Hello,
It seems I have this working fine but whats odd is when I log one user in I
can't immediately login to my other context as my other user.  I'm using the
local user dbase.  I have to clear cache in my browser and clear webvpn
session context all to get my other user to login.  I've seen this problems
inconsistently when using domains w/o aaa authentication domain as well.
 Anyone seen this before??..i'm running v15.1(1) T code.  I'm *assuming* the
creds are getting cached after I login to the first domain successfully.  Is
there way to auto clear webvpn cache?

REF:
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6657/prod_white_paper0900aecd80512065.html

This allows you to login as "admin" on the webvpn portal.  The "@admin"
string is passed on to aaa

username admin@admin priv 15 password 0 cisco
username temp@temp priv 15 password 0 cisco

webvpn gateway derek
 ip address 192.168.2.11 port 443
 ssl trustpoint TP-self-signed-1483162022
 logging enable
 inservice
 !
webvpn context test
 ssl authenticate verify all
 !
 url-list "admin"
   heading "ADMIN"
   url-text "ADMIN" url-value "http://11.11.11.11/admin";
 !
 !
 policy group test
   url-list "admin"
 default-group-policy test
 aaa authentication list ezvpn
 aaa authentication domain @admin
 gateway derek domain admin
 logging enable
 inservice
webvpn context test2
 ssl authenticate verify all
 !
 url-list "temp"
   heading "TEMP"
   url-text "temp" url-value "http://11.11.11.1/temp";
 !
 !
 policy group test2
   url-list "temp"
 default-group-policy test2
 aaa authentication list ezvpn
 aaa authentication domain @temp
 gateway derek domain temp
 logging enable
 inservice



On Tue, Oct 11, 2011 at 8:37 AM,
<[email protected]>wrote:

> Send CCIE_Security mailing list submissions to
>        [email protected]
>
> To subscribe or unsubscribe via the World Wide Web, visit
>        http://onlinestudylist.com/mailman/listinfo/ccie_security
> or, via email, send a message with subject or body 'help' to
>        [email protected]
>
> You can reach the person managing the list at
>        [email protected]
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of CCIE_Security digest..."
>
>
> Today's Topics:
>
>   1. Re: EZVPN Remote in IOS (Kingsley Charles)
>   2. Re: EzVPN and VTI (Hussain Arsalan Ali)
>   3. Re: EzVPN and VTI (Kingsley Charles)
>   4. Re: EZVPN Remote in IOS (Kingsley Charles)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Tue, 11 Oct 2011 15:05:11 +0530
> From: Kingsley Charles <[email protected]>
> To: yusef sheriff <[email protected]>
> Cc: OSL Security <[email protected]>
> Subject: Re: [OSL | CCIE_Security] EZVPN Remote in IOS
> Message-ID:
>        <cahs0b06q9r_u5xtj075hn3rz-r1aupqrrcgiistojk+pc_1...@mail.gmail.com
> >
> Content-Type: text/plain; charset="iso-8859-1"
>
> Have you configured split tunneling on the ASA?
>
>
> With regards
> Kings
>
> On Tue, Oct 11, 2011 at 12:45 PM, yusef sheriff <[email protected]>
> wrote:
>
> > Hi All,
> >
> > I have configured EZVPN server on ASA and remote clien is IOS router. VPN
> > is able connect without any issue. But in remote clients are loosing the
> > internet connectivity, NAT translation becomes empty once I applied the
> > crypto ipsec ezvpn outside in dialer interfaces below is configuration of
> > router.
> >
> > =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2011.10.11 11:07:53
> > =~=~=~=~=~=~=~=~=~=~=~=
> > sh run
> > Building configuration...
> > Current configuration : 2999 bytes
> > !
> > ! Last configuration change at 07:03:00 UTC Tue Oct 11 2011
> > !
> > version 15.0
> > service config
> > service timestamps debug datetime msec
> > service timestamps log datetime msec
> > service password-encryption
> > !
> > hostname Router
> > !
> > boot-start-marker
> > boot-end-marker
> > !
> > !
> > no aaa new-model
> > !
> > !
> > !
> > !
> >  --More--         !
> > !
> > no ipv6 cef
> > ip source-route
> > ip cef
> > !
> > !
> > !
> > !
> > !
> > !
> > !
> > !
> > redundancy
> > !
> > !
> > !
> > !
> > !
> >  --More--         !
> > crypto ipsec client ezvpn ASA
> >  connect acl 105
> >  group aooman key hlg2oma@vpn
> >  mode network-extension
> >  peer 213.42.108.130
> >  username hlgoman password us@hlom
> >  xauth userid mode local
> > !
> > !
> > !
> > !
> > !
> > interface GigabitEthernet0/0
> >  ip address 10.10.10.1 255.255.255.0
> >  ip access-group 100 out
> >  ip nat inside
> >  ip virtual-reassembly
> >  duplex auto
> >  speed auto
> >  crypto ipsec client ezvpn ASA inside
> >  !
> > !
> >  --More--         interface GigabitEthernet0/1
> >  no ip address
> >  duplex auto
> >  speed auto
> >  pppoe enable group global
> >  pppoe-client dial-pool-number 1
> >  no cdp enable
> >  !
> > !
> > interface GigabitEthernet0/2
> >  no ip address
> >  shutdown
> >  duplex auto
> >  speed auto
> >  !
> > !
> > interface Dialer0
> >  no ip address
> >  !
> > !
> > interface Dialer1
> >  ip address negotiated
> >  ip access-group 101 in
> >  --More--          ip mtu 1492
> >  ip nat outside
> >  ip virtual-reassembly
> >  encapsulation ppp
> >  ip tcp adjust-mss 1452
> >  dialer pool 1
> >  dialer-group 1
> >  ppp authentication chap pap callin
> >  ppp chap hostname hlgoman
> >  ppp chap password 7 15160D1A503A797C2E
> >  ppp pap sent-username hlgoman password 7 06020937185E5B410357
> >  ppp ipcp dns request accept
> >  ppp ipcp route default
> >  ppp ipcp address accept
> >  !
> > !
> > ip forward-protocol nd
> > !
> > no ip http server
> > no ip http secure-server
> > !
> > ip nat inside source route-map nonat interface Dialer1 overload
> > ip route 0.0.0.0 0.0.0.0 Dialer1
> >  --More--         ip route 172.23.1.0 255.255.255.0 10.10.10.2
> > ip route 172.23.2.0 255.255.255.0 10.10.10.2
> > !
> > ip access-list extended VPN_ACCESS
> >  deny   ip 172.23.1.0 0.0.0.255 172.16.0.0 0.0.255.255
> >  deny   ip 172.23.2.0 0.0.0.255 172.16.0.0 0.0.255.255
> >  deny   ip 10.10.10.0 0.0.0.255 172.16.0.0 0.0.255.255
> >  permit ip 172.23.1.0 0.0.0.255 any
> >  permit ip 172.23.2.0 0.0.0.255 any
> >  permit ip 10.10.10.0 0.0.0.255 any
> > !
> > access-list 10 permit 172.23.2.0 0.0.0.255
> > access-list 10 permit 172.23.1.0 0.0.0.255
> > access-list 10 permit 10.10.10.0 0.0.0.255
> > access-list 100 permit ip any any
> > access-list 101 permit ip any any
> > access-list 105 permit ip 10.10.10.0 0.0.0.255 172.16.0.0 0.0.255.255
> > access-list 105 permit ip 172.23.1.0 0.0.0.255 172.16.0.0 0.0.255.255
> > access-list 105 permit ip 172.23.2.0 0.0.0.255 172.16.0.0 0.0.255.255
> > access-list 106 permit ip 172.23.1.0 0.0.0.255 any
> > access-list 106 permit ip 172.23.2.0 0.0.0.255 any
> > access-list 106 permit ip 10.10.10.0 0.0.0.255 any
> > dialer-list 1 protocol ip permit
> > !
> > !
> > !
> > !
> > route-map EVPN permit 1
> >  match ip address 105
> > !
> > route-map nonat permit 10
> >  match ip address VPN_ACCESS
> > !
> > !
> > !
> > control-plane
> >  !
> > !
> > !
> > line con 0
> > line aux 0
> > line vty 0 4
> >  password 7 07062C584F0A485744
> >  login
> > !
> > scheduler allocate 20000 1000
> >  --More--         end
> > Router#
> >
> > _______________________________________________
> > For more information regarding industry leading CCIE Lab training, please
> > visit www.ipexpert.com
> >
> > Are you a CCNP or CCIE and looking for a job? Check out
> > www.PlatinumPlacement.com
> >
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> </archives/ccie_security/attachments/20111011/99b9e491/attachment-0001.html>
>
> ------------------------------
>
> Message: 2
> Date: Tue, 11 Oct 2011 14:35:52 +0500
> From: Hussain Arsalan Ali <[email protected]>
> To: <[email protected]>
> Cc: [email protected]
> Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> Message-ID: <[email protected]>
> Content-Type: text/plain; charset="iso-8859-1"
>
>
> THere is no NAT on ASA . Yes I am using GNS3 . Are you sure the config is
> OK ?
>
> Date: Tue, 11 Oct 2011 15:02:38 +0530
> Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> From: [email protected]
> To: [email protected]
> CC: [email protected]
>
> The issue is in IPSec Phase 2.
>
>
> *Mar  1 07:54:30.054: ISAKMP:(1074): phase 2 SA policy not acceptable!
> (local 136.1.123.3 remote 136.1.121.1)
> *Mar  1 07:54:30.054: ISAKMP: set new node -133501578 to QM_IDLE
>
> Possible reasons are transform set or Proxy IDs doesn't match. But with
> EzVPN, those are not relevant.
>
> The other reason would be ISAKMP profile. If the ISAKMP profile fails to
> match the identity, we could see this message.
>
>
> Are you using GNS? Is the ASA doing NAT?
>
>
> With regards
> Kings
>
> On Tue, Oct 11, 2011 at 1:17 PM, Hussain Arsalan Ali <[email protected]>
> wrote:
>
>
>
>
>
>
>
> I tried doing it again in office and I can see the HTTP page on client
> machine . When I type in the pass it times out after sometime . I am
> attaching a debug file on R3 ( Server ) .
> Can you tell me if the configuration done by me is correct ? I was thinking
> if the crypto ipsec client ezvpn IT outside should be on the physical
> interface ot the virtual-template interface I made on the CLient router .
>
>
> Date: Tue, 11 Oct 2011 11:41:36 +0530
> Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> From: [email protected]
> To: [email protected]
>
> CC: [email protected]
>
> What is the issue? Is the tunnel coming up?
>
>
> With regards
> Kings
>
>
> On Mon, Oct 10, 2011 at 11:28 PM, Hussain Arsalan Ali <[email protected]>
> wrote:
>
>
>
>
>
>
>
> I am configuring EzVPN using VTI . R1 is Client while R3 is Server . There
> is ASA in between which has allow any any statement there . It is working
> fine with Network Extension Mode ( without VTI ) but when I switched to VTI
> i cant bring things up . There is no isakmp debug messages on router .
> Attached is config .
>
>
>
>
>
> ALI
>
> _______________________________________________
>
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
>
> Are you a CCNP or CCIE and looking for a job? Check out
> www.PlatinumPlacement.com
>
>
>
>
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> </archives/ccie_security/attachments/20111011/18b8525c/attachment-0001.html>
>
> ------------------------------
>
> Message: 3
> Date: Tue, 11 Oct 2011 16:00:01 +0530
> From: Kingsley Charles <[email protected]>
> To: Hussain Arsalan Ali <[email protected]>
> Cc: [email protected]
> Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> Message-ID:
>        <cahs0b05fdgw_ymg-zorsw4qeo-rksctn-9hiredfito_nbo...@mail.gmail.com
> >
> Content-Type: text/plain; charset="iso-8859-1"
>
> Yes, I feel the config is good. I hope,I have not overlooked :-)
>
>
> With regards
> Kings
>
> On Tue, Oct 11, 2011 at 3:05 PM, Hussain Arsalan Ali <[email protected]>
> wrote:
>
> >  THere is no NAT on ASA . Yes I am using GNS3 . Are you sure the config
> is
> > OK ?
> >
> > ------------------------------
> > Date: Tue, 11 Oct 2011 15:02:38 +0530
> >
> > Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> > From: [email protected]
> > To: [email protected]
> > CC: [email protected]
> >
> > The issue is in IPSec Phase 2.
> >
> >
> > *Mar  1 07:54:30.054: ISAKMP:(1074): phase 2 SA policy not acceptable!
> (local 136.1.123.3 remote 136.1.121.1)
> > *Mar  1 07:54:30.054: ISAKMP: set new node -133501578 to QM_IDLE
> >
> >
> >
> > Possible reasons are transform set or Proxy IDs doesn't match. But with
> > EzVPN, those are not relevant.
> >
> > The other reason would be ISAKMP profile. If the ISAKMP profile fails to
> > match the identity, we could see this message.
> >
> > Are you using GNS? Is the ASA doing NAT?
> >
> >
> > With regards
> > Kings
> >
> > On Tue, Oct 11, 2011 at 1:17 PM, Hussain Arsalan Ali <[email protected]
> >wrote:
> >
> >
> > I tried doing it again in office and I can see the HTTP page on client
> > machine . When I type in the pass it times out after sometime . I am
> > attaching a debug file on R3 ( Server ) .
> >
> > Can you tell me if the configuration done by me is correct ? I was
> thinking
> > if the* crypto ipsec client ezvpn IT outside *should be on the physical
> > interface ot the virtual-template interface I made on the CLient router .
> >
> > ------------------------------
> > Date: Tue, 11 Oct 2011 11:41:36 +0530
> > Subject: Re: [OSL | CCIE_Security] EzVPN and VTI
> > From: [email protected]
> > To: [email protected]
> > CC: [email protected]
> >
> >
> > What is the issue? Is the tunnel coming up?
> >
> >
> > With regards
> > Kings
> >
> > On Mon, Oct 10, 2011 at 11:28 PM, Hussain Arsalan Ali <[email protected]
> >wrote:
> >
> >  I am configuring EzVPN using VTI . R1 is Client while R3 is Server .
> There
> > is ASA in between which has allow any any statement there . It is working
> > fine with Network Extension Mode ( without VTI ) but when I switched to
> VTI
> > i cant bring things up . There is no isakmp debug messages on router .
> > Attached is config .
> >
> >
> >
> > ALI
> >
> > _______________________________________________
> > For more information regarding industry leading CCIE Lab training, please
> > visit www.ipexpert.com
> >
> > Are you a CCNP or CCIE and looking for a job? Check out
> > www.PlatinumPlacement.com
> >
> >
> >
> >
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> </archives/ccie_security/attachments/20111011/f4a7487f/attachment-0001.html>
>
> ------------------------------
>
> Message: 4
> Date: Tue, 11 Oct 2011 18:07:30 +0530
> From: Kingsley Charles <[email protected]>
> To: yusef sheriff <[email protected]>,
>        [email protected]
> Subject: Re: [OSL | CCIE_Security] EZVPN Remote in IOS
> Message-ID:
>        <cahs0b07+uk130lgphodpmkwzfqgvqvnakg2opxel0sdvbgu...@mail.gmail.com
> >
> Content-Type: text/plain; charset="iso-8859-1"
>
> With split tunnleings, the destination entry of the ACL is ignored and
> hence
> you can see that split tunneling entry 1, 2 and 3 are same. Just an info
> that has nothing to do with the Internet disconnectivity.
>
>
> Now, is destinations other than 172.16.0.0/16 not reachable for you?
>
> With regards
> Kings
>
> On Tue, Oct 11, 2011 at 5:18 PM, yusef sheriff <[email protected]>
> wrote:
>
> > please find the output below:-
> >
> > Router#sh crypto ipsec client ez
> > Router#sh crypto ipsec client ezvpn
> > Easy VPN Remote Phase: 8
> >
> > Tunnel name : ASA
> > Inside interface list: GigabitEthernet0/0
> > Outside interface: Dialer1
> > Connect : ACL based with access-list 105
> > Current State: IPSEC_ACTIVE
> > Last Event: MTU_CHANGED
> > DNS Primary: 172.16.1.95
> > Default Domain: habtoorengg.co.ae
> > Save Password: Allowed
> > Split Tunnel List: 1
> >        Address    : 172.16.0.0
> >        Mask       : 255.255.0.0
> >        Protocol   : 0x0
> >        Source Port: 0
> >        Dest Port  : 0
> > Split Tunnel List: 2
> >        Address    : 172.16.0.0
> >        Mask       : 255.255.0.0
> >        Protocol   : 0x0
> >        Source Port: 0
> >        Dest Port  : 0
> > Split Tunnel List: 3
> >        Address    : 172.16.0.0
> >        Mask       : 255.255.0.0
> >        Protocol   : 0x0
> >        Source Port: 0
> >        Dest Port  : 0
> > Current EzVPN Peer: 213.42.108.130
> >
> >
> > On Tue, Oct 11, 2011 at 2:28 PM, Kingsley Charles <
> > [email protected]> wrote:
> >
> >> Can you paste the "sh crypto ipsec client ezvpn" O/P.
> >>
> >> With regards
> >> Kings
> >>
> >>
> >> On Tue, Oct 11, 2011 at 3:15 PM, yusef sheriff <[email protected]
> >wrote:
> >>
> >>>  Yes. its configured. ASA configuration:
> >>>
> >>> access-list omanao-tunnel_splitTunnelAcl_1 extended permit ip
> 172.16.0.0
> >>> 255.255.0.0 172.23.1.0 255.255.255.0
> >>> access-list omanao-tunnel_splitTunnelAcl_1 extended permit ip
> 172.16.0.0
> >>> 255.255.0.0 172.23.2.0 255.255.255.0
> >>> access-list omanao-tunnel_splitTunnelAcl_1 extended permit ip
> 172.16.0.0
> >>> 255.255.0.0 10.10.10.0 255.255.255.0
> >>>
> >>> group-policy aooman attributes
> >>>  vpn-tunnel-protocol IPSec
> >>>  password-storage enable
> >>>  split-tunnel-policy tunnelspecified
> >>>  split-tunnel-network-list value omanao-tunnel_splitTunnelAcl_1
> >>>  default-domain value habtoorengg.co.ae
> >>>  nem enable
> >>>
> >>> tunnel-group aooman type remote-access
> >>> tunnel-group aooman general-attributes
> >>>  default-group-policy aooman
> >>> tunnel-group aooman ipsec-attributes
> >>>  pre-shared-key *
> >>>
> >>> crypto map are starndard configuration
> >>>
> >>>   On Tue, Oct 11, 2011 at 1:35 PM, Kingsley Charles <
> >>> [email protected]> wrote:
> >>>
> >>>> Have you configured split tunneling on the ASA?
> >>>>
> >>>>
> >>>> With regards
> >>>> Kings
> >>>>
> >>>>   On Tue, Oct 11, 2011 at 12:45 PM, yusef sheriff <
> [email protected]>wrote:
> >>>>
> >>>>>   Hi All,
> >>>>>
> >>>>> I have configured EZVPN server on ASA and remote clien is IOS router.
> >>>>> VPN is able connect without any issue. But in remote clients are
> loosing the
> >>>>> internet connectivity, NAT translation becomes empty once I applied
> the
> >>>>> crypto ipsec ezvpn outside in dialer interfaces below is
> configuration of
> >>>>> router.
> >>>>>
> >>>>> =~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2011.10.11 11:07:53
> >>>>> =~=~=~=~=~=~=~=~=~=~=~=
> >>>>> sh run
> >>>>> Building configuration...
> >>>>> Current configuration : 2999 bytes
> >>>>> !
> >>>>> ! Last configuration change at 07:03:00 UTC Tue Oct 11 2011
> >>>>> !
> >>>>> version 15.0
> >>>>> service config
> >>>>> service timestamps debug datetime msec
> >>>>> service timestamps log datetime msec
> >>>>> service password-encryption
> >>>>> !
> >>>>> hostname Router
> >>>>> !
> >>>>> boot-start-marker
> >>>>> boot-end-marker
> >>>>> !
> >>>>> !
> >>>>> no aaa new-model
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>>  --More--         !
> >>>>> !
> >>>>> no ipv6 cef
> >>>>> ip source-route
> >>>>> ip cef
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> redundancy
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>>  --More--         !
> >>>>> crypto ipsec client ezvpn ASA
> >>>>>  connect acl 105
> >>>>>  group aooman key hlg2oma@vpn
> >>>>>  mode network-extension
> >>>>>  peer 213.42.108.130
> >>>>>  username hlgoman password us@hlom
> >>>>>  xauth userid mode local
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> interface GigabitEthernet0/0
> >>>>>  ip address 10.10.10.1 255.255.255.0
> >>>>>  ip access-group 100 out
> >>>>>  ip nat inside
> >>>>>  ip virtual-reassembly
> >>>>>  duplex auto
> >>>>>  speed auto
> >>>>>  crypto ipsec client ezvpn ASA inside
> >>>>>  !
> >>>>> !
> >>>>>  --More--         interface GigabitEthernet0/1
> >>>>>  no ip address
> >>>>>  duplex auto
> >>>>>  speed auto
> >>>>>  pppoe enable group global
> >>>>>  pppoe-client dial-pool-number 1
> >>>>>  no cdp enable
> >>>>>  !
> >>>>> !
> >>>>> interface GigabitEthernet0/2
> >>>>>  no ip address
> >>>>>  shutdown
> >>>>>  duplex auto
> >>>>>  speed auto
> >>>>>  !
> >>>>> !
> >>>>> interface Dialer0
> >>>>>  no ip address
> >>>>>  !
> >>>>> !
> >>>>> interface Dialer1
> >>>>>  ip address negotiated
> >>>>>  ip access-group 101 in
> >>>>>  --More--          ip mtu 1492
> >>>>>  ip nat outside
> >>>>>  ip virtual-reassembly
> >>>>>  encapsulation ppp
> >>>>>  ip tcp adjust-mss 1452
> >>>>>  dialer pool 1
> >>>>>  dialer-group 1
> >>>>>  ppp authentication chap pap callin
> >>>>>  ppp chap hostname hlgoman
> >>>>>  ppp chap password 7 15160D1A503A797C2E
> >>>>>  ppp pap sent-username hlgoman password 7 06020937185E5B410357
> >>>>>  ppp ipcp dns request accept
> >>>>>  ppp ipcp route default
> >>>>>  ppp ipcp address accept
> >>>>>  !
> >>>>> !
> >>>>> ip forward-protocol nd
> >>>>> !
> >>>>> no ip http server
> >>>>> no ip http secure-server
> >>>>> !
> >>>>> ip nat inside source route-map nonat interface Dialer1 overload
> >>>>> ip route 0.0.0.0 0.0.0.0 Dialer1
> >>>>>  --More--         ip route 172.23.1.0 255.255.255.0 10.10.10.2
> >>>>> ip route 172.23.2.0 255.255.255.0 10.10.10.2
> >>>>> !
> >>>>> ip access-list extended VPN_ACCESS
> >>>>>  deny   ip 172.23.1.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>>  deny   ip 172.23.2.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>>  deny   ip 10.10.10.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>>  permit ip 172.23.1.0 0.0.0.255 any
> >>>>>  permit ip 172.23.2.0 0.0.0.255 any
> >>>>>  permit ip 10.10.10.0 0.0.0.255 any
> >>>>> !
> >>>>> access-list 10 permit 172.23.2.0 0.0.0.255
> >>>>> access-list 10 permit 172.23.1.0 0.0.0.255
> >>>>> access-list 10 permit 10.10.10.0 0.0.0.255
> >>>>> access-list 100 permit ip any any
> >>>>> access-list 101 permit ip any any
> >>>>> access-list 105 permit ip 10.10.10.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>> access-list 105 permit ip 172.23.1.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>> access-list 105 permit ip 172.23.2.0 0.0.0.255 172.16.0.0 0.0.255.255
> >>>>> access-list 106 permit ip 172.23.1.0 0.0.0.255 any
> >>>>> access-list 106 permit ip 172.23.2.0 0.0.0.255 any
> >>>>> access-list 106 permit ip 10.10.10.0 0.0.0.255 any
> >>>>> dialer-list 1 protocol ip permit
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> route-map EVPN permit 1
> >>>>>  match ip address 105
> >>>>> !
> >>>>> route-map nonat permit 10
> >>>>>  match ip address VPN_ACCESS
> >>>>> !
> >>>>> !
> >>>>> !
> >>>>> control-plane
> >>>>>  !
> >>>>> !
> >>>>> !
> >>>>> line con 0
> >>>>> line aux 0
> >>>>> line vty 0 4
> >>>>>  password 7 07062C584F0A485744
> >>>>>  login
> >>>>> !
> >>>>> scheduler allocate 20000 1000
> >>>>>  --More--         end
> >>>>> Router#
> >>>>>
> >>>>> _______________________________________________
> >>>>> For more information regarding industry leading CCIE Lab training,
> >>>>> please visit www.ipexpert.com
> >>>>>
> >>>>> Are you a CCNP or CCIE and looking for a job? Check out
> >>>>> www.PlatinumPlacement.com <http://www.platinumplacement.com/>
> >>>>>
> >>>>
> >>>>
> >>>
> >>
> >
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
> </archives/ccie_security/attachments/20111011/da729458/attachment.html>
>
> End of CCIE_Security Digest, Vol 64, Issue 29
> *********************************************
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to