Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING
  • HOME
  • Cisco Networking
    • Cisco General
    • Cisco IOS
    • Cisco VPN
    • Cisco Wireless
  • Cisco ASA
    • Cisco ASA General
    • Cisco ASA Firewall Configuration
  • Certifications Training
    • CCNA Training
    • Cisco Certifications
    • I.T Training
  • General
    • General Networking
    • IP Telephony
    • Network Security
    • Product Reviews
    • Software
  • Cisco Routers
  • Cisco Switches
You are here: Home / Cisco ASA Firewall Configuration / Allowing Microsoft PPTP through Cisco ASA (PPTP Passthrough)

Allowing Microsoft PPTP through Cisco ASA (PPTP Passthrough)

Written By Harris Andrea

The Microsoft Point to Point Tunneling Protocol (PPTP) is used to create a Virtual Private Network (VPN) between a PPTP client and server.

It is used for remote access from roaming users to connect back to their corporate network over the Internet. A PPTP client connects and authenticates to the PPTP server which assigns an IP address to the client and attaches the remote user to the network. After that, the remote user has full network connectivity just like being connected locally.

In the older PIX version 6.x, you could configure the PIX firewall itself to work as a PPTP server, thus you didn’t even need to have a Windows PPTP server in place. With the new ASA firewall however, you cannot terminate PPTP on the ASA itself. Therefore you must have a Microsoft PPTP server in the network in order to terminate PPTP connections from clients.

PPTP uses two protocols:

  • GRE to encapsulate PPP packets
  • and a control channel at TCP port 1723.

Any stateful firewall would have a problem with allowing PPTP protocol without any special “fixup” because of the two protocols needed for communication (GRE and TCP 1723).

Cisco ASA allows you to pass PPTP traffic through with a special “inspection” mechanism which checks the control traffic (TCP 1723) in order to dynamically open also access for GRE traffic to pass through with no problems.

MORE READING:  Cisco ASA Firewall Packet Tracer for Network Troubleshooting

In this post we will see two scenarios of allowing PPTP traffic through a Cisco ASA. In the first scenario we have a PPTP client on the inside of ASA which communicates with a PPTP server on the outside zone. In the second scenario we have a PPTP client on the outside of ASA which communicates with a PPTP server on the inside.

Table of Contents

  • Scenario 1: PPTP client on inside and server on outside
  • Scenario 2: PPTP client on outside and server on inside
    • DOWNLOAD THIS ARTICLE AS PDF FILE
    • Related Posts

Scenario 1: PPTP client on inside and server on outside

The first scenario above depicts a PPTP server located on the outside of the ASA (Internet) and PPTP clients on the inside. Using the “inspect” command in the global policy-map we can enable access from inside to outside for PPTP.

! enable Port Address Translation on the outside interface
ciscoasa(config)#nat (inside) 1 0.0.0.0 0.0.0.0 0 0
ciscoasa(config)#global (outside) 1 interface

EDIT: For ASA 8.3 and later:

MORE READING:  Cisco ASA Firewall with PPPoE (Configuration Example on 5505)

object network obj_any
subnet 0.0.0.0 0.0.0.0
nat (inside,outside) dynamic interface

! Add PPTP inspection to the default policy-map using the default class-map
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class inspection_default
ciscoasa(config-pmap-c)# inspect pptp

Scenario 2: PPTP client on outside and server on inside

This scenario depicts a PPTP server located on the inside network. Here we must configure static NAT for the PPTP server and allow the appropriate protocols from outside (GRE, TCP 1723)

! translate the PPTP server private address 192.168.1.1 to public 50.50.50.1
ciscoasa(config)# static (inside,outside) 50.50.50.1 192.168.1.1 netmask 255.255.255.255

! allow the appropriate protocols from outside to inside
ciscoasa(config)# access-list acl-out permit gre any host 50.50.50.1
ciscoasa(config)# access-list acl-out permit tcp any host 50.50.50.1 eq 1723
ciscoasa(config)# access-group acl-out in interface outside

EDIT: For ASA 8.3 and later:

object network obj-192.168.1.1
host 192.168.1.1
nat (inside,outside) static 50.50.50.1

ciscoasa(config)# access-list acl-out permit gre any host 192.168.1.1
ciscoasa(config)# access-list acl-out permit tcp any host 192.168.1.1 eq 1723
ciscoasa(config)# access-group acl-out in interface outside

! Add PPTP inspection to the default policy-map using the default class-map
ciscoasa(config)# policy-map global_policy
ciscoasa(config-pmap)# class inspection_default
ciscoasa(config-pmap-c)# inspect pptp

