cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1109
Views
0
Helpful
4
Replies

ASA 9.6 VPN cannot browse internal network nor external

Nico M
Level 1
Level 1

Hallo everybody,

I'm stuck with my ASA 5506 configuration.

I have an internal server at 10.0.0.14 that is reachable from the outside.

It all work fine, but I cannot browse the internal network once I'm connected to the ASA 5506 with VPN in client mode.

The connection is established but, I cannot find the correct configuration to access my internal network or to browse external www sites.

I activate split tunnelling, but I'm afraid I'm missing something :(

Can anybody help me?

this is my config file:

ASA Version 9.6(1)
!
hostname ciscoasa
domain-name fmxxx .com
enable password xxxxxxxx encrypted
passwd xxxxxxxxxx encrypted
names
ip local pool VPN_pool_1 10.0.0.80-10.0.0.90 mask 255.255.255.0
ip local pool VPN_pool_2 10.0.1.80-10.0.1.100 mask 255.255.255.0

!
interface GigabitEthernet1/1
nameif outside
security-level 0
pppoe client vpdn group POE
ip address pppoe setroute
!
interface GigabitEthernet1/2
nameif inside
security-level 100
ip address 10.0.0.1 255.255.255.0
!
interface GigabitEthernet1/3
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/4
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/5
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/6
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/7
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet1/8
shutdown
no nameif
no security-level
no ip address
!
interface Management1/1
management-only
no nameif
no security-level
no ip address
!
ftp mode passive
dns server-group DefaultDNS
domain-name fmsvr.eu
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network obj_any
subnet 0.0.0.0 0.0.0.0
object network Server_10.0.0.14
host 10.0.0.14
object network Outside_IP
host 81.174.xxx.xxx
object service FileMakerAdmin
service tcp source range 16000 16001
description Porta console FM
object service FileMakerGO
service tcp source eq 5003
description Filemaker Go Accesso server
object service FileMakerWeb
service tcp source eq 447
description Server Web https Filemaker
object service FileMakerWebHttp
service tcp source eq 591
description Server Web Filemaker HTTP
object service NAS
service tcp source range 5000 5001
description Accesso NAS
object service NAS_TVCC
service tcp source range 9025 9040
description Accesso NAS TVCC
object service OpenHabHttp
service tcp source eq 8080
description OpenHab server HTTP
object service OpenHabHttps
service tcp source eq 8445
description OpenHab Server HTTPS
object network Server_Web_Interno_HTTP
object service DS_Cloud
service tcp source eq 6690
description Cloud Station Sunology
object service DS_Stat
service tcp source range 9025 9040
description Cloud Station Sunology
object service DS_Station
service tcp source range 9900 9901
object service HTTP
service tcp source eq www
object service HTTPS
service tcp source eq https
object service 5000
service tcp source eq 5000
object service Mail_POP
service tcp source eq pop3
object service Mail_SMTP
service tcp source eq smtp
object service Mail_IMAP
service tcp source eq imap4
object network NETWORK_OBJ_10.0.0.80_28
subnet 10.0.0.80 255.255.255.240
object network NETWORK_OBJ_10.0.1.64_26
subnet 10.0.1.64 255.255.255.192
object network NETWORK_OBJ_10.0.1.0_24
subnet 10.0.1.0 255.255.255.0
object network NETWORK_OBJ_10.0.0.0_24
subnet 10.0.0.0 255.255.255.0
object-group service FileMaker
service-object object FileMakerGO
service-object object FileMakerWeb
service-object object FileMakerWebHttp
service-object object FileMakerAdmin
object-group service NAS_Synology
service-object object DS_Cloud
service-object object DS_Stat
service-object object DS_Station
service-object object NAS
service-object object NAS_TVCC
object-group service OpenHab
description Tutte le connessioni a OpenHab Server
service-object object OpenHabHttps
object-group service INIM tcp
port-object eq 5004
object-group service Mail_Server tcp
port-object eq pop3
access-list outside_in extended permit ip any object Server_10.0.0.14
access-list outside_access_in extended permit ip any object Server_10.0.0.14
access-list outside_access_in_1 extended permit ip any object Server_10.0.0.14
access-list outside_access_in_2 extended permit ip any object Server_10.0.0.14
access-list SPLIT-TUNNEL standard permit 10.0.1.0 255.255.255.0
access-list SPLIT-TUNNEL standard permit 10.0.0.0 255.255.255.0
access-list DefaultRAGroup_splitTunnelAcl standard permit 10.0.1.0 255.255.255.0
access-list vpn-pool extended permit ip 10.0.1.0 255.255.255.0 any
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static Server_10.0.0.14 interface service HTTPS HTTPS
nat (inside,outside) source static Server_10.0.0.14 interface service HTTP HTTP
nat (inside,outside) source static Server_10.0.0.14 interface service FileMakerWebHttp FileMakerWebHttp
nat (inside,outside) source static Server_10.0.0.14 interface service FileMakerWeb FileMakerWeb
nat (inside,outside) source static Server_10.0.0.14 interface service FileMakerAdmin FileMakerAdmin
nat (inside,outside) source static Server_10.0.0.14 interface service FileMakerGO FileMakerGO
nat (inside,outside) source static Server_10.0.0.14 interface service OpenHabHttp OpenHabHttp
nat (inside,outside) source static Server_10.0.0.14 interface service OpenHabHttps OpenHabHttps
nat (inside,outside) source static Server_10.0.0.14 interface service Mail_IMAP Mail_IMAP
nat (inside,outside) source static Server_10.0.0.14 interface service Mail_POP Mail_POP
nat (inside,outside) source static Server_10.0.0.14 interface service Mail_SMTP Mail_SMTP
nat (inside,inside) source dynamic NETWORK_OBJ_10.0.0.0_24 interface destination static Outside_IP Server_10.0.0.14
!
object network obj_any
nat (inside,outside) dynamic interface dns
access-group outside_access_in_2 in interface outside
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
user-identity default-domain LOCAL
http server enable
http 10.0.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
service sw-reset-button
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac
crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpool policy
crypto ikev1 enable outside
crypto ikev1 policy 20
authentication rsa-sig
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 30
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 86400
crypto ikev1 policy 50
authentication rsa-sig
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 60
authentication pre-share
encryption aes-192
hash sha
group 2
lifetime 86400
crypto ikev1 policy 80
authentication rsa-sig
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 90
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
crypto ikev1 policy 110
authentication rsa-sig
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 120
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 140
authentication rsa-sig
encryption des
hash sha
group 2
lifetime 86400
crypto ikev1 policy 150
authentication pre-share
encryption des
hash sha
group 2
lifetime 86400
telnet 10.0.0.0 255.255.255.0 inside
telnet timeout 5
ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
vpdn group EOLO request dialout pppoe
vpdn group EOLO localname xxxxxxxxxxx
vpdn group EOLO ppp authentication pap
vpdn username xxxxxxxxxx password xxxxxxxx

dhcpd auto_config outside
!
dhcpd address 10.0.0.100-10.0.0.190 inside
dhcpd dns 8.8.8.8 208.67.222.222 interface inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!
ntp server 217.147.223.78 source outside
ntp server 10.0.0.250 source inside prefer
ntp server 193.204.114.232 source outside
webvpn
cache
disable
no error-recovery disable
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
dns-server value 8.8.8.8 208.67.222.222
vpn-tunnel-protocol ikev1
password-storage enable
split-tunnel-policy tunnelspecified
default-domain value fmsvr.eu
group-policy DefaultRAGroup_1 internal
group-policy DefaultRAGroup_1 attributes
dns-server value 8.8.8.8
vpn-tunnel-protocol ikev1
password-storage disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl
default-domain value fmsvr.eu
dynamic-access-policy-record DfltAccessPolicy
username xxxxx password xxxxxxxxxxxxxxxx encrypted privilege 15
username xxxxx attributes
password-storage enable
tunnel-group DefaultRAGroup general-attributes
address-pool VPN_pool_1
address-pool VPN_pool_2
default-group-policy DefaultRAGroup_1
tunnel-group DefaultRAGroup ipsec-attributes
ikev1 pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect dns preset_dns_map
inspect ftp
inspect h323 h225
inspect h323 ras
inspect rsh
inspect rtsp
inspect esmtp
inspect sqlnet
inspect skinny
inspect sunrpc
inspect xdmcp
inspect sip
inspect netbios
inspect tftp
inspect ip-options
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:xxxxxxxxxxxxxxx

1 Accepted Solution

Accepted Solutions

Rahul Govindan
VIP Alumni
VIP Alumni

Looks like you are missing a statement in the NAT to exempt traffic between the VPN pool network and the internal network. The statement should be above the static nat statements that you have for allowing accessing the server from the Internet. The statement would look something like this:

nat (inside,outside) 1 source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.0.0.80_28 NETWORK_OBJ_10.0.0.80_28 no-proxy-arp route-lookup

So here the first 2 objects referenced are your internal networks and next 2 your vpn pool networks. Create similar ones for other vpn pools and internal networks.

You can use the config guide as provided below as reference:

http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/119006-configure-anyconnect-00.html

Also are you not able to access external networks also? Can you check your routing table after a successful connection to see if split tunnel routes are installed?

View solution in original post

4 Replies 4

Rahul Govindan
VIP Alumni
VIP Alumni

Looks like you are missing a statement in the NAT to exempt traffic between the VPN pool network and the internal network. The statement should be above the static nat statements that you have for allowing accessing the server from the Internet. The statement would look something like this:

nat (inside,outside) 1 source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.0.0.80_28 NETWORK_OBJ_10.0.0.80_28 no-proxy-arp route-lookup

So here the first 2 objects referenced are your internal networks and next 2 your vpn pool networks. Create similar ones for other vpn pools and internal networks.

You can use the config guide as provided below as reference:

http://www.cisco.com/c/en/us/support/docs/security/anyconnect-secure-mobility-client/119006-configure-anyconnect-00.html

Also are you not able to access external networks also? Can you check your routing table after a successful connection to see if split tunnel routes are installed?

Thank you Rahul,

I will try the guide you suggested me, and let you know If I can make it work. :)

Worked fine!! thanks.

Now I can have access via VPN to my internal network.

I still have to find out to with the same connection how to be able to browse Internet (outside)

I believe you are connecting to the DefaultWebvpnGroup and not DefaultRAGroup, which has the right group-policy and split tunnel attributes enabled. Create a "group-alias" for the DefaultRAGroup and enable the tunnel-group-list. This will allow you to  choose which group you want to login to and provide you the right group-policy. Again, use the provided link as reference.

Review Cisco Networking for a $25 gift card