interface
global (Inside) 2 10.100.5.100- 10.100.5.105
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 10 access-list Inside_pnat_outbound dns
nat (management) 0 access-list management_nat0_outbound
static (Inside,Outside) *.*.*.107 access-list Inside_pnat_outbound_V1
static (Inside,Outside) *.*.*.108 MOM netmask 255.255.255.255
static (Inside,Outside) *.*.*.109 10.100.20.1 netmask 255.255.255.255
access-group Outside_access_in in interface Outside
access-group Inside_access_in in interface Inside
rip Outside default version 1
rip Inside passive version 1
rip Inside default version 1
route Outside 0.0.0.0 0.0.0.0 *.*.*.105 1
route Inside MOM 255.255.255.255 10.100.50.1 1
route Inside ftp 255.255.255.255 10.100.50.1 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00
timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
url-list TS "TSWeb" url-list TS "Term" port-forward mom 3299 10.100.50.5 3299
group-policy jay internal
username aliar password 87XZjQANpqwbhwANi encrypted privilege 0
username aliar attributes
vpn-group-policy alia
webvpn
url-list value TS
http server enable
http 0.0.0.0 0.0.0.0 Outside
http 10.100.0.0 255.255.0.0 Inside
http 192.168.1.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map Outside_dyn_map 20 match address Outside_cryptomap_dyn_20
crypto dynamic-map Outside_dyn_map 20 set transform-set ESP-AES-256-SHA
crypto map Outside_map 20 match address Outside_cryptomap_20
crypto map Outside_map 20 set peer *.*.*.14
crypto map Outside_map 20 set transform-set ESP-AES-256-SHA
crypto map Outside_map 40 match address Outside_cryptomap_40_1
crypto map Outside_map 40 set peer *.*.*.192
crypto map Outside_map 40 set transform-set ESP-3DES-MD5
crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map
crypto map Outside_map interface Outside
isakmp enable Outside
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption aes-256
isakmp policy 10 hash sha
isakmp policy 10 group 5
isakmp policy 10 lifetime 86400
isakmp policy 30 authentication pre-share
isakmp policy 30 encryption 3des
isakmp policy 30 hash md5
isakmp policy 30 group 2
isakmp policy 30 lifetime 86400
tunnel-group *.*.*.14 type ipsec-l2l
tunnel-group *.*.*.14 ipsec-attributes
pre-shared-key *
tunnel-group *.*.*.192 type ipsec-l2l
tunnel-group *.*.*.192 ipsec-attributes
pre-shared-key *
peer-id-validate cert
telnet 0.0.0.0 0.0.0.0 Outside
telnet timeout 5
ssh timeout 5
console timeout 0
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd dns 192.168.100.1 200.100.50.1
dhcpd lease 3600
dhcpd ping_timeout 50
dhcpd enable management
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect dns maximum-length 512
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
Cryptochecksum:562e8b445ef40dccea0d544868444b13
: end
 
What is the cert chain you are validating against (is it public)?

Try taking this line out
peer-id-validate cert





Brent
Systems Engineer / Consultant
CCNP, CCSP
 
I took suggested line out with no luck.
Thanks for the response.
G8orade
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top