<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access Inside Gateway (ASA5505 v8.3) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757856#M530542</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not if I have to pay to do Q&amp;amp;A work for a Fortune 500 company! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any chance you are willing to tell me what the bug is so I can at least rule it out and don't put any more hours into this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 18 Sep 2011 05:17:46 GMT</pubDate>
    <dc:creator>Atl_Gator</dc:creator>
    <dc:date>2011-09-18T05:17:46Z</dc:date>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757848#M530526</link>
      <description>&lt;P&gt;Since we isolated the ARP-cache issue, our little ASA is rocking along (I'm starting to like the device! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; ) just like it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue I have now is a bit annoying, it's sort of the last issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; - Inside network:&amp;nbsp;&amp;nbsp; 10.0.0.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp; - Outside network:&amp;nbsp; XXX.XXX.184.144/24&lt;/P&gt;&lt;P&gt;&amp;nbsp; - VPN Pool:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question is related to the VPN accessing the ASA itself.&amp;nbsp;&amp;nbsp; We can access hosts within the inside network, and we can access the IP address on the outside network.&amp;nbsp; The Internet works fine (with full tunneling).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is we can't get a connection to the ASA itself at 10.0.0.1 from a VPN connection on the subnet (example a VPN client at 10.0.1.151).&amp;nbsp; The VPN client is assigned a gateway IP of 10.0.1.1 but that IP doesn't respond either.&amp;nbsp;&amp;nbsp; The ASA is accessible from anyone physically on the 10.0.0.0/24.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have pretty much all access rules open and here is the related nat objects:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside-net = 10.0.0.0/24&lt;/P&gt;&lt;P&gt;vpn_users = 10.0.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,any) source static inside-net inside-net destination static vpn_users vpn_users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface dns&lt;/P&gt;&lt;P&gt;object network vpn_users&lt;/P&gt;&lt;P&gt; nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;gateway(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way we can add a nat or a route that will give access to 10.0.0.1 from the VP (10.0.1.0/24) network?&amp;nbsp;&amp;nbsp; Or make the 10.0.1.1&lt;/P&gt;&lt;P&gt;gateway actually connect to the ASA properly so that we can access the device over VPN?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757848#M530526</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2019-03-11T21:26:22Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757849#M530529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you would like to get access to the ASA inside interface from the VPN, you need to add the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access inside&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 01:42:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757849#M530529</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-18T01:42:18Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757850#M530532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much for responding Jennifer.&amp;nbsp; Many of your other responses on this forum have been very helpful in learning the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do already have this keyword defined actually and we can access the ASA from hosts on 10.0.0.1/24.&amp;nbsp; We can also install the client with https access on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue here is just to access the ASA from a VPN connection that is mapped to 10.0.1.151 for example (network 10.0.1.0/24).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can't ping 10.0.0.1 or 10.0.1.1 (the gateway assigned to the VPN client).&amp;nbsp; However we can ping other hosts on the inside network from the VPN connection, for example 10.0.0.31.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think, however, that we can access a 10.0.0.X IP address if it isn't NAT'ed out to an outside interface public IP.&amp;nbsp;&amp;nbsp; I've tried all sorts of nat mixes and access rule mixes but nothing seems to work properly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 01:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757850#M530532</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-18T01:52:04Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757851#M530533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From my understanding, you are trying to access the inside interface ip address of the ASA from the VPN connection. Is this a correct statement?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the inside interface ip address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I assume you are trying to ping, ssh, telnet, or asdm to this inside interface of the ASA from the VPN connection, is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls share the output of the following if the above is correct assumption:&lt;/P&gt;&lt;P&gt;sh run icmp&lt;/P&gt;&lt;P&gt;sh run telnet&lt;/P&gt;&lt;P&gt;sh run http&lt;/P&gt;&lt;P&gt;sh run ssh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 02:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757851#M530533</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-18T02:26:39Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757852#M530535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, you are correct!&amp;nbsp; Also want to use ASDM but I assume that is handled by http.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gateway(config)#&lt;/P&gt;&lt;P&gt;gateway(config)# sh run icmp&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;gateway(config)# sh run telnet&lt;/P&gt;&lt;P&gt;telnet 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 10.0.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet timeout 300&lt;/P&gt;&lt;P&gt;gateway(config)# sh run http&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http server idle-timeout 300&lt;/P&gt;&lt;P&gt;http 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 10.0.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http 10.0.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;gateway(config)# sh run ssh&lt;/P&gt;&lt;P&gt;ssh 10.0.0.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.0.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.0.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;gateway(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically just want to access the ASA 5505 from a VPN connection that is on 10.0.0.1 and the VPN client IP address is 10.0.1.10 with gateway 10.0.1.1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 02:45:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757852#M530535</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-18T02:45:58Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757853#M530537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Base on the configuration above, you should be able to ping, ssh, telnet and http to the ASA inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just want to confirm that the ASA inside interface is 10.0.0.1, and it has a subnet mask of 255.255.255.0, and similarly, the VPN assigned IP Address, if you can just double check, it is 10.0.1.10 and subnet mask is also 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You won't be able to access the VPN gateway ip address 10.0.1.1 as it is not a real gateway and not accessible. However, the inside interface of the ASA is definitely something that you can access via VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 02:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757853#M530537</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-18T02:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757854#M530539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, I'm inclined to agree with you, however, sadly, no joy despite trying all kinds of things to get to 10.0.0.1 from the VPN network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; - Clip of logging file from a ping from the VPN client to 10.0.0.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; - The full config (sanitized).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am a bit stumped.&amp;nbsp; I'm guessing there is some line in there that shouldn't be there or a line that needs to be added but I've tried for a good&lt;/P&gt;&lt;P&gt;half day.&amp;nbsp; I think this is the last issue to make the device do and then we plan to lock it down (and will probably buy several of the more&lt;/P&gt;&lt;P&gt;expensive ones over next couple years).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 03:26:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757854#M530539</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-18T03:26:20Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757855#M530541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could be possile that you are hitting this known issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtr16184"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtr16184&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify it??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 04:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757855#M530541</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-18T04:45:14Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757856#M530542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not if I have to pay to do Q&amp;amp;A work for a Fortune 500 company! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any chance you are willing to tell me what the bug is so I can at least rule it out and don't put any more hours into this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 05:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757856#M530542</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-18T05:17:46Z</dc:date>
    </item>
    <item>
      <title>Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757857#M530544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="2" width="100%"&gt;&lt;/TABLE&gt;&lt;TABLE border="0" cellpadding="5" cellspacing="2" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD colspan="2" style="font-size: 88%; padding: 8px;"&gt;&lt;STRONG&gt;To-the-box traffic fails from hosts over vpn after upgrade to 8.4.2. &lt;/STRONG&gt; &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="font-size: 88%; padding: 0px 8px 8px;" valign="top"&gt;&lt;BR /&gt; &lt;STRONG&gt;Symptom:&lt;/STRONG&gt;&lt;BR /&gt;After upgrading the ASA to 8.4.2, all management traffic to-the-box(including&lt;BR /&gt;icmp/telnet/ssh/ASDM) from hosts over the VPN (L2L or Remote ACcess VPN) may&lt;BR /&gt;fail when destined to the management-access interface IP address.&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;&lt;STRONG&gt;Conditions&lt;/STRONG&gt;:&lt;/STRONG&gt;&lt;BR /&gt;1. Issue is observed if ASA is on 8.4.2. Not observed on 8.4.1.&lt;BR /&gt;2. Users directly connected to the internal interfaces face no issues with&lt;BR /&gt;icmp/telnet/ssh/asdm to their respective interfaces.&lt;P&gt;&lt;/P&gt;&lt;STRONG&gt;Workaround:&lt;/STRONG&gt;&lt;BR /&gt;The problem can be traced to a Manual NAT statement that overlaps with the&lt;BR /&gt;management-access interface IP address. The NAT statement must have both the&lt;BR /&gt;source and destination fields. Adding the "route-lookup" keyword at the end of&lt;BR /&gt;the NAT statement resolves the issue.&lt;P&gt;&lt;/P&gt;Ex:&lt;BR /&gt;ASA's Management-Access Interface IP address is 192.168.1.1.&lt;P&gt;&lt;/P&gt;! Overlapping NAT statement:&lt;BR /&gt;nat (inside,outside) source static obj-192.168.1.0 obj-192.168.1.0 destination&lt;BR /&gt;static obj-vpn obj-vpn&lt;P&gt;&lt;/P&gt;! New Statement: &lt;BR /&gt;nat (inside,outside) source static obj-192.168.1.0 obj-192.168.1.0 destination&lt;BR /&gt;static obj-vpn obj-vpn route-lookup&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 05:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757857#M530544</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-18T05:27:09Z</dc:date>
    </item>
    <item>
      <title>Re: Access Inside Gateway (ASA5505 v8.3)</title>
      <link>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757858#M530546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bingo!&amp;nbsp; You nailed it.&amp;nbsp; Works great now.&amp;nbsp; Need to lock stuff down tomorrow security wise and I think we are golden.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the stuff that worked and things, I did have a lot of fun with it.&amp;nbsp; It's a cool device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5 stars for both of you! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Sep 2011 07:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-inside-gateway-asa5505-v8-3/m-p/1757858#M530546</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-18T07:16:58Z</dc:date>
    </item>
  </channel>
</rss>

