Some "off-the-cuff" comments.
1) I don't know all the ports that you should have open.
2) In ACL 124 you are permitting gre to your Ethernet interface address -
which in turn is NATed by port to several inside hosts. You are not being
specific enough about which box is the vpn server. Can you allocate a single
outside address to the W2K vpn box?
3) Not sure if you need to permit gre on ACL 135.
4) It's great if you can replicate this in a lab. Then you can create a
simple case without ACLs and CBAC. Prove that it works. Then start to add
security. Your choice whether or not you want to do this with a production
network.
5) Best not to post real ip addresses. Hope that you have strong passwords
on your PC Anywhere Clients.

> -----Original Message-----
> From: Steve Collins [mailto:[EMAIL PROTECTED]
> Sent: Thursday, May 29, 2003 11:47 AM
> To: [EMAIL PROTECTED]
> Subject: Windows VPN through Cisco 2611 HELP!!! [7:69788]
> 
> 
> I am having trouble tring to connect to our corp lan.  I have 
> a windows 2000
> vpn server and have verified that it works internally.  The 
> problem I face
> is setup on the cisco 2611.  How do allow gre port 47 to pass 
> through the
> router.  I believe this is the issue.  The Cisco IOS Release 
> is 12.1(5)T9. 
> When I try to connect from the outside world I get an error 
> message of:
> Error 721: The remote computer is not responding.  This is 
> after it checks
> the password.  Any help would be much appreciated.  Thanks
> 
> Here is my current configuration.
> 
> Current configuration : 6236 bytes
> !
> version 12.1
> no service single-slot-reload-enable
> service timestamps debug uptime
> service timestamps log uptime
> service password-encryption
> !
> hostname sea-r0
> !
> logging rate-limit console 10 except errors
> enable secret XXXXXXXXXXXXXXXXXXXXXXX
> !
> memory-size iomem 15
> ip subnet-zero
> !
> !
> no ip finger
> ip domain-name Company.com
> !
> ip inspect name x5fw ftp timeout 3600
> ip inspect name x5fw http timeout 3600
> ip inspect name x5fw realaudio timeout 3600
> ip inspect name x5fw smtp timeout 3600
> ip inspect name x5fw udp timeout 3600
> ip inspect name x5fw tcp timeout 3600
> ip audit notify log
> ip audit po max-events 100
> !
> !
> !
> interface Ethernet0/0
>  ip address 216.100.100.130 255.255.255.0
>  ip access-group 124 in
>  ip nat outside
>  full-duplex
> !
> interface Serial0/0
>  ip address 192.168.10.1 255.255.255.252
>  ip nat inside
>  ip inspect x5fw in
> !
> interface Ethernet0/1
>  description Company LAN
>  ip address 192.168.1.254 255.255.255.0
>  ip access-group 135 in
>  ip nat inside
>  ip inspect x5fw in
>  full-duplex
> !
> interface Serial0/1
>  no ip address
>  shutdown
> !
> ip nat pool overld 216.100.100.130 216.100.100.130 prefix-length 24
> ip nat inside source list 5 pool overld overload
> ip nat inside source static udp 192.168.4.127 5632 interface 
> Ethernet0/0 5640
> ip nat inside source static tcp 192.168.1.180 1723 interface 
> Ethernet0/0 1723
> ip nat inside source static tcp 192.168.1.180 47 interface 
> Ethernet0/0 47
> ip nat inside source static tcp 192.168.4.127 5631 interface 
> Ethernet0/0 5639
> ip nat inside source static udp 192.168.4.126 5632 interface 
> Ethernet0/0 5638
> ip nat inside source static tcp 192.168.4.126 5631 interface 
> Ethernet0/0 5637
> ip nat inside source static udp 192.168.4.125 5632 interface 
> Ethernet0/0 5636
> ip nat inside source static tcp 192.168.4.125 5631 interface 
> Ethernet0/0 5635
> ip nat inside source static tcp 192.168.1.36 3389 interface 
> Ethernet0/0 3389
> ip nat inside source static tcp 192.168.1.171 25 interface 
> Ethernet0/0 25
> ip nat inside source static tcp 192.168.1.171 80 interface 
> Ethernet0/0 80
> ip nat inside source static tcp 192.168.1.171 443 interface 
> Ethernet0/0 443
> ip nat inside source static tcp 192.168.1.150 5631 interface 
> Ethernet0/0 5631
> ip nat inside source static udp 192.168.1.150 5632 interface 
> Ethernet0/0 5632
> ip nat inside source static tcp 192.168.1.125 5631 interface 
> Ethernet0/0 5633
> ip nat inside source static udp 192.168.1.125 5632 interface 
> Ethernet0/0 5634
> ip nat inside source static 192.168.1.36 216.100.100.133
> ip nat inside source static 192.168.1.200 216.100.100.131
> ip nat inside source static 192.168.1.202 216.100.100.132
> ip classless
> ip route 0.0.0.0 0.0.0.0 216.100.100.129
> ip route 192.168.4.0 255.255.255.0 Serial0/0
> no ip http server
> !
> access-list 5 permit 192.168.1.0 0.0.0.255
> access-list 5 permit 192.168.4.0 0.0.0.255
> access-list 5 permit 192.168.10.0 0.0.0.255
> access-list 124 permit tcp any host 216.100.100.130 eq telnet
> access-list 124 permit tcp any host 216.100.100.130 eq 24
> access-list 124 permit tcp any host 216.100.100.130 eq 1723
> access-list 124 permit tcp any host 216.100.100.130 eq www
> access-list 124 permit tcp any host 216.100.100.130 eq 443
> access-list 124 permit tcp any host 216.100.100.130 eq 5000
> access-list 124 permit tcp any host 216.100.100.130 eq smtp
> access-list 124 permit tcp any host 216.100.100.130 eq 5631
> access-list 124 permit udp any host 216.100.100.130 eq 5632
> access-list 124 permit tcp any host 216.100.100.130 eq 5633
> access-list 124 permit udp any host 216.100.100.130 eq 5634
> access-list 124 permit tcp any host 216.100.100.130 eq 5635
> access-list 124 permit udp any host 216.100.100.130 eq 5636
> access-list 124 permit tcp any host 216.100.100.130 eq 5637
> access-list 124 permit udp any host 216.100.100.130 eq 5638
> access-list 124 permit tcp any host 216.100.100.130 eq 5639
> access-list 124 permit udp any host 216.100.100.130 eq 5640
> access-list 124 permit tcp any host 216.100.100.130 eq 3389
> access-list 124 permit icmp any host 216.100.100.130
> access-list 124 permit tcp any host 216.100.100.131 eq ftp
> access-list 124 permit tcp any host 216.100.100.131 eq telnet
> access-list 124 permit tcp any host 216.100.100.131 eq www
> access-list 124 permit tcp any host 216.100.100.131 eq smtp
> access-list 124 permit tcp any host 216.100.100.131 eq 443
> access-list 124 permit tcp any host 216.100.100.131 eq 389
> access-list 124 permit tcp any host 216.100.100.131 eq 8000
> access-list 124 permit tcp any host 216.100.100.131 eq 3389
> access-list 124 permit tcp any host 216.100.100.132 eq ftp
> access-list 124 permit tcp any host 216.100.100.132 eq telnet
> access-list 124 permit tcp any host 216.100.100.132 eq www
> access-list 124 permit tcp any host 216.100.100.132 eq smtp
> access-list 124 permit tcp any host 216.100.100.132 eq 443
> access-list 124 permit tcp any host 216.100.100.132 eq 389
> access-list 124 permit tcp any host 216.100.100.132 eq 8000
> access-list 124 permit tcp any host 216.100.100.133 eq www
> access-list 124 permit tcp any host 216.100.100.133 eq 443
> access-list 124 permit tcp any host 216.100.100.133 eq 8080
> access-list 124 permit gre any host 216.100.100.130
> access-list 124 deny   ip any any
> access-list 135 permit tcp 192.168.1.0 0.0.0.255 any
> access-list 135 permit udp 192.168.1.0 0.0.0.255 any
> access-list 135 permit icmp 192.168.1.0 0.0.0.255 any
> access-list 135 deny   ip any any
> access-list 137 permit tcp 192.168.4.0 0.0.0.255 any
> access-list 137 permit udp 192.168.4.0 0.0.0.255 any
> access-list 137 permit icmp 192.168.4.0 0.0.0.255 any
> access-list 137 permit tcp 192.168.10.0 0.0.0.255 any
> access-list 137 permit udp 192.168.10.0 0.0.0.255 any
> access-list 137 permit icmp 192.168.10.0 0.0.0.255 any
> access-list 137 deny   ip any any
> access-list 155 permit ip 192.168.2.0 0.0.0.255 any
> access-list 157 permit icmp any any
> banner motd ^C
> WARNING: This is a company computer system with access restricted
>          to those with proper authorization. Authorized parties
>          are restricted to those functions which have been
>          assigned to perform work related duties. Any unauthorized
>          access attempt will be investigated and prosecuted to the
>          full extent of the law.
>          If you are not an authorized user, disconnect now.
> ^C
> !
> line con 0
>  transport input none
> line 33 64
> line aux 0
> line vty 0 4
>  password XXXXXXXXXXXXXXXXXXXXXXXXX
>  login
> !
> end




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=69818&t=69788
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to