@home i`f installed a Cisco asa 5505 because the provider has the cable modem in transparant mode. So i have the public IP address at my firewall.
Also for training because we have asa`s at work. So i have more feeling with it.
but sometimes i need to build a VPN session to a server at work. But i`m not getting a connection to the server. If i remove the ASA 5505 then the connection to the work server is great. But if de ASA 5505 is back on its place . it is not allowing VPN session to the outside world.
Could someone point me in the right direction?
It is possible to build a VPN connection from outside to the Cisco ASA5505.
I`m looking into the document you gave me. Because i did not understand the reason that the PPTP connection could not be established. I was thinking all the time :-).
I was thinking that the "statefull" function should be kicking in here. because i was setting up the VPN from inside the network. So the connection should return with no problem right!!!?
In the document i found this:
Because the PPTP connection is initiated as TCP on one port and the response is GRE protocol, the PIX Adaptive Security Algorithm (ASA) does not know that the traffic flows are related. As a result, it is necessary to configure ACLs to allow the return traffic into the PIX
Now i understand that it initiate the VPN via TCP session. But the return traffic from the server is a differed protocol (GRE) and therfore the stafull function is not working and the session is block.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...