VPN access to site-toSite to servers of HO with remote site with overlapping network...

Hi all

I have an obligation to create a tunnel vpn site-to-site on ASA 5510 from a remote location to my HO, I have already other site to site tunnels are on the rise and running on the ASA. This is what my remote site got the network address that is part of a subnet used in HO(192.168.10.0/24). My requirement is only my need to access remote site couple of my servers in HO, who is in the subnet 192.168.200.0/24.

Veuileez help how can I achieve this... your advice at the beginning is very appreciated...

Thanks in advance
Mikael

Hi Salem,

I think the installer at your end is a bit like this:

You want the remote location to access the subnet 192.168.200.0/24 behind the ASA HQ servers. In this case, you can NAT traffic from the remote site to a different subnet when you go to 192.168.200.0/24.

i.e. the 192.168.10.0/24 subnet resemble 192.168.51.0/24 when he goes to 192.168.200.0

This can be done by using political based natting:

permit access-list policy-nat ip 192.168.10.0 255.255.255.0 192.168.200.0 255.255.255.0

public static 192.168.51.0 (inside, outside) access-l policy-nat

In the encryption of the remote side access list, you will have:

cryptoacl ip 192.168.51.0 access list allow 255.255.255.0 192.168.200.0 255.255.255.0 (this is because the remote side will see 192.168.51.0/24 and not the 192.168.10.0/24)

Similarly on the end of HQ the accesslist crypto will be

XXXXX 192.168.200.0 ip access list allow 255.255.255.0 192.168.51.0 255.255.255.0

Please try this and let me know if it helps.

Thank you

Vishnu Sharma

Tags: Cisco Security

Similar Questions

  • Problem VPN site to Site with overlapping networks

    We currently have a PIX 515E firewall as a headboard with many tunnels of site-to-site configured for her with the enpoints of PIX 506. Our internal LAN addressing scheme is 172.18.0.0 255.255.0.0. Addresses of local network in two of the remote networks with congigured VPN site-to-site are 172.18.107.0 255.255.255.224 and 172.18.107.32 255.255.255.0. Remote network access to all services on our internal network very well. We have 20 other network segments configured the same way. The 172.18.107.32.0 network needs to communicate with the 172.18.107.0 network for the services of file on the other remote PIX. Since the station PIX will not allow traffic to leave the same interface it came we thought with him we would just set up a tunnel from site to site between the two remote LAN. After the configuration of the site to another remote firewalls do not appear to try to establish tunnels when sending valuable traffic. I turned on debug for ISAKMP and nothing is either sent or received on a remote Firewall with regard to these tunnels. It's almost like since we already have a tunnel set to our 172.18.0.0 internal LAN that the remote PIX will not build specifically to 172.18.107.0 tunnel. I am able to ping each remote peer with each other and hear protection rules, but nothing has ever been established.

    Is what we are trying to do possible? Sorry for the long post but the kind of a strange scenario. Thanks in advance for any help.

    In what order are the numbers of seqence card crypto for configuring vpn on pix distance units? It could be that you are trying to install is a lot and will be checked later as head of pix. If this is the case, then yes the 172.18/16 road prevail the 172.18.107/24. Try to rebuild the entrance card crypto with a lower number so that traffic to 172.18.107/24 comes first.

    I would like to know how it works.

  • Several tunnels to Datacenter VPN with overlapping networks

    Hello guys,.

    We are starting to host applications for customers who need trusts (maybe?) Windows and full access to a class C subnet in our IP data center.

    My problem is most of our customers are small MOM and pop stores IPed to 192.168.1.x. I intend to install my own Cisco ASA in each of these sites and create a VPN to the data center to access the application. The last 2 sites I've done, I have re-IPed network to a mine plan. I start to run in many customers that we simply host the app for and I can't really make them Re - IP network if they do not want.

    My question is what are my options here? I guess some kind of NAT, but I don't really know how it works. With a Windows trust communication must be 2 tracks. If we did not trust, I could see this work without problem with a simple NAT right? Firewall guy would you NAT on? The remote end or Data Center?

    Any help and advice is appreciated.

    I'm a complete network of Cisco, ASAs, catalysts, routers, etc...

    Hi Billy,

    Basically, for the overlap of networks, you will run natting on both sites for interesting traffic.
    If you have networks that overlap, you can follow this link if you use Cisco ASA and this link for Cisco routers as a VPN endpoint devices.

    Kind regards
    Dinesh Moudgil

    PS Please rate helpful messages.

  • LAN-to-LAN IPsec VPN with overlapping networks problem

    I am trying to connect to two networks operlapping via IPsec. I already have google and read

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a0080b37d0b.shtml

    Details:

    Site_A use ASA 5510 with software version 8.0 (4) 32. Site_A use 10.100.0.0/24, 10.100.1.0/24 and 10.100.2.0/24 inside networks. 10.100.0.0/24 is directly connected to ASA (like vlan10), 10.100.1.0/24 and 10.100.2.0/24 are routed.

    Site_B use Linux box and networks 10.100.1.0/24, 10.100.2.0/24, 10.100.3.0/24 and so on (mainly 10.100.x.0/24). I have not implemented this ASA, we took over this infrastructure without other documentation whatsoever.

    According to the above link I should use double NAT. Site_B will see the Site_A as 10.26.0.0/22 networks, and Site_A see networks in Site_B as 10.25.0.0/24. Site_A is allowed access only 10.100.1.0/24 in the Site_B, and Site_B is allowed access to all the networks of the Site_A 10.100.x.0/24 - so / 22 10.26.0.0/22 mask. I would like, for example, ssh to host in the Site_B to host the Site_A using 10.26.1.222 as the destination ip address (and it should be translated in 10.100.1.222 on the side Site_A). I'm looking for something like ip nat type match-host in Cisco routers - I want to translate only a part of the network address leave the intact host Party. Anyway, following the steps from the link displayed above everything is ok until the command:

    static (companyname, outside) 10.26.0.0 access list fake_nat_outbound

    which translates into:

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.6/443 to outside:x.x.x.178/443 netmask 255.255.255.255

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.20/25 to outside:x.x.x.178/25 netmask 255.255.255.255

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.128/3389 to outside:x.x.x.178/50000 netmask 255.255.255.255

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.26/3389 to outside:x.x.x.181/2001 netmask 255.255.255.255

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.27/3389 to outside:x.x.x.181/2002 netmask 255.255.255.255

    WARNING: address real conflict with existing static

    TCP companyname:10.100.0.28/3389 to outside:x.x.x.178/2003 netmask 255.255.255.255

    Those are redirects to port on Site_A used for mail, webmail, etc. What should I do to keep the redirects from the Internet to companyname vlan and at the same time to have work l2l ipsec tunnel linking networks that overlap?

    Thank you in advance for any help or advice.

    The ASA config snippet below:

    !

    ASA 4,0000 Version 32

    !

    no names

    name 10.25.0.0 siteB-fake-network description fake NAT network to avoid an overlap of intellectual property

    name 10.26.0.0 description of siteA-fake-network NAT fake network to avoid an overlap of intellectual property

    !

    interface Ethernet0/0

    Shutdown

    nameif inside

    security-level 100

    IP 10.200.32.254 255.255.255.0

    !

    interface Ethernet0/1

    nameif outside

    security-level 0

    IP address x.x.x.178 255.255.255.248

    !

    interface Ethernet0/2

    No nameif

    no level of security

    no ip address

    !

    interface Ethernet0/2.10

    VLAN 10

    nameif companyname

    security-level 100

    IP 10.100.0.254 255.255.255.0

    !

    interface Ethernet0/2.20

    VLAN 20

    nameif wifi

    security-level 100

    the IP 10.0.0.1 255.255.255.240

    !

    interface Ethernet0/2.30

    VLAN 30

    nameif dmz

    security-level 50

    IP 10.0.30.1 255.255.255.248

    !

    interface Ethernet0/3

    Shutdown

    No nameif

    no level of security

    no ip address

    !

    interface Management0/0

    nameif management

    security-level 100

    IP 10.100.100.1 255.255.255.0

    management only

    !

    permit same-security-traffic inter-interface

    permit same-security-traffic intra-interface

    object-group Protocol TCPUDP

    object-protocol udp

    object-tcp protocol

    Group of objects in the inside network

    object-network 10.100.0.0 255.255.255.0

    object-network 10.100.1.0 255.255.255.0

    object-network 10.100.2.0 255.255.255.0

    DM_INLINE_TCP_1 tcp service object-group

    port-object eq 2221

    port-object eq 2222

    port-object eq 2223

    port-object eq 2224

    port-object eq 2846

    DM_INLINE_TCP_5 tcp service object-group

    port-object eq ftp

    port-object eq ftp - data

    port-object eq www

    EQ object of the https port

    object-group service DM_INLINE_SERVICE_1

    the eq field tcp service object

    the eq field udp service object

    DM_INLINE_TCP_6 tcp service object-group

    port-object eq 2221

    port-object eq 2222

    port-object eq 2223

    port-object eq 2224

    port-object eq 2846

    the DM_INLINE_NETWORK_1 object-group network

    object-network 10.100.0.0 255.255.255.0

    object-network 10.100.2.0 255.255.255.0

    standard access list securevpn_splitTunnelAcl allow 10.100.0.0 255.255.255.0

    outside_access_in list extended access permit tcp any host x.x.x.178 eq 50000

    outside_access_in list extended access permit tcp any host x.x.x.178 eq smtp

    outside_access_in list extended access permit tcp any host x.x.x.178 eq https

    outside_access_in list extended access permit tcp any host x.x.x.179 DM_INLINE_TCP_1 object-group

    outside_access_in list extended access permit tcp any host x.x.x.181 eq ftp

    outside_access_in list extended access permit tcp any host x.x.x.181 eq ftp - data

    outside_access_in list extended access permit tcp host 205.158.110.63 eq x.x.x.180 idle ssh

    access extensive list ip 10.100.0.0 inside_access_in allow 255.255.255.0 10.100.1.0 255.255.255.0

    inside_access_in list extended access allowed ip-group of objects to the inside network 10.100.99.0 255.255.255.0

    inside_access_in list extended access allowed ip-group of objects to the inside network 10.0.30.0 255.255.255.248

    inside_access_in list extended access permit tcp host 10.100.0.6 any eq smtp

    inside_access_in list extended access permitted tcp object-group network inside any eq www

    inside_access_in list extended access permitted tcp object-group network inside any https eq

    inside_access_in list extended access permitted tcp-group of objects to the inside-network WG 1023 any eq ftp - data

    inside_access_in list extended access permitted tcp-group of objects to the inside-network WG 1023 any ftp eq

    inside_access_in list extended access allowed object-group objects TCPUDP-group to the network inside any eq 9999

    inside_access_in list extended access allowed object-group objects TCPUDP-group to the network inside any eq 3389

    inside_access_in list extended access allowed object-group network inside udp any eq field

    companyname_access_in list extended access allowed ip-group of objects to the inside network 10.100.1.0 255.255.255.0

    companyname_access_in list extended access allowed ip-group of objects to the inside network 10.100.99.0 255.255.255.0

    companyname_access_in list extended access allowed ip-group of objects to the inside network 10.0.30.0 255.255.255.248

    companyname_access_in list extended access permit tcp host 10.100.0.6 any eq smtp

    companyname_access_in list extended access permitted tcp object-group network inside any eq www

    companyname_access_in list extended access permitted tcp object-group network inside any https eq

    companyname_access_in list extended access permitted tcp-group of objects to the inside-network WG 1023 any eq ftp - data

    companyname_access_in list extended access permitted tcp-group of objects to the inside-network WG 1023 any ftp eq

    companyname_access_in list extended access allowed object-group objects TCPUDP-group to the network inside any eq 9999

    companyname_access_in list extended access allowed object-group objects TCPUDP-group to the network inside any eq 3389

    companyname_access_in list extended access allowed object-group network inside udp any eq field

    wifi_access_in list extended access permitted tcp 10.0.0.0 255.255.255.240 host 10.100.0.40 eq 2001

    access extensive list ip 10.100.0.0 companyname_nat0_outbound allow 255.255.255.0 10.100.99.0 255.255.255.0

    access extensive list ip 10.100.0.0 companyname_nat0_outbound allow 255.255.255.0 10.0.0.0 255.255.255.240

    access extensive list ip 10.100.0.0 companyname_nat0_outbound allow 255.255.255.0 10.0.30.0 255.255.255.248

    access extensive list ip 10.100.0.0 companyname_nat0_outbound allow 255.255.255.0 10.100.2.0 255.255.255.0

    access extensive list ip 10.100.2.0 companyname_nat0_outbound allow 255.255.255.0 10.0.30.0 255.255.255.248

    access extensive list ip 10.100.1.0 companyname_nat0_outbound allow 255.255.255.0 10.100.99.0 255.255.255.0

    access extensive list ip 10.100.2.0 companyname_nat0_outbound allow 255.255.255.0 10.100.99.0 255.255.255.0

    wifi_nat0_outbound to access ip 10.0.0.0 scope list allow 255.255.255.240 10.100.0.0 255.255.255.0

    dmz_access_in list extended access permitted tcp 10.0.30.0 255.255.255.248 any DM_INLINE_TCP_5 object-group

    dmz_access_in list extended access permitted tcp 10.0.30.0 255.255.255.248 host 10.100.0.2 object-group DM_INLINE_TCP_6

    dmz_access_in list extended access allowed object-group DM_INLINE_SERVICE_1 10.0.30.0 255.255.255.248 object-group DM_INLINE_NETWORK_1

    dmz_access_in list extended access deny ip 10.0.30.0 255.255.255.248 all

    access extensive list ip 10.0.30.0 dmz_nat0_outbound allow 255.255.255.248 10.100.0.0 255.255.255.0

    access extensive list ip 10.0.30.0 dmz_nat0_outbound allow 255.255.255.248 10.100.99.0 255.255.255.0

    access extensive list ip 10.0.30.0 dmz_nat0_outbound allow 255.255.255.248 10.100.2.0 255.255.255.0

    outside_1_cryptomap to access extended list ip 10.26.0.0 allow 255.255.252.0 10.25.0.0 255.255.255.0

    access extensive list ip 10.100.0.0 fake_nat_outbound allow 255.255.252.0 10.25.0.0 255.255.255.0

    IP local pool clientVPNpool 10.100.99.101 - 10.100.99.199 mask 255.255.255.0

    IP verify reverse path inside interface

    IP verify reverse path to the outside interface

    IP audit name IPS attack action alarm down reset

    IP audit name IPS - inf info action alarm

    interface verification IP outside of the IPS - inf

    verification of IP outside the SPI interface

    NAT-control

    Global (inside) 91 10.100.0.2

    Global (inside) 92 10.100.0.4

    Global (inside) 90 10.100.0.3 netmask 255.255.255.0

    Global interface 10 (external)

    Global x.x.x.179 91 (outside)

    Global x.x.x.181 92 (outside)

    Global (outside) 90 x.x.x.180 netmask 255.0.0.0

    interface of global (companyname) 10

    Global interface (dmz) 20

    NAT (outside) 10 10.100.99.0 255.255.255.0

    NAT (companyname) 0-list of access companyname_nat0_outbound

    NAT (companyname) 10 10.100.0.0 255.255.255.0

    NAT (companyname) 10 10.100.1.0 255.255.255.0

    NAT (companyname) 10 10.100.2.0 255.255.255.0

    wifi_nat0_outbound (wifi) NAT 0 access list

    NAT (dmz) 0-list of access dmz_nat0_outbound

    NAT (dmz) 10 10.0.30.0 255.255.255.248

    static (companyname, outside) tcp https 10.100.0.6 https interface subnet 255.255.255.255 mask

    static (companyname, outside) tcp interface smtp 10.100.0.20 smtp netmask 255.255.255.255

    static (companyname, outside) interface 50000 10.100.0.128 TCP 3389 netmask 255.255.255.255

    static (companyname, external) x.x.x.181 2001 10.100.0.26 TCP 3389 netmask 255.255.255.255

    static (companyname, external) x.x.x.181 2002 10.100.0.27 TCP 3389 netmask 255.255.255.255

    static (companyname, outside) interface 2003 10.100.0.28 TCP 3389 netmask 255.255.255.255

    static (dmz, outside) tcp x.x.x.181 ftp 10.0.30.2 ftp netmask 255.255.255.255

    static (companyname, companyname) 10.100.1.0 10.100.1.0 netmask 255.255.255.0

    static (companyname, companyname) 10.100.2.0 10.100.2.0 netmask 255.255.255.0

    inside_access_in access to the interface inside group

    Access-group outside_access_in in interface outside

    Access-group companyname_access_in in interface companyname

    Access-group wifi_access_in in wifi interface

    Access-group dmz_access_in in dmz interface

    Route outside 0.0.0.0 0.0.0.0 x.x.x.177 1

    Companyname route 10.0.1.0 255.255.255.0 10.100.0.1 1

    Companyname route 10.100.1.0 255.255.255.0 10.100.0.1 1

    Companyname route 10.100.2.0 255.255.255.0 10.100.0.1 1

    dynamic-access-policy-registration DfltAccessPolicy

    !

    Crypto-map dynamic outside_dyn_map 20 set pfs

    Crypto-map dynamic outside_dyn_map 20 the transform-set ESP - 3DES - SHA TRANS_ESP_3DES_MD5 value

    life together - the association of security crypto dynamic-map outside_dyn_map 20 28800 seconds

    Crypto-map dynamic outside_dyn_map 20 kilobytes of life together - the association of safety 4608000

    PFS set 40 crypto dynamic-map outside_dyn_map

    Crypto-map dynamic outside_dyn_map 40 value transform-set ESP-3DES-SHA

    life together - the association of security crypto dynamic-map outside_dyn_map 40 28800 seconds

    Crypto-map dynamic outside_dyn_map 40 kilobytes of life together - the association of safety 4608000

    Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5

    Dynamic crypto map SYSTEM_DEFAULT_CRYPTO_MAP 65535 define security association lifetime 28800 seconds

    cryptographic kilobytes 4608000 life of the set - the association of security of the 65535 SYSTEM_DEFAULT_CRYPTO_MAP of the dynamic-map

    card crypto outside_map 1 match address outside_1_cryptomap

    card crypto outside_map 1 set pfs Group1

    outside_map 1 counterpart set a.b.c.1 crypto card

    card crypto outside_map 1 set of transformation-ESP-3DES-SHA

    map outside_map 20-isakmp ipsec crypto dynamic outside_dyn_map

    outside_map interface card crypto outside

    !

    internal DefaultRAGroup group strategy

    attributes of Group Policy DefaultRAGroup

    value of server WINS 10.100.0.3

    value of server DNS 10.100.0.3

    nom_societe.com value by default-field

    internal DefaultRAGroup_1 group strategy

    attributes of Group Policy DefaultRAGroup_1

    value of server DNS 10.100.0.3

    Protocol-tunnel-VPN l2tp ipsec

    internal group securevpn strategy

    securevpn group policy attributes

    value of server WINS 10.100.0.3 10.100.0.2

    value of 10.100.0.3 DNS server 10.100.0.2

    VPN-idle-timeout 30

    Protocol-tunnel-VPN IPSec

    nom_societe.com value by default-field

    attributes global-tunnel-group DefaultRAGroup

    address clientVPNpool pool

    authentication-server-group COMPANYNAME_AD

    Group Policy - by default-DefaultRAGroup_1

    IPSec-attributes tunnel-group DefaultRAGroup

    pre-shared-key *.

    tunnel-group securevpn type remote access

    tunnel-group securevpn General attributes

    address clientVPNpool pool

    authentication-server-group COMPANYNAME_AD

    Group Policy - by default-securevpn

    tunnel-group securevpn ipsec-attributes

    pre-shared-key *.

    tunnel-group securevpn ppp-attributes

    ms-chap-v2 authentication

    tunnel-group a.b.c.1 type ipsec-l2l

    a.b.c.1 group tunnel ipsec-attributes

    pre-shared-key *.

    Are you sure that static-config does not make to the running configuration?

    By applying this 'static big' you're essentially trying to redirect the ports, which have already been transmitted by the rules in your existing configuration. This explains the caveat: what you are trying to do has some overlap with existing static.

    (Sorry for the use of the transmission of the word, but this behavior makes more sense if you look at it like this; although "port forwarding" is not Cisco-terminology.)

    But... whenever I stumbled upon this question, the warning was exactly that: a WARNING, not an ERROR. And everything works as I want it to work: the specific static in my current config simply have priority over static grand.

    If you would like to try to do the other opposite you would get an error (first static major, then try to apply more specific) and the config is not applied.

    So could you tell me the config is really not accepted?

  • asa himself through site to site vpn access server

    Hello

    I have problem with access to the servers through site to site vpn to ASA that makes this vpn site-to-site and Clientless VPN enablerd.

    Reason why I need it / what I do:

    ASA 5510 enabled Clientless VPN and on this Portal allows users to access internal servers through bookmars URL. We use it when someone wouldn't access IPSec VPN or in an internet café. If this user connects to clientless vpn and click on the bookmark to access for example mail server. But there is problem, asa cannot access this server through VPN site-to-site.

    Network:

    Here's a quick design of my network.

    I don't have server access to the problem in the VLAN 159 of VLAN 10, or 100. But I need to be able to access the server in Vlan 159 of ASA 5510, who owns the IP 192.168.1.4.

    I have this subnet ASA owned by FRONT-NAT object in the same place that VLAN 10 to 100 are and vpn Site-to-Site profile.

    What I makeover or how can I solve it?

    Thank you

    Clientless VPN when accessing internal servers, it will use the closest to the source of the connection interface and if you connect to via clientless SSL VPN ASA5510 and need access ASA5505 LAN via the site to site VPN, the interface closest to the ASA5510 to ASA5505 LAN is ASA5510 outside interface, therefore, the vpn of site-to-site crypto ACL must match on ASA5510 outside the ip address of the interface.

    Here's what you need on each ASA:

    ASA5510:

    permit same-security-traffic intra-interface

    ip 192.168.159.0 external interface allowed access list 255.255.255.0

    ASA5505:

    ip 192.168.159.0 access list allow 255.255.255.0 host

    In addition, also need to add the same ACL for access-list of exemptions on ASA5505 NAT:

    ip 192.168.159.0 access list allow 255.255.255.0 host

    Hope that helps.

  • Win 7 64 bit: cannot access Web sites randomly

    I had this problem for a long time, with several computers and various installations of windows.

    After my computer has been for a few days, I'll suddenly find me unable to access all the web pages. Programs like MIRC, Skype and steam work perfectly, like online games. I just get a generic "unable to connect to the server" error when you try to access Web sites and I cannot ping all websites such as google.com (it instantly timeouts).

    Do ipconfig/release, / flushdns and / renew fixes it for a few minutes before I lose the ability to access the Web sites again.

    Disabling/renewal of the NIC does nothing and troubleshooting of windows doesn't find anything wrong.

    The only semi-permanent solution I found is to restart my computer, but the problem will occur again in a few days.

    Servers using openDNS makes no difference. Nor is switching between ethernet cable and wireless. This problem is not dependent on the browser. Reboot the router it corrects only for a few minutes until I became unable to use websites to access again.

    Does anyone know what the cause of the problem and how to fix it permanently?

    Hello.

    I suggest you to configure the TCP/IP settings and check if it works:

    http://support.Microsoft.com/kb/2779064/en-us

    If the problem persists, I suggest you consult the website of the manufacturer of the laptop computer to download and install the latest network driver and check the results.

    Please let us know if the problem still persists.

  • Remote RDP client VPN access on ASA 5510

    Hello.

    We have configured the VPN tunnel from site of offshore to the location of the customer using ASA5510 and access to RDP to the location of the customer. Also been configured remote VPN access in offshore location. But using the remote VPN client, we are able to get the RDP of officeshore location but not able to access to the location of the RDP client. Are there any additional changes required?

    Thank you

    Hi Salsrinivas,

    so to summarize:

    the VPN client connects to the ASA offshore

    the VPN client can successfully RDP on a server at the offshore location

    the VPN client cannot NOT RDP on a server at the location of the customer

    offshore and the location of the customer are connected by a tunnel L2L

    (and between the 2 sites RDP works very well)

    is that correct?

    Things to check:

    -the vpn in the ACL crypto pool?

    -you're exemption nat for traffic between the vpn pool and 'customer' LAN? is the exemption outside (vpn clients are coming from the outside)?

    -you have "same-security-traffic permitted intra-interface" enabled (traffic will appear outside and go back outside)?

    If you need help more could you put a config (sterilized) Please?

    HTH
    Herbert

  • SRP526W to transmit or provide VPN access to clients

    Hello

    We have a SRP526W here, which replaced a cheap, simple router. Now, we would like to set up VPN access for outside clients again. So far, this was done by sending PPTP (TCP 1723 and GRE) for the Routing and Windows 2000 RAS server within the network.

    According to this post SRP521W, and therefore I guess so the SRP526W, are not able to pass the GRE: https://supportforums.cisco.com/thread/2093204

    Is it possible to provide external client VPN access with this router? Perhaps with L2TP (but then you should transmit ESP) or IPSec (ESP and AH as far as I know)?

    If there is no solution, we need to replace this device again once with a cheap, simple, router that is able to convey the Grateful - as you can imagine, we would like to save this shame Cisco.

    Kind regards

    Dominik

    Hello Dominik,

    The SRP520 only supports IPSec site-to-site at this time.

    Advancements are made, please check in the new year.

    Andy

  • AnyConnect client cannot access external sites

    I am installing AnyConnect VPN with no split tunneling. ASA 5505 v8.2. It seems that it should be really easy. I must be missing something.

    I can get AnyConnect users to connect very well and they can access internal sites and on other sites in IPSec tunnel. But no access to internet.

    Internal 10.1.1.x pool VPN is 10.1.1.251 - 253 (list of Temp for the test). I have published the following plotter:

    packet-tracer input outside tcp 10.1.1.253 12345 69.147.125.65 80 detailed

    The last reported point (where it fails) is:

    Phase: 7

    Type: WEBVPN-SVC

    Subtype: in

    Result: DROP

    Config:

    Additional Information:

    Forward Flow based lookup yields rule:

    in  id=0xda7e9808, priority=70, domain=svc-ib-tunnel-flow, deny=false

    hits=364, user_data=0xcb000, cs_id=0x0, reverse, flags=0x0, protocol=0

    src ip=TempVPNPool3, mask=255.255.255.255, port=0

    dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0

    Which means by SVC-WEBVPN?

    A relevant config:

    No ACLs, filters or limitations of policy group on HQ customers.

    Security-same permit intra-interface

    Global 1 interface (outside)

    On advice, I've added: nat (outside) 1 10.1.1.0 255.255.255.0, then I can get no tunnel guests outside guests, but then no IPSec.

    Kind of a weird, that with this, the tracer of package does not change. Continue to deny shows, but the site is accessible.

    When you say tunnel IPsec sites... is that the tunnels IPsec Site to Site on the SAA?

    The command:

    NAT (outside) 1 10.1.1.0 255.255.255.0

    It should allow the AnyConnect customer pool for PATed to Internet.

    If you need clients AnyConnect to access the Internet and the access to remote IPsec tunnels as well, you can do it with policy NAT:

    access-list anyconnect deny ip 10.1.1.0 255.255.255.0 x.x.x.x

    access-list anyconnect deny ip 10.1.1.0 255.255.255.0 y.y.y.y

    access-list allowed anyconnect ip 10.1.1.0 255.255.255.0 any

    NAT (outside) 1 access list anyconnect

    Global 1 interface (outside)

    With the above configuration, you are bypassing NAT for AnyConnect customers when they want to access remote sites through the IPsec tunnels (assuming that x.x.x.x and y.y.y.y for remote networks through these tunnels).

    And the rest of the AnyConnect (10.1.1.0/24) pool will be PATed to Internet.

    Federico.

  • VPN access to several local networks virtual asa8.3

    you are looking for assistance. This one goes batty.

    I have ASA 5510 8.3 running

    It serves as a router, firewall and vpn.

    the underlying network works fine.

    When I connect via VPN, I can only access my reseau.41 and not on the reseau.42. When I try to do a ping.42 I get this error:

    5 October 18, 2010 00:33:13 192.168.42.11 3389 rules asymmetrical NAT matched for flows forward and backward; Connection for tcp src Outside:192.168.43.200/2916 dst servers:192.168.42.11/3389 refused due to path failure reverse that of NAT

    If I flip through these rules in order to config then I can acceder.42 through the vpn but pas.41

    NAT (servers, all) static source any any destination static obj-vpnpool obj-vpnpool
    NAT (iscsimgmt, any) static source any any destination static obj-vpnpool obj-vpnpool

    I'm confused because it's all a new config and I used the wizard in asdm and couldn't access squat (perhaps he does not know how to manage the VLAN)?

    the ASA may well ping of all networks.

    devices on the network can ping each other fine

    just via ipsec vpn, I can't access both networks.

    thoughts?

    Please configure a more specific NAT statements as follows:

    object obj-iscsimgmt network
    192.168.42.0 subnet 255.255.255.0


    NAT (servers, Outside) source static obj-servers obj-servers destination static obj-vpnpool obj-vpnpool
    NAT (iscsimgmt, Outside) source static obj-iscsimgmt obj-iscsimgmt destination static obj-vpnpool obj-vpnpool

    And pls Remove the following:

    NAT (servers, all) static source any any destination static obj-vpnpool obj-vpnpool
    NAT (iscsimgmt, any) static source any any destination static obj-vpnpool obj-vpnpool

    Then "clear xlate" after the changes described above.

    Hope that helps.

  • Access Web site external AnyConnect

    Guys, I'm trying to allow AnyConnect VPN client to access external Web sites through the ASA (no split tunneling). In other words, I want users connected via VPN to gain access to the internal network, but also to be able to access external Web sites by having that first tunnel traffic to the ASA and then to the internet. I tried the suggestions mentioned in this thread, but not luck. Specifically, I tried adding this statement of nat:

    NAT (outside) 1 192.168.30.0 255.255.255.0

    as well as this one:

    NAT (outside) 1 192.168.30.0 255.255.255.0 outside

    By I had no statement "nat (outside). Unable to access outside sites in these three cases. I have no trouble to access within the network when connected. I issued the sysopt connection VPN-enabled control to ignore the interface of access for vpn users lists. Config is attached (washed). Any help would be greatly appreciated.

    Change this line: nat (outside) 1 192.168.30.0 255.255.255.0 outside

    To: nat (outside) 1 192.168.30.0 255.255.255.0

    Global 1 interface (outside) will associate the NAT to the external interface.

    Also make sure you have the traffic that is allowed between the hosts connected to the same interface with this command:

    permit same-security-traffic intra-interface

  • ASA 5505 VPN Site to site with several networks

    Hello

    I have a Cisco ASA 5505 configuration problem and hope you can help me.

    Our company created a second facility, which must be connected using VPN to our headquarters.

    I used the ASDM "Wizard of Site to site VPN" to create a connection, which works very well with our main network.

    Following structure:

    Headquarters:

    Cisco ASA 5505, firmware 9.1, ASDM version 7.1

    Outside: Fixed IP

    Inside: IP address of the interface is 192.168.0.1/24 (data network)

    Now I have a second network 192.168.1.0/24 (VoIP network), PBX address is 192.168.1.10.

    The two networks should be accessible through the VPN.

    New installation:

    Cisco ASA 5505, firmware 9.1, ASDM version 7.1

    Outside: Fixed IP

    Inside: IP address of the interface is 192.168.2.1/24

    I have already created a connection until a PC of the new plant reaches the data network. For example, a ping from 192.168.2.100 to 192.168.0.100 is possible.

    Now, I want to add some VoIP phones to the new facility, which can reach the PBX on 192.168.1.10.

    In the link, I have already added the two networks as remote network:

    object-group network Testgroup network-object 192.168.0.0 255.255.255.0 network-object 192.168.1.0 255.255.255.0 access-list outside_cryptomap extended permit ip object-group Testgroup object Remote-Network 

    My problem now is, I don't know what to define as 'Bridge' on my PBX.

    I can't use 192.168.0.1 because it's a different subnet. Also, I can not put a second IP 192.168.1.1 to the interface of the ASA.

    You have any ideas, how can I accomplish this, so that the two subnets are accessed through the VPN and all devices have a defined gateway?

    Could a "Easy VPN Remote" in "Network Mode" you help me?

    What is the difference between 'Site-to-site' and 'extended network '?

    Kind regards

    Daniel condition, look for the solution GmbH

    You can optionally configure a new LAN VIRTUAL (VLAN PBX) on the SAA and connect this interface to the voice network.

    If you do not have a spare on the ASA port, then Yes, you have a router to route traffic from the PBX to the ASA via the data network.

  • Ask about hub and spoke VPN between several sites

    Hello

    I currently have a 'hub' ASA 5505 that connects to 4 sites running 877 routers.

    Since the network hub, I can connect to all the sites fine but what I would do is almost to compartmentalize the different VPN links in small groups.

    The ASA 5505 hub mainly provides IP telephony via the VPN from a PBX allowing users at the other end of the VPN to make outgoing calls and receive incoming calls. However, a couple of the sites would be able to call them internally through the hub. It must obviously be allowed between their different networks of traffic.

    Currently, when you try an internal call rings, but there is no audio data anyway. I guess that's due to restrictions of access list. I don't know yet if what I'm trying to achieve is possible as I'm a bit of a rookie, but any help would be appreciated. I have attached the hub and 2 rays below.

    The ideal final result would be the interconnectivity between the two rays through the hub, it seems reading as its possible, but I do not understand my head around it! It would involve using different subnet to the hub masks?

    Any help would be greatly appreciated!

    Thank you

    Jack

    ASA "hub" VPN config

    network of the OAKOW object
    255.255.255.0 subnet 192.168.12.0
    network of the OAKIV object
    subnet 192.168.11.0 255.255.255.0

    ACL_OAKOW to access extended list ip 192.168.5.0 allow 255.255.255.0 192.168.12.0 255.255.255.0
    ACL_OAKIV to access extended list ip 192.168.5.0 allow 255.255.255.0 192.168.11.0 255.255.255.0

    interface Vlan1

    nameif inside

    security-level 100

    192.168.5.1 IP address 255.255.255.0

    Static NAT to destination for static LAN LAN OAKOW OAKOW source (indoor, outdoor)
    Static NAT to destination for static LAN LAN OAKIV OAKIV source (indoor, outdoor)

    network obj_any object
    NAT dynamic interface (indoor, outdoor)

    Access-group interface incoming outside

    Crypto ipsec transform-set esp-3des esp-sha-hmac HOSTEDTS ikev1
    card crypto HOSTEDMAP 100 corresponds to the address ACL_OAKOW
    card crypto HOSTEDMAP 100 set pfs
    card crypto HOSTEDMAP 100 peer set 4.3.2.1

    card crypto HOSTEDMAP 100 set transform-set HOSTEDTS ikev1
    card crypto HOSTEDMAP 101 corresponds to the address ACL_OAKIV
    card crypto HOSTEDMAP 101 set pfs
    HOSTEDMAP 101 peer set 5.6.7.8 crypto card
    card crypto HOSTEDMAP 101 set transform-set HOSTEDTS ikev1

    HOSTEDMAP interface card crypto outside
    crypto isakmp identity address
    No encryption isakmp nat-traversal
    Crypto ikev1 allow outside
    Crypto ikev1 am - disable

    IKEv1 crypto policy 1
    preshared authentication
    3des encryption
    sha hash
    Group 2
    lifetime 28800

    internal TBOakOW group strategy
    attributes of Group Policy TBOakOW
    Ikev1 VPN-tunnel-Protocol

    internal TBOakIV group strategy
    attributes of Group Policy TBOakIV
    Ikev1 VPN-tunnel-Protocol

    tunnel-group 4.3.2.1 type ipsec-l2l
    tunnel-group 4.3.2.1 General attributes
    Group Policy - by default-TBOakOW

    4.3.2.1 tunnel-group ipsec-attributes
    IKEv1 pre-shared-key *.

    tunnel-group 5.6.7.8 type ipsec-l2l
    tunnel-group 5.6.7.8 General attributes
    Group Policy - by default-TBOakIV
    tunnel-group 5.6.7.8 ipsec-attributes
    IKEv1 pre-shared-key *.

    877 VPN "spoke 1' config '.

    VPDN enable

    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    lifetime 28800

    isakmp encryption key * address 1.2.3.4

    Crypto ipsec transform-set esp-3des esp-sha-hmac TB0ak

    map OakOW 10 ipsec-isakmp crypto
    defined peer 1.2.3.4
    game of transformation-TB0ak
    PFS group2 Set
    match address VPN

    interface Vlan1
    Description - LAN-
    192.168.12.1 IP address 255.255.255.0
    IP nat inside

    interface Dialer0
    card crypto OakOW

    overload of IP nat inside source list NAT interface Dialer0

    NAT extended IP access list
    refuse the 192.168.12.0 ip 0.0.0.255 192.168.5.0 0.0.0.255
    IP 192.168.12.0 allow 0.0.0.255 any
    list of IP - VPN access scope
    IP 192.168.12.0 allow 0.0.0.255 192.168.5.0 0.0.0.255

    877 config VPN "talked about 2'.

    VPDN enable

    crypto ISAKMP policy 1
    BA 3des
    preshared authentication
    Group 2
    lifetime 28800

    isakmp encryption key * address 1.2.3.4

    Crypto ipsec transform-set esp-3des esp-sha-hmac HOSTEDTS

    map TBVPNOak 10 ipsec-isakmp crypto
    defined peer 1.2.3.4

    game of transformation-HOSTEDTS
    PFS group2 Set
    match address ACL-VPN-to-ASA

    interface Vlan1
    Description internal LAN-
    192.168.11.1 IP address 255.255.255.0
    IP nat inside

    interface Dialer0
    card crypto TBVPNOak

    overload of IP nat inside source list NAT interface Dialer0

    IP extended ACL-VPN-to-ASA access list

    ip licensing 192.168.11.0 0.0.0.255 192.168.5.0 0.0.0.255

    NAT extended IP access list
    deny ip 192.168.11.0 0.0.0.255 192.168.5.0 0.0.0.255
    ip licensing 192.168.11.0 0.0.0.255 any

    You must rewrite it ACL on spoke1:

    NAT extended IP access list

    refuse the 192.168.12.0 ip 0.0.0.255 192.168.5.0 0.0.0.255

    refuse the 192.168.12.0 ip 0.0.0.255 192.168.11.0 0.0.0.255

    IP 192.168.12.0 allow 0.0.0.255 any

    list of IP - VPN access scope

    IP 192.168.12.0 allow 0.0.0.255 192.168.5.0 0.0.0.255

    IP 192.168.12.0 allow 0.0.0.255 192.168.11.0 0.0.0.255

    and talk 2:

    NAT extended IP access list

    deny ip 192.168.11.0 0.0.0.255 192.168.5.0 0.0.0.255

    deny ip 192.168.11.0 0.0.0.255 192.168.12.0 0.0.0.255

    ip licensing 192.168.11.0 0.0.0.255 any

    IP extended ACL-VPN-to-ASA access list

    ip licensing 192.168.11.0 0.0.0.255 192.168.5.0 0.0.0.255

    ip licensing 192.168.11.0 0.0.0.255 192.168.12.0 0.0.0.255

    And ACL on SAA

    ACL_OAKOW to access extended list ip 192.168.5.0 allow 255.255.255.0 192.168.12.0 255.255.255.0

    ACL_OAKOW to access extended list ip 192.168.11.0 allow 255.255.255.0 192.168.12.0 255.255.255.0

    ACL_OAKIV to access extended list ip 192.168.5.0 allow 255.255.255.0 192.168.11.0 255.255.255.0

    ACL_OAKIV to access extended list ip 192.168.12.0 allow 255.255.255.0 192.168.11.0 255.255.255.0

    You must allow the traffic of intra-interface:

    permit same-security-traffic intra-interface

    also, you can check the translation NAT nat debug command

    _____________________________________________________________________________

    Help seriously ill children all together. All information on this subject, is posted on my blog

  • Unique password on SAA for VPN access

    Hello

    It is posibble create a unique password on SAA for VPN access?

    I googled a bit and found a few solutions with unique servers from other suppliers.

    I wonder if this is possible without additional hardware/software.

    Hello

    you will need to integrate the VPN with the RSA. they will give you once the configuration of the password tokenized soft or hard token.

    Outside of RSA, there is no other choice I guess.

    I hope this helps.

    Kind regards

    Anisha.

    P.S.: Please mark this message as answered if you feel that your query is resolved. Note the useful messages.

  • Only way ASA Vpn access

    Hello:

    I have configured ASA 5505 to acept Cisco VPN Clients on IP-SEC and access internal subnet of tuneling (added a rule exempt NAT too) and the VPN Clients can connect and work without problems.

    But no internal network or the ASA I can ping or conect to the VPN Clients.

    My configuration:

    Internal network: 172.26.1.0 255.255.255.0

    The VPN Clients network 172.26.2.0 255.255.255.0

    Can you help me?

    Here is my configuration:

    : Saved : ASA Version 7.2(4) ! hostname ciscoasa domain-name ftf.es enable password xxxxxxx encrypted passwd xxxxx encrypted names name 217.125.44.23 IP_publica name 172.26.1.100 Servidor name 192.168.1.3 IP_externa name 192.168.2.3 IP_Externa2 name 172.26.2.0 VPN_Clients ! interface Vlan1 nameif inside security-level 100 ip address 172.26.1.89 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address IP_externa 255.255.255.0 ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 switchport access vlan 12 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 switchport access vlan 13 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive dns server-group DefaultDNS domain-name ftf.es same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group service terminal-server tcp port-object eq 3389 object-group protocol TCPUDP protocol-object udp protocol-object tcp access-list FTFVPN_splitTunnelAcl standard permit 172.26.1.0 255.255.255.0 access-list FTFVPN_Group_splitTunnelAcl standard permit 172.26.1.0 255.255.255.0 access-list outside_access_in extended permit tcp any host IP_externa eq 3389 access-list outside_access_in extended permit object-group TCPUDP any host IP_externa eq www access-list FTF_ADSL2_splitTunnelAcl standard permit any access-list inside_nat0_outbound extended permit ip 172.26.1.0 255.255.255.0 VPN_Clients 255.255.255.0 access-list inside_nat0_outbound extended permit ip 172.26.1.0 255.255.255.0 host 172.26.1.199 access-list outside_nat0_outbound extended permit ip VPN_Clients 255.255.255.0 172.26.1.0 255.255.255.0 pager lines 24 logging enable logging asdm informational mtu inside 1500 mtu outside 1500 ip local pool vpn 172.26.1.180-172.26.1.200 mask 255.255.255.0 ip local pool vpn2 172.26.2.100-172.26.2.200 mask 255.255.255.0 ip local pool vpn3 172.26.3.100-172.26.4.150 mask 255.255.255.0 ip local pool vpn4 172.26.1.240-172.26.1.250 mask 255.255.255.0 ip local pool FTFVPN_Pool 176.26.1.150-176.26.1.170 mask 255.255.255.0 icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-524.bin no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface 3389 Servidor 3389 netmask 255.255.255.255 static (inside,outside) tcp interface www Servidor www netmask 255.255.255.255 access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 192.168.1.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute http server enable http 172.26.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto dynamic-map outside_dyn_map 20 set pfs group1 crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA crypto dynamic-map outside_dyn_map 40 set pfs group1 crypto dynamic-map outside_dyn_map 40 set transform-set TRANS_ESP_3DES_SHA crypto dynamic-map outside_dyn_map 60 set pfs group1 crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA crypto dynamic-map outside_dyn_map 80 set pfs group1 crypto dynamic-map outside_dyn_map 80 set transform-set TRANS_ESP_3DES_SHA crypto dynamic-map outside_dyn_map 100 set pfs group1 crypto dynamic-map outside_dyn_map 100 set transform-set TRANS_ESP_3DES_SHA crypto dynamic-map outside_dyn_map 120 set pfs group1 crypto dynamic-map outside_dyn_map 120 set transform-set ESP-3DES-SHA crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp nat-traversal  20 telnet timeout 5 ssh timeout 5 console timeout 0 dhcpd auto_config outside ! dhcpd address 172.26.1.90-172.26.1.217 inside ! webvpn enable outside url-list FTFVLC "DYNAMICS" cifs://172.26.1.100 1 port-forward TEST 3389 172.26.1.100 3389 Terminal Server group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes banner value Bienvenido a la red de FTF dns-server value 172.26.1.100 80.58.32.97 vpn-tunnel-protocol IPSec l2tp-ipsec webvpn split-tunnel-policy tunnelall default-domain value ftf.es group-policy DfltGrpPolicy attributes banner none wins-server none dns-server none dhcp-network-scope none vpn-access-hours none vpn-simultaneous-logins 3 vpn-idle-timeout 30 vpn-session-timeout none vpn-filter none vpn-tunnel-protocol IPSec l2tp-ipsec webvpn password-storage disable ip-comp disable re-xauth disable group-lock none pfs disable ipsec-udp disable ipsec-udp-port 10000 split-tunnel-policy tunnelall split-tunnel-network-list none default-domain none split-dns none intercept-dhcp 255.255.255.255 disable secure-unit-authentication disable user-authentication disable user-authentication-idle-timeout 30 ip-phone-bypass disable leap-bypass disable nem disable backup-servers keep-client-config msie-proxy server none msie-proxy method no-modify msie-proxy except-list none msie-proxy local-bypass disable nac disable nac-sq-period 300 nac-reval-period 36000 nac-default-acl none address-pools value vpn2 smartcard-removal-disconnect enable client-firewall none client-access-rule none webvpn   functions url-entry   html-content-filter none   homepage none   keep-alive-ignore 4   http-comp gzip   filter none   url-list none   customization value DfltCustomization   port-forward value TEST   port-forward-name value Acceso a aplicaciones   sso-server none   deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information   svc none   svc keep-installer installed   svc keepalive none   svc rekey time none   svc rekey method none   svc dpd-interval client none   svc dpd-interval gateway none   svc compression deflate group-policy FTFVPN_Group internal group-policy FTFVPN_Group attributes dns-server value 172.26.1.100 vpn-tunnel-protocol IPSec l2tp-ipsec split-tunnel-policy tunnelspecified split-tunnel-network-list value FTFVPN_Group_splitTunnelAcl default-domain value ftf.es address-pools value vpn2 group-policy VPNSSL internal group-policy VPNSSL attributes vpn-tunnel-protocol IPSec l2tp-ipsec webvpn webvpn   functions url-entry file-access file-entry file-browsing mapi port-forward filter http-proxy auto-download citrix username raul password xxxxxx encrypted privilege 0 username raul attributes vpn-group-policy FTFVPN_Group tunnel-group DefaultRAGroup general-attributes address-pool vpn2 default-group-policy DefaultRAGroup tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * tunnel-group DefaultWEBVPNGroup general-attributes default-group-policy VPNSSL tunnel-group DefaultWEBVPNGroup webvpn-attributes nbns-server Servidor master timeout 5 retry 3 tunnel-group FTFVPN_Group type ipsec-ra tunnel-group FTFVPN_Group general-attributes address-pool vpn2 default-group-policy FTFVPN_Group tunnel-group FTFVPN_Group ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters   message-length maximum 512 policy-map global_policy class inspection_default   inspect dns preset_dns_map   inspect ftp   inspect h323 h225   inspect h323 ras   inspect rsh   inspect rtsp   inspect esmtp   inspect sqlnet   inspect skinny   inspect sunrpc   inspect xdmcp   inspect sip   inspect netbios   inspect tftp ! service-policy global_policy global prompt hostname context Cryptochecksum:f5e713652d4a2e2623248d7e49086105 : end asdm image disk0:/asdm-524.bin asdm location Servidor 255.255.255.255 inside asdm location IP_publica 255.255.255.255 inside asdm location IP_externa 255.255.255.255 inside asdm location IP_Externa2 255.255.255.255 inside asdm location VPN_Clients 255.255.255.0 inside no asdm history enable 

    Raul,

    I don't see to apply ACLs inside the interface or as vpn-filter that will prevent the PING of the SAA within the intellectual property to the VPN client.

    Are you sure that the VPN client does not have the Windows Firewall on or antivirus software that prevents to respond to PING?

    Federico.

Maybe you are looking for

  • Not a complete print output

    Bought a HP Office Jet 4632 and I wanted to print a 9 page document - double face.  He did it great, but does not print the first 3 pages - only the last 6.  I can't find answers on the maximum number of pages.  Can someone help me?

  • will have problems upgrading to windows 7 on my windows free 10.

    Firstly can not activate my windows key 7, then each attempt to upgrade my windows rights reserved 10, now also shows an error 0x8020000F - 0 x 90017 code. How can I solve this, in order to download and install the free windows reserved 10 on my syst

  • U2713H / white point Calibration Software Dell precision

    System: Windows 8 x 64 Calibration equipment: i1Display Pro Hardware calibration: Calibration Dell - 1.0.0 software 1.0.1 1.5.1 Calibration of the software: Argyll v1.6.2, dispcalGUI v1.5.3.1 (spectral correction matrix) Monitor: U2713H I tried to ca

  • Display values in the columns separated by commas.

    Hello worldTable 1col1 col2ID1Name1ID2name2ID3Name3Table 2col1 col2RQ11RQ23, 2rQ32, 3Result tablecol1 col2RQ1Name1RQ2Name2, Name3rQ3name2, Name3Based on table 1 and table 2 to create a view to produce a result array.Ideas experts!

  • What to write html head

    What's the difference: head of html in the site properties or keywordsHow should I write html head