VPN connected but unable to reach other interfaces
I have installation of remote access vpn and I can connect without any problems. I assigned the vpn a pool of addresses at the end of my home subnet of the interface. When it is connected I can ping any device on that subnet, I can also connect to my passage on the same subnet via my browser. I can't access however all devices located in my DMZ when logged in. This is a new configuration, I tested, but I need the vpn user to use rdp to connect to machines in the DMZ. I enclose my config that any advice would be greatly appreciated.
Output from the command: 'show running-config '.
: Saved
:
ASA Version 8.2 (1)
!
hostname ASA1
domain name
activate the encrypted password
2KFQnbNIdI.2KYOU encrypted passwd
names of
name 10.10.10.3
name 10.10.10.4
name 10.10.10.5
name 10.10.10.6
name 10.10.10.7
name 10.10.10.8
!
interface Ethernet0/0
nameif outside
security-level 0
address IP 38. ***. ***. 2 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
IP 192.1.168.1 255.255.255.0
!
interface Ethernet0/2
nameif DMZ
security-level 50
IP 10.10.10.1 255.255.255.0
!
interface Ethernet0/3
Shutdown
No nameif
no level of security
no ip address
!
interface Management0/0
nameif management
security-level 100
IP 192.168.1.1 255.255.255.0
management only
!
passive FTP mode
DNS domain-lookup outside
DNS lookup field inside
DNS domain-lookup DMZ
DNS server-group DefaultDNS
Server name *. 28.0.45
Server name *. 28.0.61
domain name
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
Outside_access_in list extended access permit tcp any host 38. ***. ***. 5 eq 3389
Access extensive list ip 192.1.168.0 Outside_nat0_outbound allow 255.255.255.0 192.1.168.240 255.255.255.240 Outside_nat0_outbound to access extended list ip 10.10.10.0 allow 255.255.255.0 192.1.168.240 255.255.255.240 Fruitionvpn_splitTunnelAcl_2 list standard access allowed 10.10.10.0 255.255.255.0 Standard access list Fruitionvpn_splitTunnelAcl_2 allow 192.1.168.0 255.255.255.0 Standard access list Fruitionvpn_splitTunnelAcl_2 allow 38.101.248.0 255.255.255.0 Access extensive list ip 192.1.168.0 Inside_nat0_outbound allow 255.255.255.0 192.1.168.240 255.255.255.240 Allow Outside_nat0_outbound_1 to access ip 38 extended list. ***. ***. 0 255.255.255.0 192.1.168.240 255.255.255.240 pager lines 24 Enable logging asdm of logging of information Outside 1500 MTU Within 1500 MTU MTU 1500 DMZ management of MTU 1500 192.1.168.240 - 192.1.168.254 vpn IP local pool ICMP unreachable rate-limit 1 burst-size 1 don't allow no asdm history ARP timeout 14400 NAT-control Overall (101 outside interface) Global (DMZ) 2 10.10.10.2 - 10.10.10.254 netmask 255.255.255.0 NAT (outside) 0-list of access Outside_nat0_outbound NAT (0 Outside_nat0_outbound_1 list of outdoor outdoor access) NAT (inside) 0-list of access Inside_nat0_outbound NAT (inside) 101 192.1.168.0 255.255.255.0 NAT (DMZ) 101 10.10.10.0 255.255.255.0 static (DMZ, outside) 38. ***. ***. 5 Webserver2 netmask 255.255.255.255 Access-group Outside_access_in in interface outside Route outside 0.0.0.0 0.0.0.0 38. ***. ***. 1 1 Timeout xlate 03:00 Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00 Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00 Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 dynamic-access-policy-registration DfltAccessPolicy Enable http server http 192.168.1.0 255.255.255.0 management No snmp server location No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 pfs Group1 set
Crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 value transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA MD5-ESP-3DES ESP-DES-SHA ESP-DES-MD5
management_map card crypto 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
crypto management_map interface card management
card crypto DMZ_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
card crypto DMZ_map DMZ interface
card crypto Inside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
Inside_map interface card crypto inside
card crypto Outside_map 65535-isakmp dynamic ipsec SYSTEM_DEFAULT_CRYPTO_MAP
Outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP allow inside
crypto ISAKMP enable DMZ
activate the crypto isakmp management
crypto ISAKMP policy 10
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
dhcpd address 192.1.168.3 - 192.1.168.254 inside
!
management of 192.168.1.2 - dhcpd address 192.168.1.254
enable dhcpd management
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
internal Fruitionvpn group strategy
attributes of Group Policy Fruitionvpn
value of 66.28.0.45 DNS server 66.28.0.61
Protocol-tunnel-VPN IPSec
Split-tunnel-policy tunnelspecified
value of Split-tunnel-network-list Fruitionvpn_splitTunnelAcl_2
fruition of value by default-field
username privilege 15 encrypted password y4A2QiB9t5hlOCGW ksuber
username ksuber attributes
VPN-group-policy Fruitionvpn
type tunnel-group Fruitionvpn remote access
attributes global-tunnel-group Fruitionvpn
vpn address pool
Group Policy - by default-Fruitionvpn
IPSec-attributes tunnel-group Fruitionvpn
pre-shared-key *.
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the rsh
inspect the rtsp
inspect esmtp
inspect sqlnet
inspect the skinny
inspect sunrpc
inspect xdmcp
inspect the sip
inspect the netbios
inspect the tftp
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:a5ec2459f53c4f1fa34d267a6903bea9
: end
a few suggestions
1. use a network address in a different subnet within the network for the client vpn IP pool. saying 192.168.10.0/24
2. enable nat 0 on dmz interface
no_nat_dmz 10.10.10.0 ip access list allow 255.255.255.0 192.168.10.0 255.255.255.0
NAT (DMZ) 0-list of access no_nat_dmz
Tags: Cisco Security
Similar Questions
-
I am trying to create a VPN connection, but it does not work
I am trying to create a VPN connection, but it does not work
The wizard cannot establish a connection. And if I try to record simply does not connect
It does not work. If I try to click on find the problem, there simply
do nothing.
I tried it on another pc, where it worked. So the problem is not the
router or data network. And the curious thing is that I installed it before, but only from one day to the other, the VPN connection was missing.It does not create even a the connection icon
Thank youTry a system restore to a Date before the problem began:
Restore point:
http://www.howtogeek.com/HOWTO/Windows-Vista/using-Windows-Vista-system-restore/
Do Safe Mode system restore, if it is impossible to do in Normal Mode.
Try typing F8 at startup and in the list of Boot selections, select Mode safe using ARROW top to go there > and then press ENTER.
Try a restore of the system once, to choose a Restore Point prior to your problem...
Click Start > programs > Accessories > system tools > system restore > choose another time > next > etc.
http://www.windowsvistauserguide.com/system_restore.htm
Read the above for a very good graph shows how backward more than 5 days in the System Restore Points by checking the correct box.
See you soon.
Mick Murphy - Microsoft partner
-
I am trying to create a VPN connection, but when I get to the step that allows me to create the VPN, the radial buttons are grayed out, it is a Windows component is missing and does not allow me to create VPN. I am running Windows XP Home addition. I recently got a Malware attack and had the quarantine and fix trojen attempts. After the restoration, I found that my previous VPN connection was broken. When I tried to add a new connection, I'm stuck on the screen connection virtual network in the the radial button private network connection wizard is grayed out, he could not check.
Hello
Your Windows XP question is more complex than what is generally answered in the Microsoft Answers forums. It is better suited for the IT Pro TechNet public. Please post your question in the Windows XP TechNet forum. You can follow the link to your question:
http://social.technet.Microsoft.com/forums/en/itproxpsp/threads
-
Computer shows it's connected, but unable to connect to the Internet
Original title: also connected but unable to connect
I have a HP Pavilion a1710n 64 Dual Core Processor running Windows Vista Home Premium.
The computer shows that I am connected to the internet, but I can't connect to IE or firefox.
My Internet Protocol Version4(TCP/IPv4) properties shows that the two buttons marked for obtain an IP address automatically as well as the use the following DNS server address.
My network card is NVIDIA 10/100/1000 Mbit / s, and the computer shows that it works correctly. I tried to do a back roller and re - put to date but still the two marked buttons.
Large number of background information...
I was trying to understand why the windows installer did not work on my son's account. I went in systems and changed to start and automatic manual. Rebooted PC and the firewall do not come. Tried to do a restore, but failed and lost all my restore points.
At this point, I lost my internet connection to know after vainly trying to figure out the problem I contacted an ATT(my internet server) of things ATT me had to do was change the properties to get the use of a DNS server address automatically and had typing me the address. After reviewing the many things ATT concluded there was not a problem with my connection and the PC is configured correctly and suggested that I should speak to technical support and of course, it was not free.
Tech support determined there was something that crashes me to connect to the internet and had run me malwarebytes. He detected 24 traces of adware and 2 traces of a virus in the registry database. I deleted everything and still no connection to the internet. Next Tech had me run Combofix and says everything should run fine after that. Still no connection to know Tech # 3 had executed me guests of orders with ping commands. Finally, he had me check the auto config button and that's where I discovered the two buttons were lit. Tech said "can't be." Well it is. That's when I tried to roll back the driver, but no luck so tech says only option is to restore the whole system.
GRRRR... After several internet searches that I'm about to do except nothings saved and whenever I try to use my backup and restore fails.
Any help would be appreciated. I'm still fairly new to PCs so please be patient with me. Laughing out loud
I know that my options have been counted, I was able to save what was important and made a full system recovery. I am happy to say that I'm back on the internet.
Thank you very much for your help and support. I learned a lot on my computer, as well in location wonderful are the microsoft forums :)
-
I created a vpn connection, but can I create a shortcut to connect every time?
I created a vpn connection, but can I create a shortcut to connect every time?
I created a vpn connection, but can I create a shortcut to connect every time?
Open network and sharing Center, go to the Edit card settings window and drag the VPN icon on your desktop.
-
There was problem, order processing, please contact customer care on 8000-448-1642. But unable to reach them. Please notify
Please contact support:
I hope this helps.
Concerning
Megha Rawat
-
I am connected but unable to find the page 'My orders' (required to download the program I already bought).
Under Plans & products, please click view all
The next screen should show the order history with a link to "View your orders"
Find downloaded files Adobe and apps
Please let us know if you still have any questions.
Kind regards
Bev
-
VPN connects but no remote LAN access
Hello
I'll put up on a PIX 501 VPN remote access.
When I try to connect via VPN software, I am able to connect but I am unable to access LAN resources.
I have pasted below part of which seems relevant to my setup. I'm stuck on this issue, could someone help me? Thanks in advance.
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
test.local domain name
name 10.0.2.0 inside
name 10.0.2.13 MSExchange-en
2.2.2.2 the MSExchange-out nameoutside_access_in tcp allowed access list all gt 1023 host 2.2.2.2 eq smtp
outside_access_in list access permit tcp any host 2.2.2.2 eq https
outside_access_in list access permit tcp any host 2.2.2.2 eq www
inside_outbound_nat0_acl 10.0.2.0 ip access list allow 255.255.255.0 192.168.235.0 255.255.255.192
access-list 101 permit icmp any one3.3.3.3 exterior IP address 255.255.255.0
IP address inside 10.0.2.254 255.255.255.0
IP local pool vpn_pool 192.168.235.1 - 192.168.235.15
IP local pool vpn_pool_2 192.168.235.16 - 192.168.235.401 3.3.3.4 (outside) global
NAT (inside) 0-list of access inside_outbound_nat0_acl
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
static (inside, outside) 2.2.2.2 10.0.2.13 netmask 255.255.255.255 1000 1000
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 3.3.3.1 1RADIUS Protocol RADIUS AAA server
AAA-server RADIUS (inside) host 10.0.2.3 * timeout 10
AAA-server local LOCAL ProtocolPermitted connection ipsec sysopt
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto-map dynamic dynmap 10 game of transformation-ESP-3DES-MD5
map outside_map 90-isakmp ipsec crypto dynamic dynmap
card crypto outside_map the LOCAL RADIUS client authentication
outside_map interface card crypto outside
ISAKMP allows outside
part of pre authentication ISAKMP policy 20
ISAKMP policy 20 3des encryption
ISAKMP policy 20 md5 hash
20 2 ISAKMP policy group
ISAKMP duration strategy of life 20 86400
vpngroup signal address vpn_pool pool
vpngroup dns-server 10.0.2.3 signal
vpngroup default-field test.local signal
vpngroup idle time 1800 signal
vpngroup max-time 14400 signal
signal vpngroup password *.
vpngroup TF vpn_pool_2 address pool
vpngroup dns-server 10.0.2.3 TF
TF vpngroup default-domain test.local
vpngroup TF 1800 idle time
vpngroup max-time 14400 TF
TF vpngroup password *.Kind regards
Joana
Very similar to the question of the configuration of the switch. You should check if there is no specific roads on the switch outside the default gateway. The switch should route the subnet pool ip to the firewall (10.0.2.254).
-
Cisco ipsec Vpn connects but cannot communicate with lan
I have a version of cisco 1921 15.2 (4) M3 I install vpn ipsec and may have customers to connect but cannot ping anything inside. A glimpse of what could be wrong with my config would be greatly appreciated. I posted the configuration as well as running a few outings of ipsec. I also tried with multiple operating systems using cisco vpn client and shrewsoft. I am able to connect to the other VPN ipsec running 1921 both of these computers by using a client.
Thanks for any assistance
SH run
!
AAA new-model
!
!
AAA authentication login radius_auth local radius group
connection of AAA VPN_AUTHEN group local RADIUS authentication
AAA authorization network_vpn_author LAN
!
!
!
!
!
AAA - the id of the joint session
clock timezone PST - 8 0
clock to summer time recurring PST
!
no ip source route
decline of the IP options
IP cef
!
!
!
!
!
!
no ip bootp Server
no ip domain search
domain IP XXX.local
inspect the high IP 3000 max-incomplete
inspect the low IP 2800 max-incomplete
IP inspect a low minute 2800
IP inspect a high minute 3000
inspect the IP icmp SDM_LOW name
inspect the IP name SDM_LOW esmtp
inspect the tcp IP SDM_LOW name
inspect the IP udp SDM_LOW name
IP inspect name SDM_LOW ssh
No ipv6 cef
!
Authenticated MultiLink bundle-name Panel
!
!
Crypto pki trustpoint TP-self-signed-2909270577
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 2909270577
revocation checking no
rsakeypair TP-self-signed-2909270577
!
!
TP-self-signed-2909270577 crypto pki certificate chain
certificate self-signed 01
license udi pid CISCO1921/K9 sn FTX1715818R
!
!
Archives
The config log
Enable logging
size of logging 1000
notify the contenttype in clear syslog
the ADMIN_HOSTS object-group network
71.X.X.X 71.X.X.X range
!
name of user name1 secret privilege 15 4 XXXXXXX!
redundancy
!
!
!
!
!
property intellectual ssh time 60
property intellectual ssh authentication-2 retries
property intellectual ssh event logging
property intellectual ssh version 2
!
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
!
ISAKMP crypto client configuration group roaming_vpn
key XXXXX
DNS 192.168.10.10 10.1.1.1
XXX.local field
pool VPN_POOL_1
ACL client_vpn_traffic
netmask 255.255.255.0
!
!
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
tunnel mode
!
!
!
crypto dynamic-map VPN_DYNMAP_1 1
Set the security association idle time 1800
game of transformation-ESP-3DES-SHA
market arriere-route
!
!
list of authentication of card crypto SDM_CMAP_1 client VPN_AUTHEN
map SDM_CMAP_1 isakmp authorization list network_vpn_author crypto
client configuration address map SDM_CMAP_1 crypto answer
map SDM_CMAP_1 65535-isakmp dynamic VPN_DYNMAP_1 ipsec crypto
!
!
!
!
!
the Embedded-Service-Engine0/0 interface
no ip address
Shutdown
!
interface GigabitEthernet0/0
IP 76.W.E.R 255.255.255.248
IP access-group ATT_Outside_In in
no ip redirection
no ip unreachable
no ip proxy-arp
NAT outside IP
inspect the SDM_LOW over IP
IP virtual-reassembly in
load-interval 30
automatic duplex
automatic speed
No cdp enable
No mop enabled
map SDM_CMAP_1 crypto
!
interface GigabitEthernet0/1
no ip address
load-interval 30
automatic duplex
automatic speed
!
interface GigabitEthernet0/1.10
encapsulation dot1Q 1 native
IP 192.168.10.1 255.255.255.0
no ip redirection
no ip unreachable
no ip proxy-arp
property intellectual accounting-access violations
IP nat inside
IP virtual-reassembly in
!
interface GigabitEthernet0/1.100
encapsulation dot1Q 100
10.1.1.254 IP address 255.255.255.0
no ip redirection
no ip unreachable
no ip proxy-arp
IP nat inside
IP virtual-reassembly in
!
interface GigabitEthernet0/1,200
encapsulation dot1Q 200
IP 10.1.2.254 255.255.255.0
no ip redirection
no ip unreachable
no ip proxy-arp
IP nat inside
IP virtual-reassembly in
IP tcp adjust-mss 1452
!
local IP VPN_POOL_1 192.168.168.193 pool 192.168.168.254
IP forward-Protocol ND
!
IP http server
IP http authentication aaa-authentication of connection ADMIN_AUTHEN
IP http secure server
IP http timeout policy slowed down 60 life 86400 request 10000
!
IP nat inside source map route ATT_NAT_LIST interface GigabitEthernet0/0 overload
IP nat inside source static tcp 192.168.10.10 25 expandable 25 76.W.E.R
IP nat inside source static tcp 192.168.10.10 80 76.W.E.R 80 extensible
IP nat inside source static tcp 192.168.10.10 76.W.E.R expandable 443 443
IP nat inside source static tcp 192.168.10.10 76.W.E.R expandable 987 987
IP route 0.0.0.0 0.0.0.0 76.W.E.F
!
ATT_Outside_In extended IP access list
permit tcp object-group ADMIN_HOSTS any eq 22
allow any host 76.W.E.R eq www tcp
allow any host 76.W.E.R eq 443 tcp
allow 987 tcp any host 76.W.E.R eq
allow any host 76.W.E.R eq tcp smtp
permit any any icmp echo response
allow icmp a whole
allow udp any any eq isakmp
allow an esp
allow a whole ahp
permit any any eq non500-isakmp udp
deny ip 10.0.0.0 0.255.255.255 everything
deny ip 172.16.0.0 0.15.255.255 all
deny ip 192.168.0.0 0.0.255.255 everything
deny ip 127.0.0.0 0.255.255.255 everything
refuse the ip 255.255.255.255 host everything
refuse the host ip 0.0.0.0 everything
NAT_LIST extended IP access list
IP 10.1.0.0 allow 0.0.255.255 everything
permit ip 192.168.10.0 0.0.0.255 any
deny ip 192.168.10.0 0.0.0.255 192.168.168.192 0.0.0.63
refuse the 10.1.1.0 ip 0.0.0.255 192.168.168.192 0.0.0.63
deny ip 10.1.2.0 0.0.0.255 192.168.168.192 0.0.0.63
client_vpn_traffic extended IP access list
permit ip 192.168.10.0 0.0.0.255 192.168.168.192 0.0.0.63
ip licensing 10.1.1.0 0.0.0.255 192.168.168.192 0.0.0.63
IP 10.1.2.0 allow 0.0.0.255 10.1.1.0 0.0.0.255
!
radius of the IP source-interface GigabitEthernet0/1.10
Logging trap errors
logging source hostname id
logging source-interface GigabitEthernet0/1.10
!
ATT_NAT_LIST allowed 20 route map
corresponds to the IP NAT_LIST
is the interface GigabitEthernet0/0
!
!
SNMP-server community [email protected] / * /! s RO
Server enable SNMP traps snmp authentication linkdown, linkup warmstart cold start
Server enable SNMP traps vrrp
Server SNMP enable transceiver traps all the
Server enable SNMP traps ds1
Enable SNMP-Server intercepts the message-send-call failed remote server failure
Enable SNMP-Server intercepts ATS
Server enable SNMP traps eigrp
Server enable SNMP traps ospf-change of State
Enable SNMP-Server intercepts ospf errors
SNMP Server enable ospf retransmit traps
Server enable SNMP traps ospf lsa
Server enable SNMP traps ospf nssa-trans-changes state cisco-change specific
SNMP server activate interface specific cisco-ospf traps shamlink state change
SNMP Server enable neighbor traps cisco-specific ospf to the State shamlink change
Enable SNMP-Server intercepts specific to cisco ospf errors
SNMP server activate specific cisco ospf retransmit traps
Server enable SNMP traps ospf cisco specific lsa
SNMP server activate license traps
Server enable SNMP traps envmon
traps to enable SNMP-Server ethernet cfm cc mep-top low-mep Dispatcher loop config
Enable SNMP-Server intercepts ethernet cfm overlap missing mep mep-unknown service-up
Server enable SNMP traps auth framework sec-violation
Server enable SNMP traps c3g
entity-sensor threshold traps SNMP-server enable
Server enable SNMP traps adslline
Server enable SNMP traps vdsl2line
Server enable SNMP traps icsudsu
Server enable SNMP traps ISDN call-information
Server enable SNMP traps ISDN layer2
Server enable SNMP traps ISDN chan-not-available
Server enable SNMP traps ISDN ietf
Server enable SNMP traps ds0-busyout
Server enable SNMP traps ds1-loopback
SNMP-Server enable traps energywise
Server enable SNMP traps vstack
SNMP traps enable mac-notification server
Server enable SNMP traps bgp cbgp2
Enable SNMP-Server intercepts isis
Server enable SNMP traps ospfv3-change of State
Enable SNMP-Server intercepts ospfv3 errors
Server enable SNMP traps aaa_server
Server enable SNMP traps atm subif
Server enable SNMP traps cef resources-failure-change of State peer peer-fib-state-change inconsistency
Server enable SNMP traps memory bufferpeak
Server enable SNMP traps cnpd
Server enable SNMP traps config-copy
config SNMP-server enable traps
Server enable SNMP traps config-ctid
entity of traps activate SNMP Server
Server enable SNMP traps fru-ctrl
SNMP traps-policy resources enable server
Server SNMP enable traps-Manager of event
Server enable SNMP traps frames multi-links bundle-incompatibility
SNMP traps-frame relay enable server
Server enable SNMP traps subif frame relay
Server enable SNMP traps hsrp
Server enable SNMP traps ipmulticast
Server enable SNMP traps msdp
Server enable SNMP traps mvpn
Server enable SNMP traps PNDH nhs
Server enable SNMP traps PNDH nhc
Server enable SNMP traps PNDH PSN
Server enable SNMP traps PNDH exceeded quota
Server enable SNMP traps pim neighbor-rp-mapping-change invalid-pim-message of change
Server enable SNMP traps pppoe
Enable SNMP-server holds the CPU threshold
SNMP Server enable rsvp traps
Server enable SNMP traps syslog
Server enable SNMP traps l2tun session
Server enable SNMP traps l2tun pseudowire status
Server enable SNMP traps vtp
Enable SNMP-Server intercepts waas
Server enable SNMP traps ipsla
Server enable SNMP traps bfd
Server enable SNMP traps gdoi gm-early-registration
Server enable SNMP traps gdoi full-save-gm
Server enable SNMP traps gdoi gm-re-register
Server enable SNMP traps gdoi gm - generate a new key-rcvd
Server enable SNMP traps gdoi gm - generate a new key-fail
Server enable SNMP traps gdoi ks - generate a new key-pushed
Enable SNMP traps gdoi gm-incomplete-cfg Server
Enable SNMP-Server intercepts gdoi ks-No.-rsa-keys
Server enable SNMP traps gdoi ks-new-registration
Server enable SNMP traps gdoi ks-reg-complete
Enable SNMP-Server Firewall state of traps
SNMP-Server enable traps ike policy add
Enable SNMP-Server intercepts removal of ike policy
Enable SNMP-Server intercepts start ike tunnel
Enable SNMP-Server intercepts stop ike tunnel
SNMP server activate ipsec cryptomap add traps
SNMP server activate ipsec cryptomap remove traps
SNMP server activate ipsec cryptomap attach traps
SNMP server activate ipsec cryptomap detach traps
Server SNMP traps enable ipsec tunnel beginning
SNMP-Server enable traps stop ipsec tunnel
Enable SNMP-server holds too many associations of ipsec security
Enable SNMP-Server intercepts alarm ethernet cfm
Enable SNMP-Server intercepts rf
Server enable SNMP traps vrfmib vrf - up low-vrf vnet-trunk-up low-trunk-vnet
Server RADIUS dead-criteria life 2
RADIUS-server host 192.168.10.10
Server RADIUS 2 timeout
Server RADIUS XXXXXXX key
!
!
!
control plan
!
!Line con 0
privilege level 15
connection of authentication radius_auth
line to 0
line 2
no activation-character
No exec
preferred no transport
transport of entry all
transport output pad rlogin lapb - your MOP v120 udptn ssh telnet
StopBits 1
line vty 0 4
privilege level 15
connection of authentication radius_auth
entry ssh transport
line vty 5 15
privilege level 15
connection of authentication radius_auth
entry ssh transport
!
Scheduler allocate 20000 1000
NTP-Calendar Update
Server NTP 192.168.10.10
NTP 64.250.229.100 Server
!
endRouter ipsec crypto #sh her
Interface: GigabitEthernet0/0
Tag crypto map: SDM_CMAP_1, local addr 76.W.E.Rprotégé of the vrf: (none)
local ident (addr, mask, prot, port): (0.0.0.0/0.0.0.0/0/0)
Remote ident (addr, mask, prot, port): (192.168.168.213/255.255.255.255/0/0)
current_peer 75.X.X.X port 2642
LICENCE, flags is {}
#pkts program: 1953, #pkts encrypt: 1953, #pkts digest: 1953
#pkts decaps: 1963, #pkts decrypt: 1963, #pkts check: 1963
compressed #pkts: 0, unzipped #pkts: 0
#pkts uncompressed: 0, #pkts compr. has failed: 0
#pkts not unpacked: 0, #pkts decompress failed: 0
Errors #send 0, #recv 0 errorslocal crypto endpt. : 76.W.E.R, remote Start crypto. : 75.X.X.X
Path mtu 1500, mtu 1500 ip, ip mtu IDB GigabitEthernet0/0
current outbound SPI: 0x5D423270 (1564619376)
PFS (Y/N): N, Diffie-Hellman group: noSAS of the esp on arrival:
SPI: 0x2A5177DD (709982173)
transform: esp-3des esp-sha-hmac.
running parameters = {Tunnel UDP-program}
Conn ID: 2115, flow_id: VPN:115 on board, sibling_flags 80000040, crypto card: SDM_CMAP_1
calendar of his: service life remaining (k/s) key: (4301748/2809)
Size IV: 8 bytes
support for replay detection: Y
Status: ACTIVE (ACTIVE)the arrival ah sas:
SAS of the CFP on arrival:
outgoing esp sas:
SPI: 0x5D423270 (1564619376)
transform: esp-3des esp-sha-hmac.
running parameters = {Tunnel UDP-program}
Conn ID: 2116, flow_id: VPN:116 on board, sibling_flags 80000040, crypto card: SDM_CMAP_1
calendar of his: service life remaining (k/s) key: (4301637/2809)
Size IV: 8 bytes
support for replay detection: Y
Status: ACTIVE (ACTIVE)outgoing ah sas:
outgoing CFP sas:
Routing crypto isakmp #sh its
IPv4 Crypto ISAKMP Security Association
DST CBC conn-State id
76.W.E.R 75.X.X.X QM_IDLE 1055 ACTIVEIPv6 Crypto ISAKMP Security Association
In your acl, nat, you will need to refuse your VPN traffic before you allow the subnet at all. Just put all the declarations of refusal before the declarations of licence.
Sent by Cisco Support technique iPhone App
-
established - VPN connection, but cannot connect to the server?
vpn connection AnyConnect is implemented - but cannot connect to the server? The server IP is 192.168.0.4
Thank you
ASA Version 8.2 (1)
!
hostname ciscoasa5505
names of
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.0.3 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP 208.0.0.162 255.255.255.248
!
interface Vlan5
Shutdown
prior to interface Vlan1
nameif dmz
security-level 50
IP address dhcp setroute
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passive FTP mode
clock timezone PST - 8
clock summer-time recurring PDT
DNS lookup field inside
DNS server-group DefaultDNS
192.168.0.4 server name
Server name 208.0.0.11
permit same-security-traffic intra-interface
object-group Protocol TCPUDP
object-protocol udp
object-tcp protocol
object-group service TS-780-tcp - udp
port-object eq 780
object-group service Graphon tcp - udp
port-object eq 491
Allworx-2088 udp service object-group
port-object eq 2088
object-group service allworx-15000 udp
15000 15511 object-port Beach
object-group service udp allworx-2088
port-object eq 2088
object-group service allworx-5060 udp
port-object eq sip
object-group service allworx-8081 tcp
EQ port 8081 object
object-group service web-allworx tcp
EQ object of port 8080
allworx udp service object-group
16001 16010 object-port Beach
object-group service allworx-udp
object-port range 16384-16393
object-group service remote tcp - udp
port-object eq 779
object-group service billing1 tcp - udp
EQ object of port 8080
object-group service billing-1521 tcp - udp
port-object eq 1521
object-group service billing-6233 tcp - udp
6233 6234 object-port Beach
object-group service billing2-3389 tcp - udp
EQ port 3389 object
object-group service olivia-3389 tcp - udp
EQ port 3389 object
object-group service olivia-777-tcp - udp
port-object eq 777
netgroup group of objects
network-object host 192.168.0.15
network-object host 192.168.0.4
object-group service allworx1 tcp - udp
8080 description
EQ object of port 8080
allworx_15000 udp service object-group
15000 15511 object-port Beach
allworx_16384 udp service object-group
object-port range 16384-16393
DM_INLINE_UDP_1 udp service object-group
purpose of group allworx_16384
object-port range 16384 16403
object-group service allworx-5061 udp
range of object-port 5061 5062
object-group service ananit tcp - udp
port-object eq 880
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.164 object-group billing-6233
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.164 object-group billing-1521
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.164 object-group billing2-3389
outside_access_in list extended access permit tcp any host 208.0.0.164 eq https
outside_access_in list extended access permit tcp any host 208.0.0.164 eq www
outside_access_in list extended access permit tcp any host 208.0.0.164 eq ftp
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.164 object-group billing1
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.162 EQ field
outside_access_in list extended access permit tcp any host 208.0.0.162 eq www
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.162 remote object-group
outside_access_in list extended access permit tcp any host 208.0.0.162 eq smtp
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.162 object-group olivia-777
outside_access_in list extended access permit udp any host 208.0.0.162 - group Allworx-2088 idle object
outside_access_in list extended access permit udp any host 208.0.0.162 object-group inactive allworx-5060
outside_access_in list extended access permit tcp any host 208.0.0.162 object-group web-allworx inactive
outside_access_in list extended access permit tcp any host 208.0.0.162 object-group inactive allworx-8081
outside_access_in list extended access permit udp any host 208.0.0.162 object-group inactive allworx-15000
outside_access_in list extended access permit udp any host 208.0.0.162 DM_INLINE_UDP_1 idle object-group
outside_access_in list extended access permit udp any host 208.0.0.162 object-group inactive allworx-5061
outside_access_in list extended access allowed object-group TCPUDP any host 208.0.0.162 inactive ananit object-group
outside_access_in list extended access deny ip host 151.1.68.194 208.0.0.164
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 172.16.0.0 255.255.0.0
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.1.0 255.255.255.0
permit access ip 192.168.0.0 scope list outside_20_cryptomap 255.255.255.0 172.16.0.0 255.255.0.0
Ping list extended access permit icmp any any echo response
inside_access_in of access allowed any ip an extended list
permit access ip 192.168.0.0 scope list outside_cryptomap 255.255.255.0 192.168.1.0 255.255.255.0
access-list 1 standard allow 192.168.0.0 255.255.255.0
pager lines 24
Enable logging
logging buffered stored notifications
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
MTU 1500 dmz
IP local pool 192.168.100.30 - 192.168.100.60 mask 255.255.255.0 remote_pool
192.168.0.20 mask - distance local pool 255.255.255.0 IP 192.168.0.50
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0-list of access inside_nat0_outbound
NAT (inside) 1 0.0.0.0 0.0.0.0
NAT (outside) 1 192.168.0.0 255.255.255.0
alias (inside) 192.168.0.4 99.63.129.65 255.255.255.255
public static tcp (indoor, outdoor) interface 192.168.0.4 smtp smtp netmask 255.255.255.255
public static tcp (indoor, outdoor) interface field 192.168.0.4 netmask 255.255.255.255 area
public static tcp (indoor, outdoor) interface 192.168.0.4 www www netmask 255.255.255.255
public static tcp (indoor, outdoor) interface 777 192.168.0.15 777 netmask 255.255.255.255
public static tcp (indoor, outdoor) interface 779 192.168.0.4 779 netmask 255.255.255.255
public static (inside, outside) udp interface field 192.168.0.4 netmask 255.255.255.255 area
public static tcp (indoor, outdoor) interface 880 192.168.0.16 880 netmask 255.255.255.255
static (inside, outside) 208.0.0.164 tcp 3389 192.168.0.185 3389 netmask 255.255.255.255
inside_access_in access to the interface inside group
Access-group outside_access_in in interface outside
Route outside 0.0.0.0 0.0.0.0 208.0.0.161 1
Route inside 192.168.50.0 255.255.255.0 192.168.0.1 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
Enable http server
http 192.168.0.0 255.255.255.0 inside
http 192.168.0.3 255.255.255.255 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Sysopt noproxyarp inside
Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac
Crypto ipsec transform-set ESP-AES-256-SHA 256 - aes - esp esp-sha-hmac
Crypto ipsec transform-set ESP-AES-128-MD5-esp - aes esp-md5-hmac
Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac
Crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
Crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
Crypto ipsec transform-set ESP-3DES-MD5-esp-3des esp-md5-hmac
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 1 match address outside_cryptomap
card crypto outside_map 1 set pfs
peer set card crypto outside_map 1 108.0.0.97
card crypto outside_map 1 set of transformation-ESP-3DES-SHA
card crypto outside_map 20 match address outside_20_cryptomap
card crypto outside_map 20 set pfs
peer set card crypto outside_map 20 69.0.0.54
outside_map crypto 20 card value transform-set ESP-3DES-SHA
outside_map interface card crypto outside
crypto ISAKMP allow outside
crypto ISAKMP policy 5
preshared authentication
3des encryption
sha hash
Group 2
life no
crypto ISAKMP policy 30
preshared authentication
3des encryption
sha hash
Group 1
life no
Telnet timeout 5
SSH timeout 5
Console timeout 0
identifying client DHCP-client interface dmz
dhcpd outside auto_config
!
dhcpd address 192.168.0.20 - 192.168.0.50 inside
dhcpd dns 192.168.0.4 208.0.0.11 interface inside
dhcpd allow inside
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
allow outside
SVC disk0:/anyconnect-win-2.5.2014-k9.pkg 1 image
enable SVC
tunnel-group-list activate
attributes of Group Policy DfltGrpPolicy
internal group anyconnect strategy
attributes of the strategy group anyconnect
VPN-tunnel-Protocol svc webvpn
WebVPN
list of URLS no
SVC request enable
encrypted olivia Zta1M8bCsJst9NAs password username
username of graciela CdnZ0hm9o72q6Ddj encrypted password
tunnel-group 69.0.0.54 type ipsec-l2l
IPSec-attributes tunnel-group 69.0.0.54
pre-shared-key *.
tunnel-group 108.0.0.97 type ipsec-l2l
IPSec-attributes tunnel-group 108.0.0.97
pre-shared-key *.
tunnel-group anyconnect type remote access
tunnel-group anyconnect General attributes
remote address pool
strategy-group-by default anyconnect
tunnel-group anyconnect webvpn-attributes
Group-alias anyconnect enable
!
Global class-card class
match default-inspection-traffic
!
!
World-Policy policy-map
Global category
inspect the icmp
!
service-policy-international policy global
: end
ASDM location 208.0.0.164 255.255.255.255 inside
ASDM location 192.168.0.15 255.255.255.255 inside
ASDM location 192.168.50.0 255.255.255.0 inside
ASDM location 192.168.1.0 255.255.255.0 inside
don't allow no asdm history
Right now your nat 0 (NAT exemption) follows the access list:
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 172.16.0.0 255.255.0.0
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.1.0 255.255.255.0
Traffic back from your server to 192.168.0.4 in the pool of VPN (192.168.0.20 - 50) not correspond to this access list and thus be NATted. The TCP connection will not develop due to the failure of the Reverse Path Forwarding (RPF) - traffic is asymmetric NATted.
Then try to add an entry to the list of access as:
permit access ip 192.168.0.0 scope list inside_nat0_outbound 255.255.255.0 192.168.0.0 255.255.255.0
It's a bit paradoxical but necessary that your VPN pool is cut out in your interior space network. You could also do like André offers below and use a separate network, but you would still have to add an access list entry to exempt outgoing NAT traffic.
-
Customer Cisco PIX 501 VPN connects but no connection to the local network
Hi all:
I am able to make a VPN connection to a PIX 501. The remote client is assigned an IP (192.168.2.1) also, but not able to access all the machines in the local network connected to the PIX.
I have attached the PIX configuration.
Advice will be greatly appreciated.
********************
6.3 (5) PIX version
interface ethernet0 car
interface ethernet1 100full
ethernet0 nameif outside security0
nameif ethernet1 inside the security100
enable password xxxx
passwd xxxxx
pixfirewall hostname
domain ciscopix.com
fixup protocol dns-length maximum 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol 2000 skinny
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
names of
access-list 101 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
pager lines 24
Outside 1500 MTU
Within 1500 MTU
IP address outside dhcp setroute
IP address inside 192.168.1.1 255.255.255.0
alarm action IP verification of information
alarm action attack IP audit
IP local pool ippool 192.168.2.1 - 192.168.2.5
location of PDM 192.168.2.0 255.255.255.0 outside
PDM logging 100 information
history of PDM activate
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) - 0 102 access list
NAT (inside) 1 0.0.0.0 0.0.0.0 0 0
Timeout xlate 0:05:00
Timeout conn 01:00 half-closed 0:10:00 udp 0: CPP 02:00 0:10:00 01:00 h225
H323 timeout 0:05:00 mgcp 0: sip from 05:00 0:30:00 sip_media 0:02:00
Sip timeout - disconnect 0:02:00 prompt Protocol sip-0: 03:00
Timeout, uauth 0:05:00 absolute
GANYMEDE + Protocol Ganymede + AAA-server
AAA-server GANYMEDE + 3 max-failed-attempts
AAA-server GANYMEDE + deadtime 10
RADIUS Protocol RADIUS AAA server
AAA-server RADIUS 3 max-failed-attempts
AAA-RADIUS deadtime 10 Server
AAA-server local LOCAL Protocol
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
SNMP-Server Community public
No trap to activate snmp Server
enable floodguard
Permitted connection ipsec sysopt
Crypto ipsec transform-set esp - esp-md5-hmac RIGHT
Crypto-map dynamic dynmap 10 transform-set RIGHT
map mymap 10-isakmp ipsec crypto dynamic dynmap
mymap outside crypto map interface
ISAKMP allows outside
ISAKMP identity address
part of pre authentication ISAKMP policy 10
encryption of ISAKMP policy 10
ISAKMP policy 10 md5 hash
10 2 ISAKMP policy group
ISAKMP life duration strategy 10 86400
vpngroup vpn3000 ippool address pool
vpngroup vpn3000 Server dns 68.87.72.130
vpngroup vpn3000-wins 192.168.1.100 Server
vpngroup vpn3000 split tunnel 101
vpngroup vpn3000 downtime 1800
password vpngroup vpn3000 *.
Telnet timeout 5
SSH timeout 5
Console timeout 0
dhcpd address 192.168.1.2 - 192.168.1.33 inside
dhcpd lease 3600
dhcpd ping_timeout 750
dhcpd outside auto_config
dhcpd allow inside
Terminal width 80
Cryptochecksum:xxxx
****************
The DNS server is the one assigned to me by my ISP.
My internal network connected to the PIX is 192.168.1.1 - 192.168.1.33 and the VPN ip pool is 192.168.2.1 - 192.168.2.5
"isakmp nat-traversal 20" can do the trick.
-
VPN connects but cannot ping or access resources
I hope this is an easy fix and it's something that I am missing. I've been looking at this for several hours.
Scenario:
I Anyconnect Essentials so I use the SSL connection
I changed my domain name and external IP in my setup, I write.
My VPN connection seems to work very well. In fact, I was able to connect to 3 locations with 3 different external IP address.
1 location, I get IP address 192.168.30.10, as it should. I can ping 192.168.1.1, but not the 192.168.1.6 which is my temporary resource, the firewall is disabled on 192.168.1.6.
2 location, I get an IP of 192.168.30.11, as it should. I was able to ping 192.168.30.10, could not sue 192.168.1.1 as the place closed.
Any help would be appreciated, it's getting late so I hope I gave enough details. I feel so close but yet so far.
See the ciscoasa # running
: Saved
:
ASA Version 8.2 (1)
!
ciscoasa hostname
names of
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP 22.22.22.246 255.255.255.252
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
passive FTP mode
clock timezone CST - 6
clock to summer time recurring CDT
DNS lookup field inside
DNS domain-lookup outside
permit same-security-traffic inter-interface
permit same-security-traffic intra-interface
ICMP-type of object-group ALLOWPING
echo ICMP-object
ICMP-object has exceeded the time
response to echo ICMP-object
Object-ICMP traceroute
Object-ICMP source-quench
ICMP-unreachable object
access-list 10 scope ip allow a whole
10 extended access-list allow icmp a whole
pager lines 24
asdm of logging of information
Within 1500 MTU
Outside 1500 MTU
mask 192.168.30.10 - 192.168.30.25 255.255.255.0 IP local pool SSLClientPoolNew
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 1 192.168.1.0 255.255.255.0
Route outside 0.0.0.0 0.0.0.0 22.22.22.245 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
network-acl 10
WebVPN
SVC request no svc default
AAA authentication LOCAL telnet console
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
Telnet 0.0.0.0 0.0.0.0 inside
Telnet timeout 5
SSH timeout 5
Console timeout 0
management-access inside
dhcpd dns 8.8.8.8
dhcpd outside auto_config
!
dhcpd address 192.168.1.5 - 192.168.1.36 inside
dhcpd allow inside
!
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
WebVPN
allow inside
allow outside
AnyConnect essentials
SVC disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1 image
SVC disk0:/anyconnect-win-2.5.2014-k9.pkg 2 image
enable SVC
tunnel-group-list activate
internal SSLClientPolicy group strategy
attributes of Group Policy SSLClientPolicy
Protocol-tunnel-VPN IPSec l2tp ipsec svc webvpn
field default value mondomaine.fr
the address value SSLClientPoolNew pools
WebVPN
SVC Dungeon-Installer installed
time to generate a new key of SVC 180
SVC generate a new method ssl key
SVC value vpngina modules
attributes of Group Policy DfltGrpPolicy
VPN-tunnel-Protocol webvpn
username test encrypted password privilege 15 xxxxxxxxxxxxxx
username ljb1 password encrypted xxxxxxxxxxxxxx
type tunnel-group SSLClientProfile remote access
attributes global-tunnel-group SSLClientProfile
Group Policy - by default-SSLClientPolicy
tunnel-group SSLClientProfile webvpn-attributes
enable SSLVPNClient group-alias
!
class-map inspection_default
match default-inspection-traffic
!
!
Policy-map global_policy
class inspection_default
inspect the icmp
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:ed683c7f1b86066d1d8c4fff6b08c592
: end
Patrick,
'Re missing you the excemption NAT. Please add the following and try again:
access-list allowed sheep ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0
NAT (inside) 0 access-list sheep
Let us know if you still have problems after that.
Raga
-
AnyConnect VPN connected but not in LAN access
Hello
I just connfigured an ASA to remote VPN. I think everything works but I do not have access
for customers in the Local LAN behind the ASA.
PC <==internet==>outside of the SAA inside<=LAN=> PC
After AnyConnect has established the connection I can ping inside the Interface of the ASA
but I can't Ping the PC behind the inside Interface.
Here is the config of the ASA5505:
: Saved
:
ASA Version 8.2 (1)
!
asa5505 hostname
activate 8Ry2YjIyt7RRXU24 encrypted password
2KFQnbNIdI.2KYOU encrypted passwd
names of
!
interface Vlan1
nameif inside
security-level 100
IP 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
IP 192.168.178.254 255.255.255.0
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
Shutdown
!
interface Ethernet0/3
Shutdown
!
interface Ethernet0/4
Shutdown
!
interface Ethernet0/5
Shutdown
!
interface Ethernet0/6
Shutdown
!
interface Ethernet0/7
Shutdown
!
passive FTP mode
Inside_ICMP list extended access permit icmp any any echo response
Inside_ICMP list extended access permit icmp any any source-quench
Inside_ICMP list extended access allow all unreachable icmp
Inside_ICMP list extended access permit icmp any one time exceed
access-list outside_cryptomap_2 note ACL traffic von ASA5505 zur ASA5510
outside_cryptomap_2 to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.10.0 255.255.255.0
no_NAT to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.10.0 255.255.255.0
no_NAT to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.178.0 255.255.255.0
tunnel of splitting allowed access list standard 192.168.1.0 255.255.255.0
pager lines 24
Within 1500 MTU
Outside 1500 MTU
mask 192.168.1.10 - 192.168.1.15 255.255.255.0 IP local pool SSLClientPool
ICMP unreachable rate-limit 1 burst-size 1
don't allow no asdm history
ARP timeout 14400
Global 1 interface (outside)
NAT (inside) 0-list of access no_NAT
NAT (inside) 1 192.168.1.0 255.255.255.0
Access-group Inside_ICMP in interface outside
Route outside 0.0.0.0 0.0.0.0 192.168.178.1 1
Route outside 192.168.10.0 255.255.255.0 192.168.178.230 1
Timeout xlate 03:00
Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-registration DfltAccessPolicy
AAA authentication http LOCAL console
Enable http server
http 192.168.1.0 255.255.255.0 inside
No snmp server location
No snmp Server contact
Server enable SNMP traps snmp authentication linkup, linkdown cold start
Crypto ipsec transform-set-3DESSHA FRA esp-3des esp-sha-hmac
life crypto ipsec security association seconds 28800
Crypto ipsec kilobytes of life - safety 4608000 association
card crypto outside_map 2 match address outside_cryptomap_2
peer set card crypto outside_map 2 192.168.178.230
card crypto outside_map 2 game of transformation-FRA-3DESSHA
outside_map interface card crypto outside
Crypto ca trustpoint localtrust
registration auto
domain name full cisco - asa5505.fritz.box
name of the object CN = cisco - asa5505.fritz.box
sslvpnkeypair key pair
Configure CRL
Crypto ca certificate chain localtrust
certificate fa647850
3082020b a0030201 30820174 020204fa 0d06092a 64785030 864886f7 0d 010104
0500304 06035504 03131763 6973636f 617361 35353035 2e667269 2d 3120301e a
747a2e62 6f783126 30240609 2a 864886 f70d0109 02161763 6973636f 2d 617361
2e667269 35353035 747a2e62 6f78301e 170d 3132 31303132 31383434 31305a 17
323231 30313031 38343431 06035504 03131763 6973636f 3120301e 305a304a 0d=LAN=>==internet==>
617361 35353035 2e667269 747a2e62 6f783126 2a 864886 30240609 f70d0109 2D
6973636f 02161763 2d 617361 35353035 2e667269 747a2e62 6f783081 9f300d06
d6279e1c 8181009f 092a 8648 86f70d01 01010500 03818d 30818902 00 38454fc 9
705e1e58 762edc35 e64262fb ee55f47b 8d62dda2 102c8a22 c97e395f 2a9c0ebb
f2881528 beb6e9c3 89d91dda f7fe77a4 2a1fda55 f8d930b8 3310a05f 622dfc8f
d48ea749 7bbc4520 68 has 06392 d65d3b87 0270e41b 512a4e89 94e60167 e2fa854a
87ec04fa e95df04f 3ff3336e c7437e30 ffbd90b5 47308502 03010001 300 d 0609
2a 864886 04050003 81810065 cc9e6414 3c322d1d b191983c 97b474a8 f70d0101
2e5c7774 9d54d3ec fc4ee92d c72eef27 a79ce95a da83424f b05721c0 9119e7ea
c5431998 e6cd8272 de17b5ff 5b1839b5 795fb2a0 2d10b479 056478fa 041555dd
bfe3960a 4fe596ec de54d58b a5fa187e 5967789a a26872ef a33b73ec 7d7673b9
c8af6eb0 46425cd 2 765f667d 4022c 6
quit smoking
crypto ISAKMP allow outside
crypto ISAKMP policy 1
preshared authentication
3des encryption
sha hash
Group 2
life 86400
crypto ISAKMP policy 65535
preshared authentication
3des encryption
sha hash
Group 2
life 86400
Telnet timeout 5
SSH timeout 5
Console timeout 0
management-access inside
a basic threat threat detection
Statistics-list of access threat detection
no statistical threat detection tcp-interception
localtrust point of trust SSL outdoors
WebVPN
allow outside
SVC disk0:/anyconnect-win-2.3.0254-k9.pkg 1 image
SVC disk0:/anyconnect-wince-ARMv4I-2.3.0254-k9.pkg 2 image
enable SVC
tunnel-group-list activate
internal SSLClientPolicy group strategy
attributes of Group Policy SSLClientPolicy
VPN-tunnel-Protocol svc
Split-tunnel-policy tunnelspecified
Split-tunnel-network-list value split tunnel
the address value SSLClientPool pools
WebVPN
SVC Dungeon-Installer installed
time to generate a new key of SVC 30
SVC generate a new method ssl key
SVC request no svc default
username password asdm privilege Yvx83jxa2WCRAZ/m number 15
hajo 2w8CnP1hHKVozsC1 encrypted password username
hajo attributes username
type of remote access service
tunnel-group 192.168.178.230 type ipsec-l2l
IPSec-attributes tunnel-group 192.168.178.230
pre-shared-key *.
type tunnel-group SSLClientProfile remote access
attributes global-tunnel-group SSLClientProfile
Group Policy - by default-SSLClientPolicy
tunnel-group SSLClientProfile webvpn-attributes
enable SSLVPNClient group-alias
!
class-map inspection_default
match default-inspection-traffic
!
!
type of policy-card inspect dns preset_dns_map
parameters
message-length maximum 512
Policy-map global_policy
class inspection_default
inspect the preset_dns_map dns
inspect the ftp
inspect h323 h225
inspect the h323 ras
inspect the netbios
inspect the rsh
inspect the rtsp
inspect the skinny
inspect esmtp
inspect sqlnet
inspect sunrpc
inspect the tftp
inspect the sip
inspect xdmcp
!
global service-policy global_policy
context of prompt hostname
Cryptochecksum:0008564b545500650840cf27eb06b957
: end
What wrong with my setup.
Concerning
Hans-Jürgen Guenter
Hello Hans,.
You should change your VPN pool to be a different subnet within the network, for example: 192.168.5.0/24
Then configure NAT exemption for traffic between the Interior and the pool of vpn.
Based on your current configuration, the following changes:
mask 192.168.5.10 - 192.168.5.15 255.255.255.0 IP local pool SSLClientPool
no_NAT to access ip 192.168.1.0 scope list allow 255.255.255.0 192.168.5.0 255.255.255.0
And then also to enable icmp inspection:
Policy-map global_policy
class inspection_default
inspect the icmp
-
Ipad Cisco ipsec VPN connects but not access to the local network
Hi guys,.
I am trying to connect our ipads to vpn to access network resources. IPSec cisco ipad connects but not lan access and cannot ping anything not even not the interfaces of the router.
If I configure the vpn from cisco on a laptop, it works perfectly, I can ping all and can access resources on the local network if my guess is that the traffic is not going in the tunnel vpn between ipad and desktop.
Cisco 877.
My config is attached.
Any ideas?
Thank you
Build-in iPad-client is not useful to your configuration.
You have three options:
(1) remove the ACL of your vpn group. Without split tunneling client will work.
2) migrate legacy config crypto-map style. Here, you can use split tunneling
3) migrate AnyConnect.
The root of the problem is that the iPad Gets the split tunneling-information. But instead of control with routing traffic should pass through the window / the tunnel and which traffic is allowed without the VPN of the iPad tries to build a set of SAs for each line in your split-tunnel-ACL. But with the model-virtual, SA only is allowed.
-
Client VPN connects but not internal LAN access or Ping
Hi all.
I'm new on this forum and kindly asking for your help because I'm stuck.
I have an ADSL router cisco 877 which I configured easy VPN server.
Now the Cisco VPN client ver 5.0 to connect successfully to the VPN server, but when you try to access/ping computers on the internal network, there is no response.The configuration is below. Please let know us where I was going or what I missed.
[code]Building configuration...
Current configuration: 4574 bytes
!
version 12.4
no service button
horodateurs service debug datetime msec
Log service timestamps datetime msec
encryption password service
!
boot-start-marker
boot-end-marker
!
enable secret 5 $1$ $86dn J8HrK9kCQ8G9aPAm6xe4o1
enable password 7 13151601181B54382F
!
AAA new-model
!
!
AAA authentication login default local
AAA authentication login internal_affairs_vpn_1 local
AAA authorization exec default local
AAA authorization internal_affairs_vpn_group_1 LAN
!
!
AAA - the id of the joint session
!
Crypto pki trustpoint TP-self-signed-2122144568
enrollment selfsigned
name of the object cn = IOS - Self - signed - certificate - 2122144568
revocation checking no
rsakeypair TP-self-signed-2122144568
!
!
TP-self-signed-2122144568 crypto pki certificate chain
self-signed certificate 03
30820248 308201B 1 A0030201 02020103 300 D 0609 2A 864886 F70D0101 04050030
2 060355 04031326 494F532D 53656 C 66 2 AND 536967 6E65642D 43657274 31312F30
69666963 32313232 31343435 6174652D 3638301E 170 3032 30333032 32303537
31375A 17 0D 323030 31303130 30303030 305A 3031 06035504 03132649 312F302D
4F532D53 5369676E 656C662D 43 65727469 66696361 74652 32 31323231 65642D
34343536 3830819F 300 D 0609 2A 864886 01050003, 818, 0030, 81890281 F70D0101
8100D3EA 07EC5D66 F4DD8ACC 5540BDBE 009B3C26 598EC99C D99D935A 51292F96
F495E5A9 8D012B0E 73EA7639 3B 586799 187993F5 ED9CA31C 788756DD 6BDB1B2B
4D7AA7F0 B07CF82F F2A29E86 E18B442C 550E22D2 E92D9914 105B7D59 253BBEA1
D84636B4 A4B4B300 7946CE84 E9A63D2E 7789B03A 6ADDB04E B21EC207 CCFEAE0B
30 HAS A 50203 010001, 3 1 130101 301B 0603 030101FF FF040530 0F060355 70306E30
551 1104 14301282 10494E54 45524E41 4C5F4146 46414952 53301F06 03551D 23
04183016 8014FA0F B3C9C651 7FD91EFA 3F63EAE8 6C83C80D 8AE2301D 0603551D
0E041604 14FA0FB3 C9C6517F D91EFA3F 63EAE86C 83C80D8A E2300D06 092A 8648
86F70D01 01040500 03818100 A1026DDC C91CAEB2 3C62AF92 D6B25EB2 CA 950, 920
313BCF26 4A35B039 A4F806A0 8CB54D11 6AF1ABAA A770604B 4403F345 0351361B
E2CF2950 26974F4A 95951862 401A4F76 C816590C 2FFCB115 9A8B3E96 4373FFE1
33D744F7 E0FDDE61 B5B48497 9516C3C6 A3157957 C621668E A83B5E33 2420F962
9142DD9E B6E9D74A 899A 9653
quit smoking
dot11 syslog
IP cef
No dhcp use connected vrf ip
DHCP excluded-address IP 10.10.10.1
!
IP dhcp pool dhcplan
Network 10.0.0.0 255.0.0.0
DNS-server 196.0.50.50 81.199.21.94
default router 10.10.10.1
Rental 7
!
!
property intellectual auth-proxy max-nodata-& 3
property intellectual admission max-nodata-& 3
name of the IP-server 81.199.21.94
!
!
!
VPN username password 7 095A5E07
username fred privilege 15 password 7 1411000E08
username ciscovpn password 7 01100F175804101F2F
!
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
!
ISAKMP crypto client configuration group internal_affairs_vpn
key *.
DNS 196.0.50.50 81.199.21.94
pool ippool
ACL 108
!
!
Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
!
Crypto-map dynamic internal_affairs_DYNMAP_1 10
Set transform-set RIGHT
market arriere-route
!
!
card crypto client internal_affairs_CMAP_1 of authentication list internal_affairs_vpn
card crypto isakmp authorization list internal_affairs_vpn_group_1 internal_affairs_CMAP_1
client configuration address card crypto internal_affairs_CMAP_1 answer
ipsec 10-isakmp crypto map internal_affairs_CMAP_1 Dynamics internal_affairs_DYNMAP_1
!
Archives
The config log
hidekeys
!
!
!
Bridge IRB
!
!
interface Loopback0
2.2.2.2 the IP 255.255.255.255
!
ATM0 interface
no ip address
ATM vc-per-vp 512
No atm ilmi-keepalive
PVC 0/32
aal5snap encapsulation
Protocol ip inarp
!
DSL-automatic operation mode
Bridge-Group 1
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface Vlan1
description of the local lan interface
IP 10.10.10.1 255.0.0.0
IP nat inside
IP virtual-reassembly
!
interface BVI1
internet interface Description
IP 197.0.4.174 255.255.255.252
NAT outside IP
IP virtual-reassembly
internal_affairs_CMAP_1 card crypto
!
IP local pool ippool 192.168.192.1 192.168.192.200
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 196.0.4.173
!
IP http server
local IP http authentication
IP http secure server
IP nat inside source list interface BVI1 NAT overload
IP nat inside source static tcp 2.2.2.2 23 23 BVI1 interface
!
NAT extended IP access list
allow an ip
!
access-list 108 allow ip 10.0.0.0 0.255.255.255 192.168.192.0 0.0.0.255
!
!
!
control plan
!
Bridge Protocol ieee 1
1 channel ip bridge
!
Line con 0
password 7 0216054818115F3348
no activation of the modem
line to 0
line vty 0 4
password 7 06160E325F59590B01
!
max-task-time 5000 Planner
endSince this is a named ACL, you need to change ACL configuration mode:
NAT extended IP access list
Then, make the changes.
Federico.
Maybe you are looking for
-
HP Pavilion HPE h8-1131sc: S.m.a.r.t failed test?
I open my computer, but sometimes this blue screen with this error. It says "a problem has been detected and windows has shut down to prevent damage to your computer. I then did the test to check if there is something wrong with my HDD and the only o
-
Designjet T1100: Designjet T1100 have light but no display
Don't start setting the plotter no execution only light nothing in display apear
-
the network shows on the kindle and force is excellent, but the error is will not connect. If I put in the wrong password it says I have a password error? can anyone help?
-
HP Pavilion g7-1070us NoteNote: PCI simple communication controller
Hi team,Please can you help me download a driver controller for my Hp Pavilion g7-1070us Notebook Pc PCI simple communication running on windows 8.8.1 8.1 64-bit
-
Gambling problems:UNO on the MSN web site has been unavailable for me for the past 2 days. I can't find any information on this subject anywhere.Could you please let me know so that I will understand if the problem is with repairs or something with m