09-15-2009 07:48 PM - edited 03-11-2019 09:15 AM
Hello all,
I have created 3 vlans on my ASA 5505,
5,10,15,and 20
They are on Interface 0/4 and trunked to a switch port which is also configured as a trunk. All works great....EXCEPT
I have a printer on VLAN 20 (192.168.20.15) that folks on VLAN 5 and 15 need to print to. I have the vlans on the same security level and configured same-security-traffic-permit.
I am missing something very elementary, I'm sure. Can someone please provide the key to this puzzle?
Thanks!
John
09-18-2009 10:53 AM
Ok, will do. Thanks!
09-20-2009 08:46 PM
OK s here is what I found:
3 Sep 20 2009 21:25:45 305005 192.168.1.251 No translation group found for icmp src outside:192.168.30.51 dst inside:192.168.1.251 (type 8, code 0)
3 Sep 20 2009 21:27:46 305005 192.168.1.252 No translation group found for icmp src outside:192.168.30.51 dst inside:192.168.1.252 (type 8, code 0)
It says A packet does not match any of the outbound nat command rules.
In this scenario, I was VPNed in tryin to access a switch on vlan1 (192.168.1.251)
When I ping the other vlans, (5,15,and 20) nothing shows up in the log and the request times out.
09-20-2009 09:32 PM
09-21-2009 01:48 AM
what does the logging show when you try and access those vlans from the vpn client?
Do those vlans know about the 192.168.30.0 network is available thru the ASA?
09-21-2009 05:47 AM
That's just it. Nothing shows up in the logs. For example, When I ping or telnet or RDP to any of the vlans, the log shows nothing. Except of course vlan 1.
09-21-2009 06:01 AM
OK - that is strange, lets look elsewhere, what about the logging for the vpn client? What do those logs show?
09-21-2009 06:08 AM
I will enable the VPN log and check. I did notice that the Secured Routes displayed in the VPN statistics window shows only the nbative vlan. 192.168.1.0 and nothing in the local LAN routes pane. In the Tunnel Details it shows that Local LAN is disabled. Should that not be Enabled?
09-21-2009 06:10 AM
OK - that is a show stopper, if the remote network subnets are NOT in the encrypted subnets pane (on the right) then any traffic destinted for those subnets will NOT be encrypted.
09-21-2009 06:14 AM
OK - I see the issue, in the last config you posted you have:-
group-policy KWRE attributes
vpn-tunnel-protocol IPSec svc webvpn
split-tunnel-policy tunnelspecified
split-tunnel-network-list value KWRE_Split_Tunnel
BUT KWRE_Split_Tunnel only has
access-list KWRE_Split_Tunnel standard permit 192.168.1.0 255.255.255.0
So you need to change:-
from
split-tunnel-network-list value KWRE_Split_Tunnel
to
split-tunnel-network-list value KWRE_splitTunnelAcl
And it will work, my fault when reviewing the config.
09-21-2009 07:00 AM
It work!!! Thank you Thank You Thank You!! My eyes just did not see it! Wow! So simple. I will be more careful next time. Thanks again for all your patience and support.
09-21-2009 07:04 AM
np - glad to help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide