I am just CCNA, i have a project to configure site to site and remote access vpn on cisco 3000 routers and pix firewalls.. but the problem is only main site has the static ip while other sites have dynamic ips.
Am trying to do a dynamic configuration of a 3900 series router (3925 to be precise).For the software and licenses, under the IOS technology Package Licenses, what's the significant of SL-39-DATA-K9 and SL-39-SECNPE-K9? Are they really necessary for the router?
I'm having some issues configuring NAT statements on my ASA5505 which has recently been upgraded to 8.41.
I have a single dynamic IP on the outside interface of the ASA and would like all internal hosts to NAT/PAT to it. In addition, I would like to have several ports 'forwarded' to internal hosts, one of which is TCP/4343. With the current configuration all hosts are NATing to the external interface properly but the service running on TCP/4343 is not accessible from the outside. See command output below:
"sh run object" output: object network DrJones host 10.81.220.90object network LAN-10.81.220.0 subnet 10.81.220.0 255.255.255.0 "sh run nat" output: object network DrJones nat (inside,outside) static interface service tcp 4343 4343object network LAN-10.81.220.0 nat (inside,outside) dynamic interface "sh run access-list" output: access-list inside_access_in extended permit ip 10.81.220.0 255.255.255.0 anyaccess-list outside_access_in extended permit icmp any any echo-replyaccess-list outside_access_in extended permit tcp any interface outside eq 4343
I found this reference DCNM-L-NXACCK9 in the configuration generated by a dynamic Tools for a nexus bundle N5K-C5548UP-B-S32. This reference is not reflected in the price list. Has it been replaced? no datasheet on Cisco portal.
I have connected a 10BaseT device to a CISCO Catalyst 3560xPOE switch with dynamic port security. All seems to work fine when the distance between the two devices is closer then 200ft. When I connect to 10BaseT devices farther out near 300ft the response from the attached device is lost. It works ok on unmanaged switches at the longer distance. Is there a minimum response time from attached devices for dynamic port security to work properly? Is there any other explanation why it would work on cheaper switches, but not on the Port Secured Switch?
I'm not finding where set the snmp community on VPN 3000. I need read flow date on Ethernet interfaces. but I'm able only get traps from VPN 3000 to a system snmp but I don't get read from snmp community to VPN 3000.
where and how to I can configuration the snmp community on VPN 3000.
I have been trying to setup a LAN-to-LAN VPN between two sites that are using a 3000 series CISCO Concentrator. After following the basic setups from the CISCO site, I am still unable to create a tunnel. At the moment I'm starting to believe it is how I have physically setup the network. Site 1 is using a Billion BiPAC 7404VNPX ADSL2+ Modem, Site 2 is using a Netgear DGN2000 ADSL2+ Modem, The VPN Concentrators are setup behind these devices with each firewall setup to allow the needed ports forwarded.
in my company we use Cisco VPN 3020.Actually users connect using CiscoVPN Client, and all traffic is routed into the VPN so that users gets a remote IP Address of the remote public LAN.The problem is that when using VPN users cannot acces anymore their local LAN at home.How can i allow users local LAN access ?All traffic is sent into the VPN also traffic for local LAN.
Our VPN 3000 concentrator's admin password was changed by somebody so i reset the password by using straight through serial cable, now the problem is it allows me to login with admin through console but not through admin web interface or telnet. I have enabled telnet and http access but still no success. Concentrator is using internal database so no AAA server is configured.
I'd need to protect access to a very critical web site on my LAN.To achieve this I have been thinking to use a cisco ASA, because Cisco VPN3000 appliances are out of market now. But i do not know if I can achieve what I'd wish to do.I need (upon authentication) that an user connection to port 443 is forwarded to port 443 (or another TCP port)to my internal LAN where is the critical web site.So basically I need a feature like the WebVPN functionality of the Cisco VPN 3000 serires where you can logon.using web interface and you are forwarded to specific TCP port or you jsut type the web site where you want to go after authentication. For maximum compatibility (because users can be anywhere in the world and IPSEC or PPTP can be filtered) I'd need to do this with an SSL port forwarding.Is it possible to do this with the SSL VPN configuration options of the Cisco ASA ? Is it possible then to authorize users using LDAP group matching and authenticate users using kerberos 5 ?
I have a client who saw there was a android version of the AnyConnect client and want me to go through and get their VPN 3000 Concentrator confingured to be able to connect in with it.
The Conncentrator is currently setup several groups of users and the base group is set up to all other products to connec tin via a pre shared key. It took alot research to get it configured to this point and all the searches i pull up are for a ASA.
I have a VPN Concentrator 3000 with LAN-to-LAN DES-56 connections connected to it (Cisco PIX 506). Everything was working fine and then over the night something messed up on it. No settings were changed or anything.
First issue was anything using DHCP (getting IPs from the sites local PIX) couldn't be pinged or reach out through the Concentrator. It was only Thin Clients that didn't work. I could still ping the PIX, printers and desktop computers that were static set IPs. But this was happening at every site going through this Concentrator. The sites going through out MPLS network are fine.
I tried setting the Thin Clients to a static IP but still couldn't ping them.
I then decided to reboot the Concentrator, when it came back up all sites reconnected back to the Concentrator but now couldn't ping anything at the sites, not even the LAN IP of the PIX (or printers and desktops now). I power cycled a few of the sites PIXs but they still were not pingable even though the Concentrator showed they were connected.
I then decided to physical power cycle the Concentrator, it's back up and all sites are connected but none of the devices on the LAN side are reachable.
The Concentrator can ping the sites WAN IP but nothing on the LAN side going through and out the Concentrator. It can ping the LAN through the private interface (going back towards my LAN) just not going through the public interface (over the WAN).
The sessions show that Bytes are Rxing but no Bytes are Txing.
I have 3000 concentrator in 192.168.1.x/24 network (concentrator has static IP of 192.168.1.4/24 assigned to its private int). I can manage it thru HTTP from any PC in the same subnet, but connection failes while trying to connect from PC on different subnet (i.e. 10.1.1.x/24). Is there ACL in concentrator config which needs to be modified to allow management from different subnet?
Our enterprise uses a VPN Concentrator 3000 for our VPN access. Is there a way to view a log history of what user connected to VPN and what IP address they were assigned? It would be for 2 days ago which was over the weekend.
We have a VPN 3000 that we use to connect. We are recieving reports that some of the users are connected but after a set period of time they are disconnected. Is there any changes that I could look at in the VPN 3000 that could point me in the right direction.
I have a Cisco IE-3000-8TC running 15.0(2) EY1 IES-IPSERVICESK9-M. I am trying to configure the switch to auto configuration (download only the configuration file and not the software image) via DHCP from a combination DHCP/TFTP server. When I configure the switch with the commands (on initial configuration): Code...
I've the following scenario VPN Concentrator is connected to a router which is connected to a router and at the edge Cisco 515E PIX is connected to the internet. The problem is that the normal VPN Dial-up connection (a utility of windows) are getting connected but Cisco VPN Client throws error 412. Here's what I've tried (Initially groups and user were created):
(1) Allowed port 10000 on PIX ( access-list from-outside-coming-in permit tcp any host <public ip> eq 10000) and checked IPSec over UDP on VPN Conc. under Mode Config tab. Also checked IPSec over TCP tab under tunneling panel at port 10000. Tried connecting through VPN Client but it threw error 412 (2) In the reference guide, I read that IPSec over NAT is allowed on ports ranging from 4000 something to 40000 something.
I tried 33333, both on PIX and VPN Conc. under Mode Config tab but still no use. Same error 412.
Problem about authentication in VPN 3000 but until now I haven't had return on neither of the post maybe those I'm more clear than others.
I have a VPN 3000 with PPTP Tunnel VPN and the first authentication option is on Server Radius:
Configuration > System > Server > Authentication is firstly the Server Radius and after Internal ( Authentication on Base Group Internal )
But, when I configure a user in User Management > User it isn't work. I think that authentication order is firstly Radius and if it don't find the second option is processed which ( this case ) is Internal server. but don't occour the error in log is:
I have an old VPN 3000 Concentrator that I do not have any idea what is running on it. The previous network admin didn't leave a password for it, so I tried to reset the password. I was successful in doing so, but when I try to access it with the default of admin/admin via web browser, I still cannot access it. I am loathe to remove or power off this device without knowing what is on it.
We have two 3000 vpn concentrators. Under both of their load balancing fields, Configuration - Load balancing , the checkbox for loadbalancing is enabled.However both have different priorities, one with 10 and other with 1. Does this mean both are actually loadbalancing. What does the priorities indicate here?If we replace the concentrators with ASA , how will this load balancing need to be configured on ASA & how will it work.
I manage a VPN 300 concentrator which has been happily working for several years without any problems. All users are part of the same group and authenticate to an RSA server. We recently moved from RSA authentication manager 6.1 to RSA authentication manager 7.1. Everthing continued working fine for several weeks, then at the beginning of this week we started getting users intermittently failing to connect to the VPN. I'm not sure if this problem relates to our new RSA server, but we have other network devices which authenticate to it with no problem so I guess the problem is with the VPN concentrator itself.
When users fail they just get a generic "Reason 427 connection terminated by peer" error message. The live event log shows "group = vpn, status = Not-in-service" when their connection fails. Other times they connect normally and no error messages are displayed. There seems to be no real pattern, sometimes your connection fails but if you keep trying you will eventually get in [however it can take many attempts over an hour or two before you succeed, or you may get in straight away with no problem].
I dont believe its a network problem, as I have run continuous pings to the concentrator and the RSA server whilst users are experiencing these problems and there are no drops.
The RSA servers authentication monitor always shows that the user has successfully authenticated, whether the users connection actually succeeds or not. I am tempted to just reboot the concentrator, but we have site-to-site VPN tunnels connected off it and I'm a little concerned that if it is faulty it may not come back up at all.
We have to setup an IPSEC tunnel for a client that does not what to exchange private IP address information for security and overlapping address space reasons. We will both be natting our source private ip address space as public IP address space and send those packets through the established tunnel. Im using a Cisco 3000 concentrator.
For access by external users on our network use all Cisco VPN Client, we have a VPN3000 Concentrator and a Cisco ACS 2.6 for authentication.We wanted to upgrade to the latest release of ACS 4, x .... you can set a password expiration for VPN Client? Or make sure that the remote user can change password?
We recently had a Port Scan done on our external IP Addresses. One of those IP Addresses scanned was our Concentrator 3000. The report came back with the following TCP ports being open on the Concentrator 3000 - 80, 443, 1723, 10000, 10001, 10002, 10003, 10004, and 10009. I am unsure if it is necessary to have any or all of these open. The Concentrator 3000 is in front of our ASA5520.
Is it possible to establish a tunnel (LAN-to-LAN) from a VPN 3000 series Concentrator with a static IP address to another VPN 3000 series concentrator (or an IOS router) with a dynamic IP address.
Phase1 is complete, Phase2 isn't coming up...everything has been verified on both sides but we're getting unknown errors.
Aug 17 11:33:15.609 CDT: ISAKMP (0:2): Old State = IKE_QM_READY New State = IKE_QM_I_QM1 Aug 17 11:33:15.609 CDT: ISAKMP (0:2): Input = IKE_MESG_INTERNAL,
is it possible to use cisco AnyConnect client to connect users with Cisco VPN 3000 appliance?If so how to configure VPN 3000 concentrator to work with AnyConnect?
I'm trying to spec out some switches in our industrial environment. I only have single mode fibre to deal with. I'm curious if a IEM-3000-8FM module will connect to a 100LX SFP using a single mode fibre. I know the IEM-3000-8FM module is 100FX for multi-mode fibre. I know they both use 1310nm wave length but i'm not sure if they will work together?