02-28-2025 11:54 AM
Hello
So I followed this guide https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215532-configure-remote-access-vpn-on-ftd-manag.html
And after I set it all up, I have verified via CLI that I am indeed connected [from ihpone] using the
show vpn-sessiondb anyconnect
I connect but I can n ping 8.8.8.8, google.com or any LAN IP. It is like it connects, to nothing.
The only variation I had done was create my own cert, as I have no existing cert to upload, so maybe on the cert I selected an incorrect security or something.. Also, I wanna verify...
Local Address Assignment to AnyConnect = the fake new virtual IP network to connect to, NOT on my existing FTD
and
local network behind the FDM = the existing Network I want my VPN to have access to? or is this also a new virtual ip network?
Solved! Go to Solution.
03-01-2025 12:19 PM
@TheGoob wrote:
Alright so I won’t lie, I read it and though I can see the process I still can’t see how I would have even known about this as an issue.
As a whole are you saying I should NOT have NAT Exemption or that I do, but being the order of process that I need to add the specific networks to be done with encryption?
Yes, NAT exempt needs to be configured in order for traffic between your VPN clients and the Inside Networks, that you defined when configuring NAT exempt, is encrypted correctly.
Trying to read your response and associate it with the link.
In the config, is NAT exemption putting the listed interfaces before or after encryption, or is it making them exempt from encryption?
NAT exemption is not NAT-ing traffic between your VPN clients (IPs from 10.0.1.0/24) and your internal networks. This way traffic that needs to be encrypted is correctly identified, marked and encrypted.
02-28-2025 12:07 PM
Hello,
for the local addresses assigned to VPN clients, have you configured:
1. an ACL entry to allow them access to the Internet and another ACL entry to allow them access to your internal network?
2. a NAT entry for when they go to the Internet?
02-28-2025 12:42 PM
Oh.. I guess I was too literal to the guide, as I did not make such rules. I had assumed doing all this would do that in the background.
02-28-2025 12:44 PM
I'm afraid there is no such thing when it comes to firewalls :))
02-28-2025 01:17 PM
Yeah it was wishful thinking. Also, like I mentioned earlier.. The Anyconnect Local Address Assignment is the new "virtual" IP Network that my remote device connects to and the FDM Local Network, is that the pre-existing Network I want the RA to have access to? Or is it too a virtual,new FDM located Network?
02-28-2025 01:49 PM
"The Anyconnect Local Address Assignment" is a pool of IP addresses, called also VPN Pool in the documentation, that are used to provide an IP address to the users connecting via Cisco AnyConnect.
This pool of addresses should be viewed like a "virtual" network connected to the firewall and you should configure ACL entries for it in order to access the inside network.
And yes, the FDM Local Network, is the pre-existing Network you want the RA to have access to.
02-28-2025 02:02 PM
Interesting. Ugh I removed all my configuration last night cause it did not work. I will redo it then figure out how and where to make the ACL's/NAT.
02-28-2025 02:49 PM
Well this is where I am running into an issue.
1.) I already have a NAT for the 192.168.5.0/24 [LAN] with x.x.x.182 [WAN]
When I create another NAT for the FDM_Anyconnect_Inside_Pool, which is also 192.158.5.0/24 with x.x.x.182 it errors and says it is overlapping.
2.) As far as an ACL rule, does not 'any' and 'any' already incorporate the new Anyconnect_Pool 10.0.1.0/24?
02-28-2025 03:04 PM
1. You need to assign the VPN pool a unique subnet, not used on any other connected interface in the firewall.
2. Yes it does, but I would configure them more specific.
02-28-2025 03:09 PM
Ahh, I then probably asked my question earlier wrong.
I have a Network 192.168.5.0/24 which IS the actual LAN I use now... When creating, for the VPN, a FDM_Local_Pool, this is yet ANOTHER LAN Subnet outside of my existing?
So, in the end, I will have the Virtual Anyconnect [10.0.1.0/24] the FDM_Local [192.168.10.0/24 (Made specifically for the VLN/LAN)] and then then existing LAN 192.168.5.0/24 that I will then give access to?
02-28-2025 03:28 PM
I have a Network 192.168.5.0/24 which IS the actual LAN I use now... When creating, for the VPN, a FDM_Local_Pool, this is yet ANOTHER LAN Subnet outside of my existing?
Yes, that is correct. You define the VPN pool in the firewall configuration like this https://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/215532-configure-remote-access-vpn-on-ftd-manag.html#toc-hId-2085974521
So, in the end, I will have the Virtual Anyconnect [10.0.1.0/24] the FDM_Local [192.168.10.0/24 (Made specifically for the VLN/LAN)] and then then existing LAN 192.168.5.0/24 that I will then give access to?
You only need the VPN Anyconnect pool [10.0.1.0/24 for example] and the existing LAN 192.168.5.0/24 that you will then give access to.
I don't really understand what do you mean by "FDM_Local [192.168.10.0/24 (Made specifically for the VLN/LAN)]".
02-28-2025 03:33 PM
Alright, what I mean is when that guide says ' local network behind the FDM device' are they referring to the per-existing LAN I already have, I.E 192.168.5.0/24?
02-28-2025 03:36 PM
Correct.
02-28-2025 03:43 PM - edited 02-28-2025 04:53 PM
Then something else is wrong, because if the Anyconnect_Pool would be defined under "any" in an ACL that I have and then the Existing LAN Network [192.168.5.0/24] has a NAT for a x.x.x.182 WAN IP...I should get throughput after a successful connection, but I do not.
When I connect, this is was the CLI says;
03-01-2025 04:35 AM
Maybe I didn't understand correctly what you where asking and there are a few things that might need attention.
Here is a video guide on how to configure RA VPN on the FTD: https://www.youtube.com/watch?v=Bov4BBCQeas
The configuration part is very short, first 10 minutes, and it touches all important steps you need to take care in order to make it work.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide