<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA vpn client access issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953067#M440331</link>
    <description>&lt;P&gt;Hi, im new to ASA and have a quick question I got a ipsec vpn over the WAN interface that is working via a client and im assigned the ip from the correct pool below which is part of nameif ADMINSTAFF, however I can’t ssh to the ASA once the tunnel is connected I suspect it has something to do with NAT/policy-group but im not sure. When I VNC to 192.168.2.32 1&lt;SUP&gt;st&lt;/SUP&gt; then ssh to the ASA it works but from my vpn assigned ip 192.168.2.90-99 I ssh to the ASA 192.168.2.1 ip doesn’t work. when connected via the vpn client i can't ping 192.168.2.1 but i can ping 192.168.2.32.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif WAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.17 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.100&lt;/P&gt;&lt;P&gt; vlan 101&lt;/P&gt;&lt;P&gt; nameif STAFF&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.101&lt;/P&gt;&lt;P&gt; vlan 102&lt;/P&gt;&lt;P&gt; nameif ADMINSTAFF&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.102&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif Default&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.254.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip any 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.1.32 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.1.31 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.2.32 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.2.31 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 STAFF&lt;/P&gt;&lt;P&gt;ssh 192.168.2.0 255.255.255.0 ADMINSTAFF&lt;/P&gt;&lt;P&gt;ssh 192.168.254.0 255.255.255.0 Default&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (WAN) 2 x.x.x.18-x.x.x.20&lt;/P&gt;&lt;P&gt;global (WAN) 1 interface&lt;/P&gt;&lt;P&gt;nat (STAFF) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (STAFF) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 2 192.168.2.28 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 2 192.168.2.29 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Default) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (Default) 1 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (management) 0 access-list management_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool X 192.168.2.90-192.168.2.99 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy X internal&lt;/P&gt;&lt;P&gt;group-policy X attributes&lt;/P&gt;&lt;P&gt; dns-server value x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;username X password xxx encrypted privilege 0&lt;/P&gt;&lt;P&gt;username X attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy X&lt;/P&gt;&lt;P&gt;tunnel-group X type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group X general-attributes&lt;/P&gt;&lt;P&gt; address-pool X&lt;/P&gt;&lt;P&gt; default-group-policy X&lt;/P&gt;&lt;P&gt;tunnel-group X ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group-map default-group X&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:24:26 GMT</pubDate>
    <dc:creator>paul amaral</dc:creator>
    <dc:date>2019-03-11T23:24:26Z</dc:date>
    <item>
      <title>ASA vpn client access issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953067#M440331</link>
      <description>&lt;P&gt;Hi, im new to ASA and have a quick question I got a ipsec vpn over the WAN interface that is working via a client and im assigned the ip from the correct pool below which is part of nameif ADMINSTAFF, however I can’t ssh to the ASA once the tunnel is connected I suspect it has something to do with NAT/policy-group but im not sure. When I VNC to 192.168.2.32 1&lt;SUP&gt;st&lt;/SUP&gt; then ssh to the ASA it works but from my vpn assigned ip 192.168.2.90-99 I ssh to the ASA 192.168.2.1 ip doesn’t work. when connected via the vpn client i can't ping 192.168.2.1 but i can ping 192.168.2.32.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif WAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.17 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.100&lt;/P&gt;&lt;P&gt; vlan 101&lt;/P&gt;&lt;P&gt; nameif STAFF&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.101&lt;/P&gt;&lt;P&gt; vlan 102&lt;/P&gt;&lt;P&gt; nameif ADMINSTAFF&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2.102&lt;/P&gt;&lt;P&gt; vlan 1&lt;/P&gt;&lt;P&gt; nameif Default&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.254.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip any 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.1.32 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.1.31 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.2.32 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list skip-nat-inside extended permit ip host 192.168.2.31 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 STAFF&lt;/P&gt;&lt;P&gt;ssh 192.168.2.0 255.255.255.0 ADMINSTAFF&lt;/P&gt;&lt;P&gt;ssh 192.168.254.0 255.255.255.0 Default&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (WAN) 2 x.x.x.18-x.x.x.20&lt;/P&gt;&lt;P&gt;global (WAN) 1 interface&lt;/P&gt;&lt;P&gt;nat (STAFF) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (STAFF) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 2 192.168.2.28 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 2 192.168.2.29 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (ADMINSTAFF) 1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (Default) 0 access-list skip-nat-inside&lt;/P&gt;&lt;P&gt;nat (Default) 1 192.168.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (management) 0 access-list management_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool X 192.168.2.90-192.168.2.99 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy X internal&lt;/P&gt;&lt;P&gt;group-policy X attributes&lt;/P&gt;&lt;P&gt; dns-server value x.x.x.x x.x.x.x&lt;/P&gt;&lt;P&gt;username X password xxx encrypted privilege 0&lt;/P&gt;&lt;P&gt;username X attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy X&lt;/P&gt;&lt;P&gt;tunnel-group X type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group X general-attributes&lt;/P&gt;&lt;P&gt; address-pool X&lt;/P&gt;&lt;P&gt; default-group-policy X&lt;/P&gt;&lt;P&gt;tunnel-group X ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group-map default-group X&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953067#M440331</guid>
      <dc:creator>paul amaral</dc:creator>
      <dc:date>2019-03-11T23:24:26Z</dc:date>
    </item>
    <item>
      <title>ASA vpn client access issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953068#M440332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls add teh following to be able to manage the ASA via VPN Client:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access ADMINSTAFF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 02:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953068#M440332</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-29T02:54:37Z</dc:date>
    </item>
    <item>
      <title>ASA vpn client access issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953069#M440333</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh and BTW, you shouldn't really have the ip pool in the same subnet as your internal network. It should be a completely unique subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 02:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-vpn-client-access-issue/m-p/1953069#M440333</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-29T02:55:38Z</dc:date>
    </item>
  </channel>
</rss>

