Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations bkrike on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

vpn internet access

Status
Not open for further replies.

ekke

MIS
Feb 27, 2002
100
SE
Hi, i have for me a perfect setup with cisco vpn and xp built in client. both are working fine and fast. but on the xp built in client i cant access internet and i cant figure it out whats wrong.

please help.

: Saved
:
ASA Version 8.0(2)
!
hostname *-asa
domain-name *
enable password VVg61OlqoJTMvB8U encrypted
names
dns-guard
!
interface Ethernet0/0
nameif Outside
security-level 0
ip address external_ip 255.255.255.0
ospf cost 10
!
interface Ethernet0/1
nameif Inside
security-level 100
ip address 192.168.1.254 255.255.255.0
ospf cost 10
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.100.1 255.255.255.0
management-only
!
passwd 2KFQnbNIdI.2KYOU encrypted
boot system disk0:/asa802-k8.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
domain-name *
object-group service Tomcat tcp
port-object eq 8080
object-group service TS tcp
description Remote Desktop
port-object eq 3389
access-list Outside_access_in extended permit icmp any any echo-reply
access-list Outside_access_in extended permit icmp any any source-quench
access-list Outside_access_in extended permit icmp any any unreachable
access-list Outside_access_in extended permit icmp any any time-exceeded
access-list Outside_access_in extended permit tcp any host external_ip eq www
access-list Outside_access_in extended permit tcp any host external_ip eq smtp
access-list Outside_access_in extended permit tcp any host external_ip eq www
access-list Outside_access_in extended permit tcp any host external_ip eq https
access-list Outside_access_in extended permit tcp any host external_ip eq pop3
access-list Outside_access_in extended permit tcp any host external_ip eq 8080
access-list Outside_access_in extended permit tcp any host external_ip eq ftp
access-list Outside_access_in extended permit tcp any host external_ip object-group Tomcat
access-list Outside_access_in extended permit tcp any host external_ip eq 3389
access-list Outside_access_in extended permit udp any any
access-list Outside_access_in extended permit udp any host external_ip eq 1701
access-list Outside_access_in extended permit udp any host external_ip eq 4500
access-list Outside_access_in extended permit tcp any host external_ip eq pptp
access-list Outside_access_in extended permit udp any host external_ip eq isakmp
access-list Inside_nat0_outbound extended permit ip any 10.20.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip any 10.10.10.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip any 10.30.30.0 255.255.255.0
access-list split standard permit 192.168.1.0 255.255.255.0
pager lines 24
logging enable
logging asdm debugging
mtu Outside 1500
mtu Inside 1500
mtu management 1500
ip local pool ciscoclientpool 10.20.20.1-10.20.20.245 mask 255.255.255.0
ip local pool xpclientpool 10.30.30.1-10.30.30.245 mask 255.255.255.0
ip local pool webvpnpool 10.10.10.1-10.10.10.245 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (Outside) 1 interface
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 1 0.0.0.0 0.0.0.0
static (Inside,Outside) tcp external_ip 255.255.255.255
static (Inside,Outside) tcp external_ip smtp 192.168.1.8 smtp netmask 255.255.255.255
static (Inside,Outside) tcp external_ip 255.255.255.255
static (Inside,Outside) tcp external_ip https 192.168.1.8 https netmask 255.255.255.255
static (Inside,Outside) tcp external_ip pop3 192.168.1.8 pop3 netmask 255.255.255.255
static (Inside,Outside) tcp external_ip ftp 192.168.1.8 ftp netmask 255.255.255.255
static (Inside,Outside) tcp interface 3389 192.168.1.8 3389 netmask 255.255.255.255
static (Inside,Outside) tcp external_ip 8080 192.168.1.8 8080 netmask 255.255.255.255
access-group Outside_access_in in interface Outside
route Outside 0.0.0.0 0.0.0.0 Gateway
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa-server ldap_web_vpn protocol ldap
aaa-server ldap_web_vpn host 192.168.1.8
ldap-base-dn OU=ftp, OU=*, DC=*, DC=*
ldap-scope onelevel
ldap-naming-attribute sAMAccountName
ldap-login-password *
ldap-login-dn CN=Administrator, CN=Users, DC=*, DC=*
server-type microsoft
http server enable
http 192.168.100.0 255.255.255.0 management
http 192.168.1.0 255.255.255.0 Inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport
crypto dynamic-map Outside_dyn_map 10 set transform-set ESP-3DES-SHA TRANS_ESP_3DES_SHA
crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map
crypto map Outside_map interface Outside
crypto isakmp identity address
crypto isakmp enable Outside
crypto isakmp policy 5
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
management-access Inside
dhcpd dns 195.67.199.199 195.67.199.19 interface Inside
!
dhcpd address 192.168.100.2-192.168.100.254 management
dhcpd enable management
!
threat-detection basic-threat
threat-detection statistics access-list
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
webvpn
enable Outside
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
vpn-tunnel-protocol IPSec l2tp-ipsec
group-policy DfltGrpPolicy attributes
vpn-tunnel-protocol webvpn
group-policy ciscovpngroup internal
group-policy ciscovpngroup attributes
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split
username erik password bAOzGWYacphcB8ZW encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
address-pool xpclientpool
authentication-server-group ldap_web_vpn
default-group-policy DefaultRAGroup
tunnel-group DefaultRAGroup ipsec-attributes
pre-shared-key *
tunnel-group DefaultRAGroup ppp-attributes
authentication pap
tunnel-group DefaultWEBVPNGroup general-attributes
address-pool webvpnpool
authentication-server-group ldap_web_vpn
tunnel-group DefaultWEBVPNGroup ipsec-attributes
pre-shared-key *
tunnel-group ciscovpngroup type remote-access
tunnel-group ciscovpngroup general-attributes
address-pool ciscoclientpool
authentication-server-group ldap_web_vpn
default-group-policy ciscovpngroup
tunnel-group ciscovpngroup ipsec-attributes
pre-shared-key *
prompt hostname context
Cryptochecksum:beaf7b7abe76c47025fa16f339d7ed96
: end
asdm image disk0:/asdm-602.bin
no asdm history enable
 
I believe split tunneling is not available for l2tp vpns on the ASA. You will need to use the Cisco vpn client.


Brent
Systems Engineer / Consultant
CCNP, CCSP
 
Hey, yes thats true but i have had contact with cisco about this issue for another ASA and the tek was able to fix it.
i have the config for that asa to but cant seem to figure out whats different.
Posting that working config.

: Saved
:
ASA Version 8.0(2)
!
hostname ASA-5520
domain-name *
enable password Lh0y4BBu7US72E64 encrypted
names
dns-guard
!
interface GigabitEthernet0/0
nameif Outside
security-level 0
ip address outside ip 255.255.255.252
ospf cost 10
!
interface GigabitEthernet0/1
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
nameif Inside
security-level 100
ip address 192.168.0.10 255.255.255.0
ospf cost 10
!
interface Management0/0
nameif management
security-level 100
ip address 192.168.1.1 255.255.255.0
ospf cost 10
management-only
!
passwd 2KFQnbNIdI.2KYOU encrypted
boot system disk0:/asa802-k8.bin
boot system disk0:/asa723-k8.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns server-group DefaultDNS
domain-name *
same-security-traffic permit intra-interface
access-list Inside_nat0_outbound extended permit ip any 10.10.10.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip any 10.10.10.0 255.255.255.128
access-list Inside_nat0_outbound extended permit ip any 10.20.20.0 255.255.255.0
access-list Inside_nat0_outbound extended permit ip any 10.30.30.0 255.255.255.0
access-list Outside_access_in extended permit udp any any
access-list Outside_access_in extended permit udp any host outside ip eq 1701
access-list Outside_access_in extended permit tcp any host outside ip eq smtp
access-list Outside_access_in extended permit tcp any host outside ip eq https
access-list Outside_access_in extended permit tcp any host outside ip eq www
access-list Outside_access_in extended permit tcp any host outside ip eq pop3
access-list Outside_access_in extended permit tcp any host outside ip eq 3389
access-list Outside_access_in extended permit icmp any any echo-reply
access-list Outside_access_in extended permit icmp any any source-quench
access-list Outside_access_in extended permit icmp any any unreachable
access-list Outside_access_in extended permit icmp any any time-exceeded
access-list outside_access_in extended permit udp any host outside ip eq 1701
access-list outside_access_in extended permit udp any host outside ip eq 4500
access-list outside_access_in extended permit tcp any host outside ip eq pptp
access-list outside_access_in extended permit udp any host outside ip eq isakmp
access-list split standard permit 192.168.0.0 255.255.255.0
pager lines 20
logging enable
logging monitor debugging
logging asdm debugging
mtu Outside 1500
mtu Inside 1500
mtu management 1500
ip local pool client-pool 10.10.10.1-10.10.10.99 mask 255.255.255.0
ip local pool xpclientpool 10.30.30.1-10.30.30.245 mask 255.255.255.0
ip local pool webvpnpool 10.0.0.1-10.0.0.245 mask 255.255.255.0
ip local pool ciscoclientpool 10.20.20.1-10.20.20.245 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-602.bin
no asdm history enable
arp timeout 14400
global (Outside) 1 interface
nat (Outside) 1 10.10.10.0 255.255.255.0
nat (Outside) 1 10.20.20.0 255.255.255.0
nat (Outside) 1 10.30.30.0 255.255.255.0
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 1 0.0.0.0 0.0.0.0
static (Inside,Outside) tcp outside ip smtp 192.168.0.3 smtp netmask 255.255.255.255
static (Inside,Outside) tcp outside ip https 192.168.0.3 https netmask 255.255.255.255
static (Inside,Outside) tcp outside ip 255.255.255.255
static (Inside,Outside) tcp outside ip pop3 192.168.0.3 pop3 netmask 255.255.255.255
static (Inside,Outside) tcp interface 3389 192.168.0.3 3389 netmask 255.255.255.255
access-group Outside_access_in in interface Outside
route Outside 0.0.0.0 0.0.0.0 GW 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
aaa-server ldap_web_Vpn protocol ldap
aaa-server ldap_web_Vpn host 192.168.0.4
ldap-base-dn ou=Web VPN Users, ou=*, dc=*, dc=local
ldap-scope onelevel
ldap-naming-attribute sAMAccountName
ldap-login-password *
ldap-login-dn cn=administrator, cn=users, dc=*, dc=local
server-type microsoft
aaa authentication telnet console LOCAL
http server enable
http 192.168.0.0 255.255.255.0 Inside
http 192.168.1.0 255.255.255.0 management
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac
crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport
crypto dynamic-map Outside_dyn_map 10 set transform-set TRANS_ESP_3DES_SHA ESP-3DES-SHA
crypto map Outside_map 65535 ipsec-isakmp dynamic Outside_dyn_map
crypto map Outside_map interface Outside
crypto isakmp identity address
crypto isakmp enable Outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 11
authentication pre-share
encryption 3des
hash md5
group 2
lifetime 86400
telnet 0.0.0.0 0.0.0.0 Inside
telnet timeout 60
ssh 0.0.0.0 0.0.0.0 Inside
ssh timeout 5
console timeout 0
management-access Inside
dhcpd dns 195.58.112.157 195.58.103.21 interface Inside
!
dhcpd address 192.168.1.2-192.168.1.254 management
dhcpd enable management
!
vpn load-balancing
interface lbpublic Inside
interface lbprivate Inside
threat-detection basic-threat
threat-detection statistics access-list
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns migrated_dns_map_1
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns migrated_dns_map_1
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!
service-policy global_policy global
webvpn
enable Outside
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
vpn-tunnel-protocol IPSec l2tp-ipsec
group-policy webvpngroup internal
group-policy webvpngroup attributes
dns-server value 192.168.0.4
vpn-access-hours none
vpn-simultaneous-logins 3
vpn-idle-timeout 30
vpn-session-timeout none
vpn-filter none
vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
split-tunnel-policy tunnelall
split-tunnel-network-list none
split-dns none
intercept-dhcp disable
vlan none
nac-settings none
group-policy DfltGrpPolicy attributes
dns-server value 192.168.0.4
vpn-simultaneous-logins 2
vpn-tunnel-protocol webvpn
password-storage enable
ip-comp enable
re-xauth enable
pfs enable
ipsec-udp enable
webvpn
url-list value Gemensam
group-policy xpvpngroup internal
group-policy xpvpngroup attributes
vpn-tunnel-protocol IPSec l2tp-ipsec
group-policy ciscovpngroup internal
group-policy ciscovpngroup attributes
vpn-tunnel-protocol IPSec l2tp-ipsec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split
username test password DLaUiAX3l78qgoB5c7iVNw== nt-encrypted
username test attributes
vpn-group-policy DefaultRAGroup
vpn-tunnel-protocol IPSec l2tp-ipsec
username erik password bAOzGWYacphcB8ZW encrypted privilege 15
username erik attributes
vpn-group-policy DfltGrpPolicy
username cisco password 3USUcOPFUiMCO4Jk encrypted
tunnel-group DefaultRAGroup general-attributes
address-pool xpclientpool
default-group-policy DefaultRAGroup
tunnel-group DefaultRAGroup ipsec-attributes
pre-shared-key *
tunnel-group DefaultRAGroup ppp-attributes
authentication pap
authentication ms-chap-v2
tunnel-group DefaultWEBVPNGroup general-attributes
address-pool client-pool
authentication-server-group ldap_web_Vpn
tunnel-group DefaultWEBVPNGroup webvpn-attributes
nbns-server 192.168.0.4 master timeout 2 retry 2
tunnel-group DefaultWEBVPNGroup ipsec-attributes
pre-shared-key *
tunnel-group DefaultWEBVPNGroup ppp-attributes
authentication ms-chap-v2
tunnel-group webvpngroup type remote-access
tunnel-group webvpngroup general-attributes
address-pool webvpnpool
authentication-server-group ldap_web_Vpn
default-group-policy webvpngroup
tunnel-group webvpngroup ipsec-attributes
pre-shared-key *
tunnel-group webvpngroup ppp-attributes
authentication ms-chap-v2
tunnel-group ciscovpngroup type remote-access
tunnel-group ciscovpngroup general-attributes
address-pool ciscoclientpool
authentication-server-group ldap_web_Vpn
default-group-policy ciscovpngroup
tunnel-group ciscovpngroup ipsec-attributes
pre-shared-key *
tunnel-group xpvpngroup type remote-access
tunnel-group xpvpngroup general-attributes
address-pool xpclientpool
authentication-server-group ldap_web_Vpn
default-group-policy xpvpngroup
tunnel-group xpvpngroup ipsec-attributes
pre-shared-key *
tunnel-group xpvpngroup ppp-attributes
authentication pap
authentication ms-chap-v2
tunnel-group-map default-group DefaultWEBVPNGroup
smtp-server 192.168.0.3
prompt hostname context
Cryptochecksum:633c90a818b105ec4b62b2c9decac8ad
: end
asdm image disk0:/asdm-602.bin
asdm location 192.168.0.3 255.255.255.255 Inside
no asdm history enable
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top