DOWNLOAD THIS ARTICLE AS PDF FILE

Related Posts

  • Prevent Spoofing Attacks on Cisco ASA using RPF
  • Configuring Connection Limits on Cisco ASA Firewalls – Protect from DoS
  • Configuring AAA Authentication-Authorization-Accounting on Cisco ASA Firewall (TACACS+, RADIUS)
  • Cisco ASA Firewall Management Interface Configuration (with Example)
  • How to Configure Access Control Lists on a Cisco ASA 5500/5500-X Firewall (with Examples)

Filed Under: Cisco ASA Firewall Configuration

Download Free Cisco Commands Cheat Sheets

Enter your Email below to Download our Free Cisco Commands Cheat Sheets for Routers, Switches and ASA Firewalls.

We use Elastic Email as our marketing automation service. By submitting this form, you agree that the information you provide will be transferred to Elastic Email for processing in accordance with their Terms of Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.

About Harris Andrea

Harris Andrea is an Engineer with more than two decades of professional experience in the fields of TCP/IP Networks, Information Security and I.T. Over the years he has acquired several professional certifications such as CCNA, CCNP, CEH, ECSA etc.

He is a self-published author of two books ("Cisco ASA Firewall Fundamentals" and "Cisco VPN Configuration Guide") which are available at Amazon and on this website as well.

Comments

  1. Istvan says

    March 27, 2010 at 6:53 pm

    Hi Harris,

    i have a fairly similar situation, operating an OpenVPN server on the inside network reachable by users from the outside network. My problem is how to configure ASA 5510 to route the vpn IP addresses to the VPN server resides on the inside network. OpenVPN server issues IP addresses from 10.8.0.0/24 pool, the inside network from 192.168.128.0/24 pool. I did static inside route of 10.8.0.0/24 to the inside address of the OpenVPN server as a gateway, also did ACLs. VPN connection builds up, but the VPN clients did not see the inside network.

  2. BlogAdmin says

    March 27, 2010 at 7:28 pm

    Istvan,
    You will need to configure the OpenVPN server to assign addresses within subnet 192.168.128.0/24. Because clients get addresses in a different subnet (10.8.0.0) there is no routing between the VPN subnet and the inside subnet.

  3. Istvan says

    March 27, 2010 at 7:40 pm

    Hi BlogAdmin,

    thanks for answering me. With a LinkSys BEFSR41 DSL router the above explained configuration works if i set up a static route from 10.8.0.0/24 to the inside IP address of the OpenVPN server as a gateway (let say 10.8.0.0 255.255.255.0 192.168.128.120 1). But anyway, if i give to VPN clients addresses from the inside pool how to route VPN clients through the OpenVPN server? I am not an expert in this question.

  4. BlogAdmin says

    March 27, 2010 at 10:13 pm

    The Linksys router works because it allows IP redirection. However the ASA does not allow this by default except if you configure it to permit intra-interface traffic (same security permit intra intrerface). If you configure the OpenVPN server to give addresses in the range 192.168.128.0 then there is no need to configure any routes since both the VPN clients and the internal hosts will be in the same network subnet.

  5. agung says

    September 28, 2010 at 10:38 am

    Hi Harris,

    I have configured PPTP client on outside and server on inside same with scenario 2 above, but i got problem with allowing microsoft PPTP in cisco asa 5505 8.3(1).

    Can you please give the right input configuration for this version. Thanks

  6. BlogAdmin says

    September 28, 2010 at 7:15 pm

    For ASA 8.3 and later, the NAT and access list commands have changed.

    Static NAT:

    ciscoasa(config)# object network rdp_server_static
    ciscoasa(config-network-object)# host 192.168.1.1
    ciscoasa(config-network-object)# nat (inside , outside) static 50.50.50.1

    Access List:
    ciscoasa(config)# access-list acl-out permit gre any host 192.168.1.1
    ciscoasa(config)# access-list acl-out permit tcp any host 192.168.1.1 eq 1723
    ciscoasa(config)# access-group acl-out in interface outside

  7. agung says

    September 30, 2010 at 5:03 am

    Hi Harris,

    I have input the configuration but i got this message

    ciscoasa(config-network-object)# nat (inside,outside) static 118.x.x.x
    ERROR: Address 118.x.x.x overlaps with outside interface address.
    ERROR: NAT Policy is not downloaded

  8. BlogAdmin says

    September 30, 2010 at 3:01 pm

    This is because you are using the ASA outside interface IP address. You need to use “nat (inside,outside) static interface“. However this will bind the whole interface address on the PPTP server. The best scenario is to have a dedicated public IP address (not the same as the outside interface of ASA) for the PPTP server.

  9. Schrodyr says

    January 13, 2011 at 8:27 pm

    Could someone please publish the 8.3 commands for Scenario 1?

  10. Aubrey says

    February 2, 2011 at 9:08 am

    Is there a chance of getting the updated commands for 8.3?

    Thanks for the site and a great Step by Step guide.

  11. Aubrey says

    February 2, 2011 at 9:09 am

    I meant the above posts for allowing outbound PPTP traffic. sorry about the mistake

  12. BlogAdmin says

    February 3, 2011 at 8:10 am

    For outbound PPTP for 8.3, you need to change the PAT commands:

    object network internal_lan
    subnet 192.168.1.0 255.255.255.0
    nat (inside,outside) dynamic interface

  13. Aubrey says

    February 3, 2011 at 9:30 pm

    Strange,

    I already have that for allowing outbound access through two of my Cisco ASA 5505’s and not able to create outbound pptp connections since implementing these security appliances.

  14. Boom3r says

    May 31, 2011 at 8:37 am

    I have a ASA 5505 protecting my home network. inside DHCP from the ASA is 192.168.1.X im trying to passthrough the ASA into my work and VPN from my Windows machine. I cannot seem to get it to work. PPTP work server is 203.161.x.x I have a villina 8.4 ASA can you please help with config for PPTP passthrough?
    Regards Boom3r

  15. BlogAdmin says

    May 31, 2011 at 6:38 pm

    Boom3r,

    Check out the post here: http://www.tech21century.com/allowing-microsoft-pptp-through-cisco-asa/

  16. vikinggerman says

    July 29, 2011 at 9:35 pm

    BlogAdmin:

    I check out the link: http://www.tech21century.com/allowing-microsoft-pptp-through-cisco-asa/.

    It would allow me to excute the following command:

    ciscoasa(config)# static (inside,outside) 50.50.50.1 192.168.1.1 netmask 255.255.255.255

    Could you help me with it?

    Thanks.

  17. BlogAdmin says

    July 29, 2011 at 9:54 pm

    What ASA version are you running? Run the command “show ver” to see the software version of your ASA. If its version higher than 8.3 then the command above is not supported.

  18. vikinggerman says

    July 29, 2011 at 10:26 pm

    Thanks for you quick response. The version is 8.2. Is there alternative way to do it?

  19. vikinggerman says

    July 29, 2011 at 10:31 pm

    BTW, I ran the commands following:

    ! allow the appropriate protocols from outside to inside
    ciscoasa(config)# access-list acl-out permit gre any host 50.50.50.1
    ciscoasa(config)# access-list acl-out permit tcp any host 50.50.50.1 eq 1723
    ciscoasa(config)# access-group acl-out in interface outside

    But still I have error message on VPN server saying that:
    Firewall between VPN server and clients is not configured to allow GRE packets.

    Any suggestion?

    Thanks

  20. BlogAdmin says

    August 1, 2011 at 8:55 am

    Your commands are correct and they should have been working. Maybe the VPN server is not using a standard GRE and PPPoE protocol?

  21. Andrew says

    January 19, 2012 at 1:14 pm

    Hi BlogAmin,

    thanks for the tutorial.I’ve a problem with it.

    I’ve an ASA 5110 8.0(4) released. I’m working on scenario 2.
    When i try to connect with the client, it contact the server, try to verify user and password and after 30second it reply with the message:

    Error 806: a connection between your computer and the VPN server has been established but the VPN connection cannot be completed. The most common cause for this is that there is at least one internet device between your computer and the VPN server is not configured to allow GRE protocol packets Verify that protocol 47 GRE is allowed on all personal firewall devices or routers. if the problem persists, contact your administrator.

    If i try a telnet from client to server, on 1723 port, it work.

    where i wrong?

    Thanks

  22. BlogAdmin says

    January 19, 2012 at 3:50 pm

    Andrew,

    In order for scenario 2 to work, you need a dedicated public IP which will be static nat to the inside server. Your problem shows that GRE does not pass from client (outside) to server inside. Only TCP port 1723 can pass from what you describe.

  23. Brad says

    February 2, 2012 at 5:34 am

    thanks for the info! this pointed me in the right direction. I did need to run one more command to apply the policy to the interface on my ASA 5505 (ver. 8.2):

    service-policy pptp_policy interface outside

    I found that here: http://www.cisco.com/en/US/docs/security/asa/asa83/command/reference/i2.html#wp1761500

  24. jackmetro says

    February 8, 2013 at 5:28 pm

    Harris, Thanks very much for this posting. I ran the commands on our ASA and the results are perfect. Best Regards to you!

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this site

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2023 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy

67 shares