<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic unable to access Internal HTTPS through VPN conn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445147#M268732</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the VPN users connecting to the ASA or some other device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also why would the traffic be &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"inside"&lt;/STRONG&gt;? If the connections are coming to the ASA then it would usually be &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to &lt;STRONG&gt;"inside"&lt;/STRONG&gt; since the VPN Clients would be located behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface from ASAs perspective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the situation was that the VPN was on another device than this ASA and both of the networks were behind the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface then the traffic should not even go through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you could share the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output from the CLI of the ASA so we could see what you mean.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 03 Mar 2014 13:54:09 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-03-03T13:54:09Z</dc:date>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445146#M268730</link>
      <description>&lt;P&gt;Anytime I have internal websites with HTTPS connections that do not have valid certificates, our VPN users are unable to make a connection. The wireshark trace shows acknowlegement number = broken TCP.&amp;nbsp; I have run Packet Tracer and it shows a problem on my DMZ???? not sure why as the traffic flow is inside to inside interface. &lt;SPAN style="font-size: 10pt;"&gt;I am at a total lost as to why...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;+++++++++++++++++++++++++++++++&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5520 with 8.4(1) code&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN Addressing = 172.25.17.0/24&lt;/P&gt;&lt;P&gt;HTTP Server = 172.18.2.13 (port 8443) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can ping by IP Address or by server name&lt;/P&gt;&lt;P&gt;Can access site internally after responding to the Certificate Warning&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:52:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445146#M268730</guid>
      <dc:creator>dmooregfb</dc:creator>
      <dc:date>2019-03-12T03:52:51Z</dc:date>
    </item>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445147#M268732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the VPN users connecting to the ASA or some other device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also why would the traffic be &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to &lt;STRONG&gt;"inside"&lt;/STRONG&gt;? If the connections are coming to the ASA then it would usually be &lt;STRONG&gt;"outside"&lt;/STRONG&gt; to &lt;STRONG&gt;"inside"&lt;/STRONG&gt; since the VPN Clients would be located behind the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface from ASAs perspective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the situation was that the VPN was on another device than this ASA and both of the networks were behind the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface then the traffic should not even go through the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you could share the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output from the CLI of the ASA so we could see what you mean.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 13:54:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445147#M268732</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-03T13:54:09Z</dc:date>
    </item>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445148#M268734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that I look at it, You mention above that the port on the server is TCP/8443 but the port in the capture is TCP/443 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 13:56:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445148#M268734</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-03T13:56:52Z</dc:date>
    </item>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445149#M268737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni, let me clear up a few here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;VPN users inbound on outside2 to inside interfaces (misquote)&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;This is the URL when converted (after accepting the non-certificate message); so this is somewhat of confusion for the TCP/8443 and TCP/443&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A class="jive-link-external-small" href="https://172.18.2.13:8443/appadmin/main"&gt;https://172.18.2.13:8443/appadmin/main&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt;"&gt;adding a .png of the packet trace.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dave&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/9/2/7/182729-Packet%20trace%20-%201.png" alt="Packet trace - 1.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 14:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445149#M268737</guid>
      <dc:creator>dmooregfb</dc:creator>
      <dc:date>2014-03-03T14:08:04Z</dc:date>
    </item>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445150#M268747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The UN-NAT is the most essential part of that output and its the only thing that is not showing &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I would have to guess that the destination IP address of the above packet matches a NAT configurations and this NAT configuration then overrides the actual interface to which the packet should be forwarded to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 14:12:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445150#M268747</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-03T14:12:39Z</dc:date>
    </item>
    <item>
      <title>unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445151#M268754</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the expanded version &lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/0/3/7/182730-Packet%20trace%20-%202.png" alt="Packet trace - 2.png" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Mar 2014 14:16:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445151#M268754</guid>
      <dc:creator>dmooregfb</dc:creator>
      <dc:date>2014-03-03T14:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: unable to access Internal HTTPS through VPN conn</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445152#M268757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration mentioned in your screencapture is the configuration that causes all traffic from the VPN users to be diverted to the &lt;STRONG&gt;"HomeOffice"&lt;/STRONG&gt; interface because &lt;STRONG&gt;"any any"&lt;/STRONG&gt; is configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would either have to make the above rule more specific by removing the &lt;STRONG&gt;"any any"&lt;/STRONG&gt; and adding the actual networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could add a new rule BEFORE the above mentioned NAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the real local interface &lt;STRONG&gt;"nameif"&lt;/STRONG&gt; is (the one where the server IP is actually located) but you would need this kind of configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 172.18.2.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 172.25.17.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (serverint,outside2) 1 source static SERVER SERVER destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above rule should match the traffic from the VPN-POOL to the SERVER. The number &lt;STRONG&gt;"1"&lt;/STRONG&gt; seen in the CLI format configurations means that it would be added to the top of the rules. The "serverint" is meant to mean the actual name of the interface where the server is located as I presume that its not located behind the &lt;STRONG&gt;"HomeOffice"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Mar 2014 12:32:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445152#M268757</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-04T12:32:39Z</dc:date>
    </item>
    <item>
      <title>Jouni Forss , this worked out</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445153#M268760</link>
      <description>&lt;P&gt;&lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A about="/users/jouniforss" class="username" datatype="" href="https://community.cisco.com/users/jouniforss" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" lang=""&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;Jouni Forss&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;, this worked out correctly. I removed all NAT parms and reconfigured. It appeared as there was a twice NAT going on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your time,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Tue, 11 Mar 2014 16:24:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-internal-https-through-vpn-conn/m-p/2445153#M268760</guid>
      <dc:creator>dmooregfb</dc:creator>
      <dc:date>2014-03-11T16:24:34Z</dc:date>
    </item>
  </channel>
</rss>

