<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 8.25  Access to VPN client from outside. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-8-25-access-to-vpn-client-from-outside/m-p/3801168#M7017</link>
    <description>Sorted. It was indeed a NAT issue. The static NAT should read:&lt;BR /&gt;static (outside,outside) tcp interface 81 10.100.2.1 8080 netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Notice the source and destination interfaces are both outside (because the VPN client is via the outside interface too).&lt;BR /&gt;I'm a lot of years configuring PIX and ASA and never had to do that before !!</description>
    <pubDate>Wed, 13 Feb 2019 17:01:36 GMT</pubDate>
    <dc:creator>j.eustace</dc:creator>
    <dc:date>2019-02-13T17:01:36Z</dc:date>
    <item>
      <title>ASA 5505 8.25  Access to VPN client from outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-8-25-access-to-vpn-client-from-outside/m-p/3801085#M7016</link>
      <description>&lt;P&gt;&amp;nbsp;I have an ASA5505 running for some time with remote users able to access the central office LAN / servers etc and also able to connect to the internet via the central office connection. For local printing, these VPN (IPSEC) cleints use printers on their local LANs which connected to the VPN.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;All of this works just fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I now have a VPN user who is running a test web service on his VPN attached machine. This user is given a fixed IP address by the ASA as the VPN client connects (10.100.2.1). Users on his local office LAN (192.168.1.0/24) can connect to this web service, and users from the central office LANs (10.0.0.0/24,10.0.3.0/24, 10.0.4.0/24) can also access the webservice while he is connected to the VPN.&amp;nbsp; However,&amp;nbsp; the web service is not accessible directly from the internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the central office there are a few other servers which are visible to the internet. These are using static PAT on the ASA with a firewall rule allowing the traffic.&amp;nbsp; I have set up one additional static PAT and firewall rule for the test webservice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This rule works if I translate the external IP address to an address at the central office network so general internet users can access the service. However, no internet users can access the service if I translate the outside address to the VPN client address (10.100.2.1).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the limited tools available to me, it appears to be a NAT issue (I recall having had trouble getting the VPN users to access the internet initally but that is resolved using the "same-security..." command. )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can see that the request to connect to the test server does arrive at the ASA outside interface, and I can see the ACL allowing it in (the counter increments).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However as everything else happens in the ASA (the NAT should convert the destination addr, and then it should be routed to the VPN tunnel) I can't see what is going wrong.&amp;nbsp; Any ideas?&amp;nbsp; (And yes,&amp;nbsp; the ASDM tracer says the packet would be delivered.. )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attach a picture (saves a thousand words !) of the layout, and the bits of the config which matter:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list reachServer extended permit tcp any host (external_firewall_address) eq 81&lt;BR /&gt;access-list nonat extended permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0&lt;BR /&gt;access-list stay_local standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (outside) 1 10.0.0.0 255.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface 81 10.100.2.1 8080 netmask 255.255.255.255&lt;BR /&gt;access-group reachServer in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;group-policy RA_VPN internal&lt;BR /&gt;group-policy RA_VPN attributes&lt;BR /&gt;dns-server value 10.0.3.1&lt;BR /&gt;vpn-tunnel-protocol IPSec&lt;BR /&gt;password-storage enable&lt;BR /&gt;split-tunnel-policy excludespecified&lt;BR /&gt;split-tunnel-network-list value stay_local&lt;BR /&gt;split-tunnel-all-dns enable&lt;BR /&gt;username testuser password testpassword privilege 15&lt;BR /&gt;tunnel-group RA_VPN type remote-access&lt;BR /&gt;tunnel-group RA_VPN general-attributes&lt;BR /&gt;address-pool testpool&lt;BR /&gt;tunnel-group RA_VPN ipsec-attributes&lt;BR /&gt;pre-shared-key test123&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-8-25-access-to-vpn-client-from-outside/m-p/3801085#M7016</guid>
      <dc:creator>j.eustace</dc:creator>
      <dc:date>2020-02-21T16:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 8.25  Access to VPN client from outside.</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-8-25-access-to-vpn-client-from-outside/m-p/3801168#M7017</link>
      <description>Sorted. It was indeed a NAT issue. The static NAT should read:&lt;BR /&gt;static (outside,outside) tcp interface 81 10.100.2.1 8080 netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Notice the source and destination interfaces are both outside (because the VPN client is via the outside interface too).&lt;BR /&gt;I'm a lot of years configuring PIX and ASA and never had to do that before !!</description>
      <pubDate>Wed, 13 Feb 2019 17:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-8-25-access-to-vpn-client-from-outside/m-p/3801168#M7017</guid>
      <dc:creator>j.eustace</dc:creator>
      <dc:date>2019-02-13T17:01:36Z</dc:date>
    </item>
  </channel>
</rss>

