cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
811
Views
0
Helpful
4
Replies

Anyconnect connection: VPN connection is fine. Reaching a specific network is not accessible.

Supercell292929
Level 1
Level 1

Hello,

    I'm curious as to why I can reach our 10.0.0.0/8 network from the AnyConnect VPN pool 192.168.200.100-.200, but not our 172.16.250.0/24 network. The setup is identical on our 5555-X. Do I need a "route-lookup" statement on the (NO DICE) nat? (seen below) 172.16.250.0/24 is statically routed on our ASA.:

object network obj-192.168.200.0
subnet 192.168.200.0 255.255.255.0

####

ip local pool VPN-remote 192.168.200.100-192.168.200.200 mask 255.255.255.0

####

access-list VPNIT_splitTunnelAcl standard permit 172.16.250.0 255.255.255.0 

nat (inside,any) source static obj-172.16.250.0 obj-172.16.250.0 destination static obj-192.168.200.0 obj-192.168.200.0 no-proxy-arp

####

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.200.0 255.255.255.0
access-list dmz_nat0_outbound extended permit ip any4 192.168.200.0 255.255.255.0
access-list cin extended permit ip host 192.168.200.100 host 10.100.10.10 (WORKS FINE)
access-list cin extended permit ip host 10.100.10.10 host 192.168.200.100 (WORKS FINE)
access-list cin extended permit ip host 192.168.200.100 host 172.16.250.5 (DOESN'T WORK)
access-list cin extended permit ip host 172.16.250.5 host 192.168.200.100 (DOESN'T WORK)
nat (any,outside) source static any any destination static obj-192.168.200.0 obj-192.168.200.0
nat (inside,any) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-192.168.200.0 obj-192.168.200.0 no-proxy-arp (WORKS FINE)

nat (inside,any) source static obj-172.16.250.0 obj-172.16.250.0 destination static obj-192.168.200.0 obj-192.168.200.0 no-proxy-arp (NO DICE)

####

C    172.16.250.0 255.255.255.0 is directly connected, management

S    172.16.0.0 255.255.0.0 [1/0] via 10.100.10.1, inside

#####

route inside 10.0.0.0 255.0.0.0 10.100.10.1 1 

route inside 172.16.0.0 255.255.0.0 10.100.10.1 1

route management 10.100.0.0 255.255.0.0 172.16.250.1 1

#####

Anyconnect client is showing 172.16.250.0/24 within its secured routes (see attached).

Thank you in advance.

4 Replies 4

Hello,

try to configure your split tunnel ACL like this:

access-list VPNIT_splitTunnelAcl standard permit any4

What does your group policy look like ? Can you post the full config ?

I removed the 3 ACL's seen below and replaced them with what you recommended: "access-list VPNIT_splitTunnelAcl standard permit any4." No sooner did I do this then my home connection to the internet dropped (the AnyConnect tunnel stayed up. I just couldn't get out to the internet from my PC [DNS servers were no where to be found]). I could not get to 172.16.250.0/24, but could still get to the only switch I could always get to: 10.20.6.1/24 via AnyConnect.

VPN-REMOTE (THE ONE I USE):

ip local pool VPN-remote 192.168.200.100-192.168.200.200 mask 255.255.255.0

#####

tunnel-group VPNIT type remote-access
tunnel-group VPNIT general-attributes
address-pool VPN-remote
authentication-server-group AAAServers
default-group-policy VPNIT
tunnel-group VPNIT

webvpn-attributes

group-alias VPNIT enable

tunnel-group VPNIT ipsec-attributes
ikev1 pre-shared-key *****

######

access-list VPNIT_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0

access-list VPNIT_splitTunnelAcl standard permit 172.16.0.0 255.255.0.0


access-list VPNIT_splitTunnelAcl standard permit 172.16.250.0 255.255.255.0

ADDING THESE THREE ACL'S (ABOVE) BACK AFTER REPLACING THEM WITH THE ACL YOU SUGGESTED BROUGHT MY HOME INTERNET BACK UP IMMEDIATELY.

######

group-policy VPNIT internal
group-policy VPNIT attributes
banner value WARNING! You are attempting to login to the XXXXXX. If you are not authorized, disconnect now! Violators will be prosecuted.
dns-server value 10.20.6.10 10.20.6.60
vpn-tunnel-protocol ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPNIT_splitTunnelAcl
default-domain value local.XXXXXXXX.org

ssh to a switch on our 172.16.250.0/24 = cannot connect and NO hit count (below). This is also what occurred when replacing these ACL's with the one you recommended (ASA(config)# no access-list VPNIT_splitTunnelAcl standard permit any4)

#####

ASA# sho access-list VPNIT_splitTunnelAcl
access-list VPNIT_splitTunnelAcl; 3 elements; name hash: 0x79907cff
access-list VPNIT_splitTunnelAcl line 1 standard permit 10.0.0.0 255.0.0.0 (hitcnt=0) 0x599a0572
access-list VPNIT_splitTunnelAcl line 2 standard permit 172.16.0.0 255.255.0.0 (hitcnt=0) 0x420bf8d2
access-list VPNIT_splitTunnelAcl line 3 standard permit 172.16.250.0 255.255.255.0 (hitcnt=0) 0x5c5248e8

#####

ASA# sho access-list VPNIT_splitTunnelAcl
access-list VPNIT_splitTunnelAcl; 1 elements; name hash: 0x79907cff
access-list VPNIT_splitTunnelAcl line 1 standard permit any4 (hitcnt=0) 0x7cd6f726

#####

ATTACHMENT: Shows what occurs on the AnyConnect client when I added the ACL you provided.

Hello,

sorry for the misunderstanding, I thought your split tunnel access list contained just the one line you originally posted.

Either way, make sure you have the below configured:

access-list VPNIT_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
access-list VPNIT_splitTunnelAcl standard permit 172.16.0.0 255.255.0.0

object network NETWORK_OBJ_192.168.200.0_24
subnet 192.168.200.0 255.255.255.0
object network NETWORK_OBJ_10.0.0.0_8
subnet 10.0.0.0 255.0.0.0
object network NETWORK_OBJ_172.16.0.0_16
subnet 172.16.0.0 255.255.0.0
ip local pool VPN-remote 192.168.200.100-192.168.200.200 mask 255.255.255.0

nat (inside, outside) source static NETWORK_OBJ_10.0.0.0_8 NETWORK_OBJ_10.0.0.0_8
destination static NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 no-proxy-arp
route-lookup
nat (inside, outside) source static NETWORK_OBJ_172.16.0.0_16 NETWORK_OBJ_172.16.0.0_16
destination static NETWORK_OBJ_192.168.200.0_24 NETWORK_OBJ_192.168.200.0_24 no-proxy-arp
route-lookup

Thank you for your suggestions, however, it still does not work. Here is the entire layout of the AnyConnect VPN:

object network obj-192.168.200.0
subnet 192.168.200.0 255.255.255.0

object network obj-10.0.0.0
subnet 10.0.0.0 255.0.0.0

object network obj-172.16.0.0
subnet 172.16.0.0 255.255.0.0

#########################

access-list VPNIT_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
access-list VPNIT_splitTunnelAcl standard permit 172.16.0.0 255.255.0.0

#########################

nat (inside,outside) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-192.168.200.0 obj-192.168.200.0 no-proxy-arp route-lookup
nat (inside,outside) source static obj-172.16.0.0 obj-172.16.0.0 destination static obj-192.168.200.0 obj-192.168.200.0 no-proxy-arp route-lookup

#########################

group-policy VPNIT internal
group-policy VPNIT attributes
banner value WARNING! You are attempting to login to XXXXX. If you are not authorized, disconnect now! Violators will be prosecuted.
dns-server value 10.20.6.10 10.20.6.60
vpn-tunnel-protocol ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPNIT_splitTunnelAcl
default-domain value xxxx.xxxxxx.com

########################

tunnel-group VPNIT type remote-access
tunnel-group VPNIT general-attributes
address-pool VPN-remote
authentication-server-group AAAServers
default-group-policy VPNIT
tunnel-group VPNIT webvpn-attributes
group-alias VPNIT enable
tunnel-group VPNIT ipsec-attributes
ikev1 pre-shared-key *****

########################

route inside 10.0.0.0 255.0.0.0 10.100.10.1 1

route inside 172.16.0.0 255.255.0.0 10.100.10.1 1

I have a feeling it has something to do with this:

ON ASA ITSELF:

C    172.16.250.0 255.255.255.0 is directly connected, management

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: