10-14-2011 09:18 AM - edited 03-04-2019 01:56 PM
Hello Community,
I have just setup my VPN Client. I have an inside subnet 192.168.210.0 and I have a DMZ subnet 192.168.220.0
I have my VPN users assigned an ip address from my pool 192.168.210.100 - 150
I am able to connect successfully and receive an Ip address and access servers on the 192.168.210.0 network, but I cannot access the DMZ servers.
Thanks in Advance!
10-20-2011 07:48 AM
Yes it makes sense, I will test later in the day and let you know my results.
Thanks again
John
10-20-2011 01:06 PM
Hi John,
I just tested on my laptop. The VPN client is able to get an ip address of 192.168.230.100, but it cannot ping the 192.168.210.0 or the 192.168.220.0 networks.
On my VPN client, it is getting the following configuration:
Ip address: 192.168.230.100
mask: 255.255.255.0
G/w: 192.168.230.100
DNS: 10.10.10.11 (my internal DNS server)
Thanks
John
10-21-2011 07:52 AM
Try modifying your nonat acl by adding the 192.168.230.0 subnet:
access-list nonat extended permit ip 192.168.210.0 255.255.255.0 192.168.220.0 255.255.255.0
access-list nonat extended permit ip 192.168.210.0 255.255.255.0 192.168.230.0 255.255.255.0
John
10-25-2011 07:12 AM
Hi John,
Still not working, the vpn client is not able to ping or RDP to any server on my 192.168.210.0 or 192.168.220.0 network.
But I am able to ping my vpn client from my 192.168.210.0 network.
John
10-25-2011 07:17 AM
10-25-2011 07:30 AM
Is it possibel that I need an ACL allowing my vpn client to access these networks? Just an idea....
10-25-2011 07:50 AM
I've been swamped with a project, so I haven't been able to respond.
You still need an entry to not nat from the dmz to the vpn subnet:
access-list nonat permit ip 192.168.220.0 255.255.255.0 192.168.230.255.255.255.0
Try that and let me know the results...
10-25-2011 07:56 AM
Hi John,
no worries, your help is much appreciated no matter what.
I have added these two commands. But I can now get to my 192.168.210.0 server via RDP. But cannot get to my 192.168.220.0 dmz server via RDP. I am able to ping my vpn client from BOTH subnets.
So a little improvement, but still not RDP from VPN to DMZ....
Below are the lines I have added:
access-list inside_nat0_outbound extended permit ip 192.168.210.0 255.255.255.0 192.168.230.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.220.0 255.255.255.0 192.168.230.0 255.255.255.0
John
10-25-2011 08:28 AM
access-list inside_nat0_outbound extended permit ip 192.168.210.0 255.255.255.0 192.168.230.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.220.0 255.255.255.0 192.168.230.0 255.255.255.0
Add:
access-list inside_nat0_outbound extended permit ip 192.168.210.0 255.255.255.0 192.168.220.0 255.255.255.0
Get rid of:
access-list inside_nat0_outbound extended permit ip any 192.168.210.0 255.255.255.0
Can you ping the server that RDP is running on? If so, try to telnet into the port:
telnet
If you get a black screen and it doesn't hang, you're getting to the RDP port.
Let me know...
10-25-2011 08:29 AM
Also add:
same-security-traffic permit intra-interface
10-25-2011 08:36 AM
Hi John,
I cannot ping the dmz server nor RDP to it, I tried telent and that did not work either. ( Just FYI...I am able to RDP to that dmz 192.168.220.10 server from my "inside" 192.168.210.11 server)
Here is my ACL section of my Show Run:
access-list outside_in extended permit tcp any host 173.xxx.xx.70 eq www
access-list inside_nat0_outbound extended permit ip 192.168.210.0 255.255.255.0 192.168.230.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.210.0 255.255.255.0 192.168.220.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 192.168.220.0 255.255.255.0 192.168.230.0 255.255.255.0
access-list vpn-dmz standard permit 192.168.220.0 255.255.255.0
access-list vpn-dmz standard permit 192.168.210.0 255.255.255.0
Here is my NAT section:
global (outside) 1 interface
global (DMZ) 1 interface
nat (DMZ) 1 192.168.220.0 255.255.255.0
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 192.168.210.0 255.255.255.0
static (DMZ,outside) 173.xxx.xx.70 192.168.220.10 netmask 255.255.255.255
access-group outside_in in interface outside
Here is my ROUTE section:
route outside 0.0.0.0 0.0.0.0 173.xxx.xx 1
route outside 192.168.230.0 255.255.255.0 192.168.210.222 1
I hope the above helps.
John
10-25-2011 08:39 AM
I have added the command:
same-security-traffic permit intra-interface
Also, just for more info but probably another post for me to make, but I cannot get to the internet on my laptop while connected to the VPN. Just want to give you all the details, not wanting to add to the problem at hand.
10-25-2011 08:56 AM
John,
The DNS server that you're using is:
10.10.10.11 10.10.10.22 (Where are these addresses in your network?)
You're going to need to set up another nat rule to exclude this subnet from natting when going to the 192.168.210, .220, and .230 subnets.
You should be able to get to the internet once that happens. To see if you can even get to those DNS servers, try to ping them while on the VPN. If you can't, that's the problem (unless these are devices that don't know how to get to the 192.168.230.0/24 subnet).
You need to keep the same-security line in the config if you're wanting to browse the web while on the VPN and force web traffic through your tunnel. Otherwise, if you're wanting to send traffic that only belongs on the tunnel, you can enable split tunneling by specifying an acl in your group policy that references what hosts/subnets to allow over the tunnel.
You still need to get rid of this line:
global (dmz) 1 interface
You don't want anything natting to your DMZ interface....
10-25-2011 09:11 AM
Hi John,
I really do not need to add the 10.10.10.11 and 10.10.10.12 DNS servers just yet. I put them there not realizing that there are no routes going to that subnet. I have removed them for now. It is something I will work on once I get other things working, for now the vpn clients can use the IP addresses only.
I did remove the global (dmz) 1 interface.
Still no luck to my dmz server from my clients. We can work on the internet issue in another post. I know it adds a whole new issue to the mix....
I have also included an updated show running config...
John
10-25-2011 09:25 AM
John,
I don't see a reason why this isn't working...
Are you outside of the office using the VPN or on an aircard?
Post the results of the following:
sh vpn-sessiondb detailed remote filter a-ipaddress
Also add:
nat (inside) 1 192.168.230.0 255.255.255.0
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide