How to setup L2TP VPN / IPSec on Cisco ASA5505 Security Appliance?
-
I tried to set up VPN for the outside interface users on a Cisco ASA5505 security appliance connecting to the inside interface. I understand that it should be a L2TP VPN for Windows user, but after I run the VPN setup wizard in ASDM, I still have no luck. The basic network environment is posted below. Could anyone give me some advice for how to set a working VPN on Cisco ASA5505? Thanks in advance. interface Vlan1 nameif inside security-level 100 ip address 192.168.1.1 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address xxx.yyy.zzz.218 255.255.255.252 ! interface Vlan3 nameif dmz security-level 50 ip address 10.30.30.1 255.255.255.0 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 switchport access vlan 3 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive dns server-group DefaultDNS domain-name http://example.com same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group protocol DM_INLINE_PROTOCOL_1 protocol-object icmp protocol-object icmp6 access-list 111 extended permit icmp any any access-list 111 extended permit ip any any access-list 111 extended permit tcp any any access-list 111 extended permit udp any any access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq www access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq https access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq ftp access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq ftp-data access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq 3389 access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq login access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 range 10000 10100 access-list out_to_dmz extended permit tcp any host xxx.yyy.zzz.218 eq nntp access-list out_to_dmz extended permit object-group DM_INLINE_PROTOCOL_1 any host xxx.yyy.zzz.218 access-list out_to_dmz extended permit udp any host xxx.yyy.zzz.218 eq isakmp access-list out_to_dmz extended permit udp any host xxx.yyy.zzz.218 eq 1701 access-list inside_nat0_outbound extended permit ip any 192.168.147.192 255.255.255.224 pager lines 24 logging asdm informational mtu inside 1500 mtu outside 1500 mtu dmz 1500 ip local pool clientVPNpool 192.168.147.225-192.168.147.250 mask 255.255.255.0 no failover monitor-interface inside monitor-interface outside monitor-interface dmz icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-524.bin no asdm history enable arp timeout 14400 nat-control global (outside) 1 interface global (dmz) 1 10.30.30.31-10.30.30.199 nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 static (dmz,outside) interface 10.30.30.30 netmask 255.255.255.255 access-group 111 in interface inside access-group out_to_dmz in interface outside access-group 111 in interface dmz route outside 0.0.0.0 0.0.0.0 xxx.yyy.zzz.217 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute dhcpd auto_config outside ! dhcpd address 192.168.1.50-192.168.1.100 inside dhcpd dns 8.8.8.8 8.8.4.4 interface inside dhcpd lease 36000 interface inside dhcpd ping_timeout 1000 interface inside dhcpd enable inside crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_AES_SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set TRANS_ESP_AES_SHA mode transport crypto ipsec transform-set TUNN_ESP_AES_SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set TUNN_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport crypto dynamic-map outside_dyn_map 20 set pfs group1 crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_SHA crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 1 lifetime 86400 crypto isakmp nat-traversal 30 webvpn port 444 enable inside enable outside enable dmz character-encoding unicode tunnel-group-list enable group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes dns-server value 8.8.8.8 8.8.4.4 vpn-tunnel-protocol l2tp-ipsec username user_name password 3Z+8X3Ab2bzIsEPD2VRoqg== nt-encrypted privilege 15 username user_name attributes vpn-tunnel-protocol l2tp-ipsec tunnel-group DefaultRAGroup general-attributes address-pool clientVPNpool authorization-server-group LOCAL default-group-policy DefaultRAGroup tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * tunnel-group DefaultRAGroup ppp-attributes authentication ms-chap-v2 ! ! privilege cmd level 3 mode exec command perfmon privilege cmd level 3 mode exec command ping privilege cmd level 3 mode exec command who privilege cmd level 3 mode exec command logging privilege cmd level 3 mode exec command failover privilege show level 5 mode exec command running-config privilege show level 3 mode exec command reload privilege show level 3 mode exec command mode privilege show level 3 mode exec command firewall privilege show level 3 mode exec command interface privilege show level 3 mode exec command clock privilege show level 3 mode exec command dns-hosts privilege show level 3 mode exec command access-list privilege show level 3 mode exec command logging privilege show level 3 mode exec command ip privilege show level 3 mode exec command failover privilege show level 3 mode exec command asdm privilege show level 3 mode exec command arp privilege show level 3 mode exec command route privilege show level 3 mode exec command ospf privilege show level 3 mode exec command aaa-server privilege show level 3 mode exec command aaa privilege show level 3 mode exec command crypto privilege show level 3 mode exec command vpn-sessiondb privilege show level 3 mode exec command ssh privilege show level 3 mode exec command dhcpd privilege show level 3 mode exec command vpn privilege show level 3 mode exec command blocks privilege show level 3 mode exec command uauth privilege show level 3 mode configure command interface privilege show level 3 mode configure command clock privilege show level 3 mode configure command access-list privilege show level 3 mode configure command logging privilege show level 3 mode configure command ip privilege show level 3 mode configure command failover privilege show level 5 mode configure command asdm privilege show level 3 mode configure command arp privilege show level 3 mode configure command route privilege show level 3 mode configure command aaa-server privilege show level 3 mode configure command aaa privilege show level 3 mode configure command crypto privilege show level 3 mode configure command ssh privilege show level 3 mode configure command dhcpd privilege show level 5 mode configure command privilege privilege clear level 3 mode exec command dns-hosts privilege clear level 3 mode exec command logging privilege clear level 3 mode exec command arp privilege clear level 3 mode exec command aaa-server privilege clear level 3 mode exec command crypto privilege cmd level 3 mode configure command failover privilege clear level 3 mode configure command logging privilege clear level 3 mode configure command arp privilege clear level 3 mode configure command crypto privilege clear level 3 mode configure command aaa-server prompt hostname context
-
Answer:
I don't think your entire firewall configuration made it in your post. Can you attach the configuration file? There should be several sections after your dhcpd commands, such as group-policy and tunnel-group which are directly related to the VPN. Also, while using the Windows VPN client is possible, using the AnyConnect or Cisco IPSec client is preferred. You can manage both clients much more easily than manually configuring the Windows VPN on each and every remote client.
Brandon Darling at Quora Visit the source
Related Q & A:
- How To Setup Your Own Proxy Server?Best solution by Server Fault
- How to setup an email account?Best solution by Yahoo! Answers
- How to setup and create my own website?Best solution by Quora
- How to setup email in Outlook?Best solution by Yahoo! Answers
- How to setup yahoo mail in outlook 2010?Best solution by Yahoo! Answers
Just Added Q & A:
- How many active mobile subscribers are there in China?Best solution by Quora
- How to find the right vacation?Best solution by bookit.com
- How To Make Your Own Primer?Best solution by thekrazycouponlady.com
- How do you get the domain & range?Best solution by ChaCha
- How do you open pop up blockers?Best solution by Yahoo! Answers
For every problem there is a solution! Proved by Solucija.
-
Got an issue and looking for advice?
-
Ask Solucija to search every corner of the Web for help.
-
Get workable solutions and helpful tips in a moment.
Just ask Solucija about an issue you face and immediately get a list of ready solutions, answers and tips from other Internet users. We always provide the most suitable and complete answer to your question at the top, along with a few good alternatives below.