03-11-2013 03:06 AM - edited 03-11-2019 06:12 PM
Hi Guys.
I need your help again. I am able to access an intranet site using Cisco's VPN Client but I cannot access it using SSL VPN client. Configured "vpn hair pin" and it's working fine on cisco vpn client but not on SSL Client.
Need your help again guys.
I need SSL for mac users. I have problems installing vpn client for Mac users. Any experience installing vpn client on mac user. OSX?
Thank you & God bless!
Solved! Go to Solution.
03-12-2013 12:50 AM
Instead of the VPN Pool, you would need to add the ASA outside interface IP, because Clientless SSL VPN doesn't use VPN Pool.
On your ASA:
Step 1: turn on hair pinning (same-security-traffic permit intra-interface)
Step 2: add the following ACL to the existing site-to-site VPN: permit ip host
On the remote end:
Step 1: add NAT exemption: permit ip
Step 2: add the following ACL to the existing site-to-site VPN to your site: permit ip
03-11-2013 06:21 AM
Can you please share your ASA configuration?
Also what version of SSL VPN are you using? and what version of ASA are you running?
Have you tested the SSL VPN on Windows, and do they have the same issue as MAC users, or the issue with SSL VPN is only with MAC users?
03-11-2013 08:08 PM
Hi,
I created a clientless vpn profile using asdm wizard. I used the existing group policy since I can access the site using it. please see attached picture. What other settings must be checked for the clientless ssl vpn to work like in cisco vpn client. Thank you for your help.
03-12-2013 12:03 AM
Hi Ms. Halim,
I have read your post:
https://supportforums.cisco.com/thread/2066799
I have the same issue. Can you elaborate further on your posted solution before. Your help is greatly appriciated.
I believe I already done this from the post I have followed @ http://www.petenetlive.com/KB/Article/0000040.htm
Thank you in advance...
********
Yes you can, and here is what you have to add apart from the standard "same-security-traffic permit intra-interface":
On the hub:
The crypto ACL towards the spoke needs to include the following:
access-list
On the spoke:
The crypto ACL towards the hub needs to include the following:
access-list
You would also need to add NAT exemption access-list on the spoke:
access-list
Clear the tunnel on both ends, and RDP to the spoke LAN via clientless SSL VPN should work.
Hope that helps.
********************
03-12-2013 12:08 AM
Are you trying to access the intranet site via Clientless SSL VPN, and the intranet site is actually via a site-to-site tunnel on othe remote end?
If yes, can you please share your config from both end to see if there is any missing configuration.
03-12-2013 12:15 AM
Yes Maam thats correct. Can I send you our config via email?
I can share to you our config but the problem is with my counter part since I am not allowed to access their ASA.
Thank you.
03-12-2013 12:18 AM
Yes, you can PM me your config.
Also, have you confirmed that your counterpart ASA has been configured with the respective config to allow access from your ASA external IP?
03-12-2013 12:41 AM
Hi Maám,
Is this correct? I have to do step 1-3 & my counterpart must do Step 4-5?
Thank you...
Step 1: Add the Subnet of the Remote Site to the "Split Tunnel" for the remote VPN
Step 2: Turn On Hair Pinning
Step 3: Add the "Remote VPN Network" to the EXISTING site to site VPN on the Main Site.
(REMOTE)
Step 4: Add a NAT Exemption on the Remote Site ASA
Step 5: Add the Remote VPN Pool to the EXISTING Site to Site VPN Access List.
03-12-2013 12:50 AM
Instead of the VPN Pool, you would need to add the ASA outside interface IP, because Clientless SSL VPN doesn't use VPN Pool.
On your ASA:
Step 1: turn on hair pinning (same-security-traffic permit intra-interface)
Step 2: add the following ACL to the existing site-to-site VPN: permit ip host
On the remote end:
Step 1: add NAT exemption: permit ip
Step 2: add the following ACL to the existing site-to-site VPN to your site: permit ip
03-12-2013 01:25 AM
Hi Maam,
Sorry I'm very new to ASA. Can you elaborate more on :
Remote end:
Step 1: add NAT exemption: permit ip
On their perspective they will add NAT exemption permit ip < is this the subnet I'm going to access meaning their subnet> host
Thank you Maam for your support.
03-12-2013 01:30 AM
Yes, you are correct.
Remote subnet would be your counterparts local subnet (ie: subnet you are going to access)
03-12-2013 01:34 AM
Hi Maam,
Thank you for verifying..
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide