cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
304
Views
0
Helpful
1
Replies

Pinging issue with ASA 5505

davespicer2012
Level 1
Level 1

Ok. I have been racking my brain out on this with no luck. Could really use some help in fixing it

So here is my issue. I have 2 different VPNs and both are able to be connect to. I have split tunneling enabled and that works. But when I am connect to VPN I can not ping the other VPN. Firewalls on both computers are turned off. So to recap. I am on VPN with IP 192.168.59.2 can not ping the other comptuer on vpn 192.168.60.2 or vice versa

 

ASA Version 9.1(5)21

!

Hostname ****

domain-name ****

enable password vrfxSSUQ9kFKHrvw encrypted

xlate per-session deny tcp any4 any6

xlate per-session deny tcp any6 any4

xlate per-session deny tcp any6 any6

xlate per-session deny udp any4 any4 eq domain

xlate per-session deny udp any4 any6 eq domain

xlate per-session deny udp any6 any4 eq domain

xlate per-session deny udp any6 any6 eq domain

names

ip local pool AnyC-CPN-Client-Pool 192.168.59.0-192.168.59.250 mask 255.255.255.0

ip local pool Dad's-Desktop 192.168.60.1-192.168.60.2 mask 255.255.255.255

!

interface Ethernet0/0

 switchport access vlan 12

!

interface Ethernet0/1

 switchport access vlan 2

!

interface Ethernet0/2

 shutdown

!

interface Ethernet0/3

 switchport access vlan 3

 shutdown

!

interface Ethernet0/4

 shutdown

!

interface Ethernet0/5

 shutdown

!

interface Ethernet0/6

 shutdown

!

interface Ethernet0/7

 shutdown

!

interface Vlan2

 nameif inside

 security-level 100

 ip address 192.168.0.1 255.255.255.252

!

interface Vlan12

 nameif Outside

 security-level 0

 ip address dhcp setroute

!

banner login *************************************

banner login       Unuathorized access is prohibited !!

banner login *************************************

banner asdm *************************************

banner asdm       Unuathorized access is prohibited !!

banner asdm *************************************

ftp mode passive

clock timezone MST -7

clock summer-time MDT recurring

dns domain-lookup inside

dns domain-lookup Outside

dns server-group DefaultDNS

 domain-name spicertech.info

same-security-traffic permit inter-interface

same-security-traffic permit intra-interface

object network VLAN54

 subnet 192.168.54.0 255.255.255.0

 description VLAN 54

object network Management

 subnet 192.168.80.0 255.255.255.0

 description Management

object network VLAN51

 subnet 192.168.51.0 255.255.255.0

 description VLAN 51

object network VLAN52

 subnet 192.168.52.0 255.255.255.0

 description VLAN 52

object network VLAN53

 subnet 192.168.53.0 255.255.255.0

 description VLAN 53

object network VLAN55

 subnet 192.168.55.0 255.255.255.0

 description VLAN 55

object network VLAN56

 subnet 192.168.56.0 255.255.255.0

 description VLAN 56

object network NETWORK_OBJ_192.168.59.0_24

 subnet 192.168.59.0 255.255.255.0

object service 443

 service tcp destination eq https

object service 80

 service tcp destination eq www

object service 8245

 service tcp destination eq 8245

object service 25295

 service udp destination eq 25295

 description Blocking 25295

object network VPN-Connections

 subnet 192.168.59.0 255.255.255.0

 description VPN Connections

object network NETWORK_OBJ_192.168.60.0_30

 subnet 192.168.60.0 255.255.255.248

object-group service No-IP

 description no-ip.com DDNS Update

 service-object object 80

 service-object object 8245

 service-object object 443

object-group icmp-type DM_INLINE_ICMP_1

 icmp-object echo-reply

 icmp-object source-quench

 icmp-object time-exceeded

 icmp-object unreachable

access-list inside_access_in remark No-ip DDNS Update

access-list inside_access_in extended permit object-group No-IP object VLAN51 any

access-list inside_access_in extended permit ip any any

access-list VPN standard permit 192.168.59.0 255.255.255.0

access-list VPN standard permit 192.168.60.0 255.255.255.0

access-list VPN standard permit 192.168.51.0 255.255.255.0

access-list Outside_access_in remark Dad's Web Server for Propane

access-list Outside_access_in extended permit tcp any eq www host 192.168.60.2 eq www inactive

access-list Outside_access_in remark NTP Updates

access-list Outside_access_in extended permit udp any host 192.168.0.2 eq ntp

access-list Outside_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1

access-list Outside_access_in remark Blocking 25295 to HTPC

access-list Outside_access_in extended deny object 25295 any object VLAN54

pager lines 24

logging enable

logging asdm warnings

mtu inside 1500

mtu Outside 1500

icmp unreachable rate-limit 1 burst-size 1

icmp permit any inside

no asdm history enable

arp timeout 14400

no arp permit-nonconnected

nat (inside,Outside) source dynamic any interface

nat (inside,Outside) source static any any destination static NETWORK_OBJ_192.168.59.0_24 NETWORK_OBJ_192.168.59.0_24 no-proxy-arp

nat (inside,Outside) source static any any destination static NETWORK_OBJ_192.168.60.0_30 NETWORK_OBJ_192.168.60.0_30 no-proxy-arp route-lookup

access-group inside_access_in in interface inside

access-group Outside_access_in in interface Outside

!

router eigrp 1

 no auto-summary

 network 192.168.0.0 255.255.255.252

 network 192.168.59.0 255.255.255.0

!

timeout xlate 3:00:00

timeout pat-xlate 0:00:30

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

 webvpn

  port-forward enable Dad

aaa-server LDAP protocol ldap

aaa-server LDAP (inside) host 192.168.51.1

 server-port 636

 ldap-base-dn cn=users,dc=spicerslocal

 ldap-scope subtree

 ldap-naming-attribute cn

 ldap-login-password *****

 ldap-login-dn cn=users,dc=spicerslocal

 sasl-mechanism digest-md5

 ldap-over-ssl enable

 server-type microsoft

user-identity default-domain LOCAL

aaa authentication enable console LOCAL

aaa authentication ssh console LOCAL

http server enable

http 192.168.0.0 255.255.0.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart

sysopt noproxyarp inside

sysopt noproxyarp Outside

crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac

crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac

crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac

crypto ipsec ikev2 ipsec-proposal AES256

 protocol esp encryption aes-256

 protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES192

 protocol esp encryption aes-192

 protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal AES

 protocol esp encryption aes

 protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal 3DES

 protocol esp encryption 3des

 protocol esp integrity sha-1 md5

crypto ipsec ikev2 ipsec-proposal DES

 protocol esp encryption des

 protocol esp integrity sha-1 md5

crypto ipsec security-association pmtu-aging infinite

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5

crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES

crypto map Outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

crypto map Outside_map interface Outside

crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

crypto map inside_map interface inside

crypto ca trustpoint ASDM_TrustPoint0

 enrollment self

 subject-name CN=Main-ASA

 crl configure

crypto ca trustpool policy

crypto ca certificate chain ASDM_TrustPoint0

 certificate *****

  quit

crypto ikev2 policy 1

 encryption aes-256

 integrity sha

 group 5 2

 prf sha

 lifetime seconds 86400

crypto ikev2 policy 10

 encryption aes-192

 integrity sha

 group 5 2

 prf sha

 lifetime seconds 86400

crypto ikev2 policy 20

 encryption aes

 integrity sha

 group 5 2

 prf sha

 lifetime seconds 86400

crypto ikev2 policy 30

 encryption 3des

 integrity sha

 group 5 2

 prf sha

 lifetime seconds 86400

crypto ikev2 policy 40

 encryption des

 integrity sha

 group 5 2

 prf sha

 lifetime seconds 86400

crypto ikev2 enable inside client-services port 443

crypto ikev2 enable Outside

crypto ikev2 remote-access trustpoint ASDM_TrustPoint0

crypto ikev1 policy 10

 authentication crack

 encryption aes-256

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 20

 authentication rsa-sig

 encryption aes-256

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 30

 authentication pre-share

 encryption aes-256

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 40

 authentication crack

 encryption aes-192

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 50

 authentication rsa-sig

 encryption aes-192

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 60

 authentication pre-share

 encryption aes-192

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 70

 authentication crack

 encryption aes

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 80

 authentication rsa-sig

 encryption aes

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 90

 authentication pre-share

 encryption aes

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 100

 authentication crack

 encryption 3des

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 110

 authentication rsa-sig

 encryption 3des

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 120

 authentication pre-share

 encryption 3des

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 130

 authentication crack

 encryption des

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 140

 authentication rsa-sig

 encryption des

 hash sha

 group 2

 lifetime 86400

crypto ikev1 policy 150

 authentication pre-share

 encryption des

 hash sha

 group 2

 lifetime 86400

telnet timeout 5

ssh stricthostkeycheck

ssh 192.168.0.0 255.255.0.0 inside

ssh timeout 5

ssh key-exchange group dh-group1-sha1

console timeout 0

management-access inside

vpn-addr-assign local reuse-delay 5

 

threat-detection basic-threat

threat-detection statistics host

threat-detection statistics port number-of-rate 3

threat-detection statistics protocol number-of-rate 3

threat-detection statistics access-list

threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200

ntp server 192.168.0.2 source inside prefer

ssl trust-point ASDM_TrustPoint0 inside

ssl trust-point ASDM_TrustPoint0 Outside

webvpn

 enable inside

 enable Outside

 anyconnect-essentials

 anyconnect image disk0:/anyconnect-win-3.1.06079-k9.pkg 1

 anyconnect image disk0:/anyconnect-linux-2.5.2014-k9.pkg 2

 anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 3

 anyconnect profiles AnyC-SSL-VPN_client_profile disk0:/AnyC-SSL-VPN_client_profile.xml

 anyconnect profiles For_Dad_client_profile disk0:/For_Dad_client_profile.xml

 anyconnect enable

 port-forward Dad www 192.168.60.2 www Dad Server

 tunnel-group-list enable

group-policy DfltGrpPolicy attributes

 dns-server value 192.168.51.1 8.8.8.8

 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless

 split-tunnel-policy tunnelspecified

 split-tunnel-network-list value VPN

 default-domain value spicers.local

 split-dns value 8.8.8.8

group-policy GroupPolicy_AnyC-SSL-VPN internal

group-policy GroupPolicy_AnyC-SSL-VPN attributes

 wins-server none

 dns-server value 8.8.8.8

 vpn-tunnel-protocol ikev2 ssl-client

 default-domain value spicers.local

 webvpn

  anyconnect profiles value AnyC-SSL-VPN_client_profile type user

group-policy "GroupPolicy_For Dad" internal

group-policy "GroupPolicy_For Dad" attributes

 wins-server none

 dns-server value 192.168.51.1 8.8.8.8

 vpn-tunnel-protocol ikev2 ssl-client

 default-domain value spicers.local

 webvpn

  anyconnect profiles value For_Dad_client_profile type user

username Dave password dwA7VEPntt16WJbj encrypted privilege 15

username Don password URTyeAiI65DG1E.m encrypted privilege 15

tunnel-group AnyC-SSL-VPN type remote-access

tunnel-group AnyC-SSL-VPN general-attributes

 address-pool (inside) AnyC-CPN-Client-Pool

 address-pool AnyC-CPN-Client-Pool

tunnel-group AnyC-SSL-VPN webvpn-attributes

 group-alias Spicer-VPN enable

tunnel-group "For Dad" type remote-access

tunnel-group "For Dad" general-attributes

 address-pool Dad's-Desktop

tunnel-group "For Dad" webvpn-attributes

 group-alias "For Dad" enable

!

class-map inspection_default

 match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

 parameters

  message-length maximum client auto

  message-length maximum 512

policy-map global_policy

 class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny

  inspect sunrpc

  inspect xdmcp

  inspect sip

  inspect netbios

  inspect tftp

  inspect ip-options

 class class-default

  user-statistics accounting

!

service-policy global_policy global

prompt hostname context

no call-home reporting anonymous

call-home

 profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

hpm topN enable

Cryptochecksum:*****

: end

1 Reply 1

JEFF SPRADLING
Level 1
Level 1

Your issue may be routing; try putting a static route to 192.168.60.0/24 pointing to the outside interface and see if that helps.  If not, I'd do a packet-tracer and see where if fails.

Review Cisco Networking for a $25 gift card