<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello Marc,The reason it was in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713187#M194508</link>
    <description>&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;The reason it was added because the network &lt;STRONG&gt;10.0.2.0 255.255.255.0&lt;/STRONG&gt; is coming from a site to site VPN tunnel which means the incoming interface is the &lt;STRONG&gt;outside&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;inside &lt;/STRONG&gt;interface is &lt;STRONG&gt;10.0.0.1.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 10.0.2.0 network is not used for inside local at all on at the remote site's lan from the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So yes its accurate.&lt;/P&gt;&lt;P&gt;I think it's why we see this massage when we try to access the ASA via ASDM:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 Jul 23 2015 11:43:02 106016 Deny IP spoof from (10.0.2.71) to 10.0.0.1 on interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2015 21:15:10 GMT</pubDate>
    <dc:creator>davidsonyo</dc:creator>
    <dc:date>2015-07-23T21:15:10Z</dc:date>
    <item>
      <title>ASA 5515 ASDM Access from remote network</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713183#M194491</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today I was asked to TSHOOT an issue with one of our customer's ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The local IT staff wants to access the HQ ASA via ASDM from a site to site VPN remote end location. (&lt;STRONG&gt;10.0.2.0&lt;/STRONG&gt; /24 subnet)&lt;/P&gt;&lt;P&gt;to the local ASA inside LAN interface &lt;STRONG&gt;10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;But the website dose not show up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's the error massage what we get:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 Jul 23 2015 11:43:02 106016 Deny IP spoof from (10.0.2.71) to 10.0.0.1 on interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First thing I checked was:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;http 10.0.2.0 255.255.255.0 outside&lt;BR /&gt;To permit http access from the remote subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The reverse path:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also the tunnel ACL both end was fine. Everyone can access everyone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also checked the inbound outside ACL for deny:&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 line 29 extended permit ip host 10.0.2.71 host 10.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone is familiar with the issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dave.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713183#M194491</guid>
      <dc:creator>davidsonyo</dc:creator>
      <dc:date>2019-03-12T06:19:19Z</dc:date>
    </item>
    <item>
      <title>Hi, The first thing that</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713184#M194498</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first thing that comes to mind is that you might be missing one command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access &amp;lt;local interface nameif&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Since the remote management connection is coming through a VPN connection and the connection is also coming through the external interface of the ASA towards another interface IP address the above command is required to accomplish this as by default ASA does not allow any traffic to pass through one interface to another interface on the ASA. The same problem can be seen for example when you try to ping another ASA interface IP address from behind another interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So check if you have any &lt;STRONG&gt;"management-access"&lt;/STRONG&gt; configurations on the ASA. This can be enabled on one interface only to my understanding but I have not checked if there has been any changes to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also don't quite remember if the &lt;STRONG&gt;"http"&lt;/STRONG&gt; command for this type of remote connections needed the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; or &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface in the commands end. I guess you can safely check this when you try to test the management connection from the remote site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not sure what causes the Spoof log message. I guess it might be related to the reverse check but I am not sure why it would be since the ASA should see this subnet originating from behind the correct interface for any traffic to work through the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a tight spot you could always allow SSH/HTTPS (asdm) directly to the public IP address of the ASA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 12:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713184#M194498</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-07-23T12:52:53Z</dc:date>
    </item>
    <item>
      <title>Hello Jouni! I just checked</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713185#M194502</link>
      <description>&lt;P&gt;Hello Jouni!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just checked on the ASA and I have this enabled:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should I enable this for outside also ?&lt;/P&gt;&lt;P&gt;Like this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and If I do this command it wont overwrite the already existing one right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dave.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 13:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713185#M194502</guid>
      <dc:creator>davidsonyo</dc:creator>
      <dc:date>2015-07-23T13:57:07Z</dc:date>
    </item>
    <item>
      <title>http 10.0.2.0 255.255.255.0</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713186#M194505</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;http 10.0.2.0 255.255.255.0 outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;This command means that you would like HTTP access to your ASA from subnet&amp;nbsp;10.0.2.0 255.255.255.0. "outside" means that your connection will be coming from the outside interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Is this accurate?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;Please send the output of the commands "sh run http" and "show ip"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 15:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713186#M194505</guid>
      <dc:creator>Marc Magloire</dc:creator>
      <dc:date>2015-07-23T15:31:01Z</dc:date>
    </item>
    <item>
      <title>Hello Marc,The reason it was</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713187#M194508</link>
      <description>&lt;P&gt;Hello Marc,&lt;/P&gt;&lt;P&gt;The reason it was added because the network &lt;STRONG&gt;10.0.2.0 255.255.255.0&lt;/STRONG&gt; is coming from a site to site VPN tunnel which means the incoming interface is the &lt;STRONG&gt;outside&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;inside &lt;/STRONG&gt;interface is &lt;STRONG&gt;10.0.0.1.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 10.0.2.0 network is not used for inside local at all on at the remote site's lan from the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So yes its accurate.&lt;/P&gt;&lt;P&gt;I think it's why we see this massage when we try to access the ASA via ASDM:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 Jul 23 2015 11:43:02 106016 Deny IP spoof from (10.0.2.71) to 10.0.0.1 on interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2015 21:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713187#M194508</guid>
      <dc:creator>davidsonyo</dc:creator>
      <dc:date>2015-07-23T21:15:10Z</dc:date>
    </item>
    <item>
      <title>Hi, So you said that you have</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713188#M194510</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you said that you have this command&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access local&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does &lt;STRONG&gt;"local"&lt;/STRONG&gt; in this case refer to the interface that has the IP address 10.0.0.1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; mentioned in the &lt;STRONG&gt;"management-access"&lt;/STRONG&gt; command should be the one to which they are trying to connect to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I said before, you could always enable them to connect through the Internet to the public facing IP address. But there should be nothing that prevents accomplishing it through the L2L VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am still wondering what is generating that Spoof message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 06:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713188#M194510</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-07-24T06:27:40Z</dc:date>
    </item>
    <item>
      <title>Hello Jouni,Yes, we have this</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713189#M194512</link>
      <description>&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;Yes, we have this command on the router:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;And yes. The local&lt;STRONG&gt; inside LAN interface IP address is: 10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;10.0.2.71&lt;/STRONG&gt; IP is the address of the PC from the site to site VPN's end inside the lan.&lt;/P&gt;&lt;P&gt;Than each time we try to access the website of the ASA to use ASDM on the address 10.0.0.1 we get this and we can not access it:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2 Jul 23 2015 11:43:02 106016 Deny IP spoof from (10.0.2.71) to 10.0.0.1 on interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dave.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jul 2015 10:30:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-asdm-access-from-remote-network/m-p/2713189#M194512</guid>
      <dc:creator>davidsonyo</dc:creator>
      <dc:date>2015-07-24T10:30:53Z</dc:date>
    </item>
  </channel>
</rss>

