I've got a small network with a Cisco 2610 router at our Internet connection point (T-1) configured with the IOS Firewall software. I am using simple access lists to allow outside traffic in as well as inside traffic out. I deny all outside traffic (incoming on serial port list) except the www, smtp, &tc. that's necessary.
The issue I have is when it comes to software VPN clients that are on some of our workstations for customer support. We're using SonicWall VPN client, Nortel Contivity VPN client, and the Microsoft PPTP client.
I know I have to add entries to the incoming serial list for the Nortel and SonicWall clients in order to get traffic through. Does anyone have links or info as to what exact protocols and ports are needed?
I know this is a simple question, but I'm rather new at delving into access lists like this and want to get it right. Thanks in advance.
IKE uses UDP port 500. The IPSec ESP and AH protocols use protocol numbers 50 and 51. Ensure that your access lists are configured so that protocol 50, 51, and UDP port 500 traffic is not blocked at interfaces used by IPSec. In some cases you might need to add a statement to your access lists to explicitly permit this traffic.
Allow AH = IP protoocol ID 51 (0x33)
Allow ESP = IP protocol ID 50 (0x32)
If you want to allow PPTP tunnel is allow tcp port 1723
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :