12-13-2017 07:59 AM - edited 02-21-2020 06:57 AM
I have a Cisco ASA 5512-X connected to two ISPs. The "outside" interface is our main ISP and the "cable-modem" is our second ISP that people on the guest lan will use for internet access. The default route points traffic through the outside interface and PBR is used to direct traffic for the guest lan through the cable-modem interface to the internet.
The problems I am encountering is that IT would like to also use the guest lan as a way to test AnyConnect SSL vpn periodically when a new profile is set up. When connected to the guest lan and I try to launch the SSL VPN it times out, just like when trying it from the inside interface. I expect that behavior from the inside interface but I thought that I would be able to route this VPN traffic out the cable-modem interface to the internet then back to the outside interface to make a successful connection. I am also seeing trouble getting to resources hosted behind the DMZ (webserver & mail server). All other traffic to the internet appears to work fine, just internal resources are failing.
The ASDM logs show the following error when trying to ping the internal webserver and mail server:
"Deny ICMP reverse path check from x.x.x.x (cable-modem public IP) to x.x.x.x (webserver public IP) on interface outside"
I get a similar tcp error when trying to load a webpage from the webserver.
I understand that when I am trying to contact the webserver my traffic is routing to the internet then coming back in and the return traffic from the webserver is probably taking a different path back causing the packets to be dropped by the ASA. My question is, can this be done or is just a limitation by design?
Solved! Go to Solution.
12-13-2017 08:23 AM
I believe you are describing two problems, so I will try to address them separately:
- You will not be able to access the outside interface of the ASA from the inside or guest network. What you can do, is activate the anyconnect on the guest interface and instruct the IT personal to use the guest IP on the ASA for testing.
webvpn
enable guest
- The log you posted indicates that you have reverse path enabled on the outside interface, this means that ASA will not accept traffic on interfaces from which they didn’t originate. Considering you have a default route on the outside interface you should check to see if you have a more specific route. You could also disable rpf:
no ip verify reverse-path interface outside
12-13-2017 08:23 AM
I believe you are describing two problems, so I will try to address them separately:
- You will not be able to access the outside interface of the ASA from the inside or guest network. What you can do, is activate the anyconnect on the guest interface and instruct the IT personal to use the guest IP on the ASA for testing.
webvpn
enable guest
- The log you posted indicates that you have reverse path enabled on the outside interface, this means that ASA will not accept traffic on interfaces from which they didn’t originate. Considering you have a default route on the outside interface you should check to see if you have a more specific route. You could also disable rpf:
no ip verify reverse-path interface outside
12-14-2017 11:03 AM
Thank you Bogdan, I appreciate the quick response.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide