Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Cisco Asa 5505 ppoe connectivity issue

Status
Not open for further replies.

billybluelight

Technical User
Mar 25, 2009
8
GB
Hi to all, I have configured my asa with a pppoe connection over an adsl modem, the connection works fine until the power goes off to the asa and the connection will not re-establish. The only cure I have found is to reset and reprogram and then the connection is then re-established until the power goes off again. Any help would be much appreciated. I'm guessing that I have missed a command or two but cannot find any more reference in my ASA guide. Here is a copy of the running conf,
hostname ciscoasa
domain-name *******
enable password ******** encrypted
passwd ******* encrypted
names

!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
pppoe client vpdn group *****
ip address ****** pppoe setroute
!
interface Vlan3
no forward interface Vlan1
nameif dmz
security-level 50
ip address 192.168.3.1 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
switchport access vlan 3
!
ftp mode passive
dns server-group DefaultDNS
domain-name *******
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group protocol TCPUDP
protocol-object udp
protocol-object tcp
object-group service a300 tcp-udp
description a300
port-object eq 1062
object-group service DM_INLINE_TCP_1 tcp
port-object eq https
port-object eq pptp
port-object eq smtp
object-group service rdp tcp-udp
description rdp
port-object eq 3389
object-group service rww tcp-udp
port-object eq 4125
object-group service sharepoint tcp-udp
description sharepoint
port-object eq 444
object-group service DM_INLINE_TCP_2 tcp
group-object rdp
group-object rww
group-object sharepoint
object-group service sharepoint1 tcp-udp
group-object sharepoint
access-list outside_access_in remark server access
access-list outside_access_in extended permit object-group TCPUDP any host Serve
rExternal eq www
access-list outside_access_in extended permit object-group TCPUDP any host OipEx
ternal eq www
access-list outside_access_in extended permit object-group TCPUDP any host A300e
xternal object-group a300
access-list outside_access_in extended permit tcp any host ServerExternal object
-group DM_INLINE_TCP_1
access-list outside_access_in extended permit tcp any host ServerExternal object
-group DM_INLINE_TCP_2
access-list inside_nat0_outbound extended permit ip any 192.168.1.0 255.255.255.
0
access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 19
2.168.1.0 255.255.255.0
access-list science1_splitTunnelAcl standard permit any
access-list science_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0
access-list science_splitTunnelAcl_1 standard permit 192.168.1.0 255.255.255.0
pager lines 24
logging enable
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
ip local pool vpn 192.168.1.100-192.168.1.150 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) ServerExternal Server netmask 255.255.255.255
static (inside,outside) OipExternal Oipserver netmask 255.255.255.255
static (inside,outside) A300external A300 netmask 255.255.255.255
static (outside,inside) Server ServerExternal netmask 255.255.255.255 tcp 2 2 ud
p 2
static (outside,inside) A300 A300external netmask 255.255.255.255
static (outside,inside) Oipserver OipExternal netmask 255.255.255.255
access-group outside_access_in in interface outside
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
http server enable
http 192.168.1.0 255.255.255.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set pfs group1
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 40 set pfs group1
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 60 set pfs group1
crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA
crypto dynamic-map outside_dyn_map 80 set pfs group1
crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 65535
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group Demon request dialout pppoe
vpdn group Demon localname 123@isp.co.uk
vpdn group Demon ppp authentication chap
vpdn username 123@isp.co.uk password ********* store-local
dhcpd auto_config outside
!

group-policy science internal
group-policy science attributes
wins-server value 192.168.1.49
dns-server value 192.168.1.49
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value science_splitTunnelAcl_1
default-domain value scienceandhealth.local
username 1234 password aJppLiC1HtoMLFJs encrypted privilege 0
username 1234 attributes
vpn-group-policy science
tunnel-group science type ipsec-ra
tunnel-group science general-attributes
address-pool vpn
default-group-policy science
tunnel-group science ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
!

: end
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top