11-07-2017 03:24 AM - edited 02-21-2020 06:39 AM
I am trying to access my ASA from my inside network, but it does not seem to work.
I am rather new to ASA, so I might've missed something.
Any help would be appreciated.
Here are the configs:
hostname VPN-RA
domain-name test
enable password OQ5NBRwCbPcOutWX encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Ethernet0/0
nameif outside
security-level 0
ip address X.X.X.X 255.255.255.240
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 10.255.1.1 255.255.255.252
!
interface Ethernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface Ethernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
shutdown
no nameif
no security-level
no ip address
!
ftp mode passive
dns domain-lookup outside
dns server-group DefaultDNS
name-server 8.8.8.8
domain-name test
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
access-list tunnel_acl extended permit ip 192.168.1.0 255.255.255.248 10.0.0.0 255.0.0.0
access-list tunnel_acl extended permit ip 10.0.0.0 255.0.0.0 192.168.1.0 255.255.255.248
access-list nonat extended permit ip 192.168.1.0 255.255.255.248 10.0.0.0 255.0.0.0
access-list nonat extended permit ip 10.0.0.0 255.0.0.0 192.168.1.0 255.255.255.248
access-list outside_acl extended permit icmp any any echo-reply
pager lines 24
logging enable
logging timestamp
logging emblem
logging buffer-size 10000
logging asdm-buffer-size 512
logging monitor informational
logging buffered warnings
logging trap warnings
logging history debugging
logging asdm informational
logging facility 23
logging queue 1
logging permit-hostdown
mtu outside 1500
mtu inside 1500
ip local pool client_pool 192.168.1.1-192.168.1.5 mask 255.255.255.248
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any echo-reply outside
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 0.0.0.0 0.0.0.0
access-group outside_acl in interface outside
route outside 0.0.0.0 0.0.0.0 X.X.X.X 1
route inside 10.0.0.0 255.0.0.0 10.255.1.2 1
route inside 192.0.0.0 255.0.0.0 10.255.1.2 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set test-transform-set esp-aes esp-md5-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map crypto-test-map 1 set transform-set test-transform-set
crypto dynamic-map crypto-test-map 1 set reverse-route
crypto map test-map 1 ipsec-isakmp dynamic crypto-test-map
crypto map test-map interface outside
crypto isakmp enable outside
crypto isakmp policy 1
authentication pre-share
encryption aes
hash sha
group 2
lifetime 43200
crypto isakmp policy 65535
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh 10.255.1.0 255.255.255.252 inside
ssh timeout 5
ssh version 2
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
group-policy ipsec_policy internal
group-policy ipsec_policy attributes
vpn-tunnel-protocol IPSec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value tunnel_acl
address-pools value client_pool
username mlr password Jrw6xQwyx2pUO9Ge encrypted
username joe password FGfdYQaVyGH6XT90 encrypted
username mth password 5ObU/MGiFj1wMw4m encrypted
username z6xmk password p3cuZCSsttGFWYcw encrypted
username mrk password W.LiKTM7s6SdHnMQ encrypted
tunnel-group testgroup type remote-access
tunnel-group testgroup general-attributes
address-pool client_pool
default-group-policy ipsec_policy
tunnel-group testgroup ipsec-attributes
pre-shared-key *****
!
!
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:ae7a9737969935674002205352b8cdf7
: end
----------------------------
And the connected switch, I am tryingto ssh from.
hostname Switch
!
boot-start-marker
boot-end-marker
!
!!
aaa new-model
!
aaa user profile z6xmk
!
aaa authentication login default local enable
!
!
!
!
!
aaa session-id common
switch 1 provision ws-c3750x-24
system mtu routing 1500
ip routing
!
!
!
!
!
crypto pki trustpoint TP-self-signed-1793996160
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1793996160
revocation-check none
rsakeypair TP-self-signed-1793996160
!
!
quit
spanning-tree mode pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
!
interface FastEthernet0
no ip address
no ip route-cache cef
no ip route-cache
shutdown
!
interface GigabitEthernet1/0/1
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/2
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/3
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/4
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/5
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/6
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/7
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/8
switchport access vlan 12
switchport mode access
!
interface GigabitEthernet1/0/9
switchport access vlan 7
switchport mode access
!
interface GigabitEthernet1/0/10
switchport access vlan 7
switchport mode access
!
interface GigabitEthernet1/0/11
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet1/0/12
switchport access vlan 20
switchport mode access
!
interface GigabitEthernet1/0/13
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
switchport access vlan 2
switchport mode access
!
interface GigabitEthernet1/0/22
switchport access vlan 2
switchport mode access
!
interface GigabitEthernet1/0/23
shutdown
!
interface GigabitEthernet1/0/24
no switchport
ip address 10.255.1.2 255.255.255.252
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface Vlan1
no ip address
!
interface Vlan2
ip address 10.0.2.1 255.255.255.0
!
interface Vlan7
ip address 10.0.7.1 255.255.255.0
!
interface Vlan12
ip address 10.0.12.1 255.255.255.0
!
interface Vlan19
ip address 10.0.19.1 255.255.255.0
!
interface Vlan20
ip address 10.0.20.1 255.255.255.0
!
interface Vlan100
ip address 10.0.100.1 255.255.255.0
!
interface Vlan250
ip address 10.0.250.1 255.255.255.0
!
ip default-gateway 10.255.1.1
!
ip http server
ip http secure-server
!
ip route 0.0.0.0 0.0.0.0 10.255.1.1
!
logging esm config
!
!
!
!
!
line con 0
line vty 0 4
transport input ssh
line vty 5 15
transport input ssh
!
end
Solved! Go to Solution.
11-07-2017 04:11 AM
If you are using /30 Mask on your Firewall Interface which gives you 2 valid IP address and considering that your ASA has two interface on this network, which IP address are you using? And why did you use /30 for inside interface?
Network: 10.255.1.0/30 00001010.11111111.00000001.000000 00 (Class A)
Broadcast: 10.255.1.3 00001010.11111111.00000001.000000 11
HostMin: 10.255.1.1 00001010.11111111.00000001.000000 01
HostMax: 10.255.1.2 00001010.11111111.00000001.000000 10
Hosts/Net: 2 (Private Internet)
!
interface GigabitEthernet1/0/24
no switchport
ip address 10.255.1.2 255.255.255.252
!
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 10.255.1.1 255.255.255.252
!
11-07-2017 04:11 AM
If you are using /30 Mask on your Firewall Interface which gives you 2 valid IP address and considering that your ASA has two interface on this network, which IP address are you using? And why did you use /30 for inside interface?
Network: 10.255.1.0/30 00001010.11111111.00000001.000000 00 (Class A)
Broadcast: 10.255.1.3 00001010.11111111.00000001.000000 11
HostMin: 10.255.1.1 00001010.11111111.00000001.000000 01
HostMax: 10.255.1.2 00001010.11111111.00000001.000000 10
Hosts/Net: 2 (Private Internet)
!
interface GigabitEthernet1/0/24
no switchport
ip address 10.255.1.2 255.255.255.252
!
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 10.255.1.1 255.255.255.252
!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide