cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1925
Views
0
Helpful
7
Replies

UC540 and VPN - port forward not working

johnconrick
Level 1
Level 1

I have a UC540 as the router and a SBS 08 domain behind it which handles DHCP and VPN.  The problem I am having is even though I have opened the VPN ports for VPN in the UC540 to forward to the server, it is not connecting.  If I start a connection inside the LAN - it works fine everytime.  Is there something special I need to do with the 540 to properly forward 1723 to a VPN host on its data VLAN?

all my other rules are working fine:

!
interface FastEthernet0/0
description $FW_OUTSIDE$
ip address x.x.x.x 255.255.255.240
ip access-group 104 in
ip nat outside
ip inspect SDM_LOW out
ip virtual-reassembly
load-interval 30
duplex auto
speed auto
!
ip http server
ip http authentication local
ip http secure-server
ip http path flash:/gui
ip dns server
ip nat inside source list 1 interface FastEthernet0/0 overload
ip nat inside source static tcp 192.168.10.254 80 interface FastEthernet0/0 80
ip nat inside source static tcp 192.168.10.254 443 interface FastEthernet0/0 443
ip nat inside source static tcp 192.168.10.254 25 interface FastEthernet0/0 25
ip nat inside source static tcp 192.168.10.254 997 interface FastEthernet0/0 997
ip nat inside source static tcp 192.168.10.254 1723 interface FastEthernet0/0 1723
ip nat inside source static udp 192.168.10.254 500 interface FastEthernet0/0 500
ip nat inside source static udp 192.168.10.254 43 interface FastEthernet0/0 43
ip route 0.0.0.0 0.0.0.0 x.x.x.x
ip route 10.1.10.1 255.255.255.255 Integrated-Service-Engine0/0
!

7 Replies 7

johnconrick
Level 1
Level 1

#
access-list 104 remark SDM_ACL Category=1
access-list 104 permit udp any host x.x.x.x eq 43 log
access-list 104 permit udp any host x.x.x.x eq isakmp log
access-list 104 permit tcp any host x.x.x.x eq 1723 log
access-list 104 permit tcp any host x.x.x.x eq 997 log
access-list 104 permit tcp any host x.x.x.x eq smtp log
access-list 104 permit tcp any host x.x.x.x eq 443 log
access-list 104 permit tcp any host x.x.x.x eq www log
access-list 104 permit udp any host x.x.x.x eq non500-isakmp
access-list 104 permit esp any host x.x.x.x
access-list 104 permit ahp any host x.x.x.x
access-list 104 deny   ip 10.1.10.0 0.0.0.3 any
access-list 104 deny   ip 192.168.10.0 0.0.0.255 any
access-list 104 deny   ip 10.1.1.0 0.0.0.255 any
access-list 104 permit udp any eq bootps any eq bootpc
access-list 104 permit icmp any any echo-reply
access-list 104 permit icmp any any time-exceeded
access-list 104 permit icmp any any unreachable
access-list 104 deny   ip 10.0.0.0 0.255.255.255 any
access-list 104 deny   ip 172.16.0.0 0.15.255.255 any
access-list 104 deny   ip 192.168.0.0 0.0.255.255 any
access-list 104 deny   ip 127.0.0.0 0.255.255.255 any
access-list 104 deny   ip host 255.255.255.255 any
access-list 104 deny   ip any any

What are the logs showing you? And what's you ACL 1 set to

dprzywara
Level 4
Level 4

Try adding a NAT statement to forward NAT'd isakmp port 4500:

ip nat inside source static udp 192.168.10.254 4500 interface  FastEthernet0/0 4500.

Also, are the clients using microsoft VPN clients?  If so, you might need to also forward the GRE protocol to your inside SBS.

johnconrick
Level 1
Level 1

How do I open GRE from the UC540 to 192.168.10.254?

What logs should I enable to troubleshoot this issue?

When I turn on term mon and then try to connect I get this:

UC540#term mon

UC540#

013851: Mar 15 23:09:22.388: %SEC-6-IPACCESSLOGP: list 104 permitted tcp (MY OUTSIDE IP)(54650) -> (MY INSIDE WAN IP)(443), 1 packet

013852: Mar 15 23:09:40.416: %SEC-6-IPACCESSLOGP: list 104 permitted udp (MY OUTSIDE IP)(500) -> (MY INSIDE WAN IP)(500), 3 packets

013853: Mar 15 23:10:40.416: %SEC-6-IPACCESSLOGP: list 104 permitted udp (MY OUTSIDE IP)(1701) -> (MY INSIDE WAN IP)(1701), 5 packets

but connection still fails.  Inside the LAN it works fine.

To open up GRE try adding this statement:

access-list 104 permit gre any any

Make sure it's not at the bottom of your access-list below the deny any any statement or it won't be applied.

Also, have a VPN client try and connect then do a sh access-list command to see what rules are being matched.

Thank you that was it, once I added the GRE statement to 104 its working fine.