cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
6106
Views
25
Helpful
33
Replies

Hairpining VPN clients through a site-to-site tunnel

Ariel Davenport
Level 1
Level 1

I have an ASA 5510 8.2(5) in Site1 and a ASA 5505 8.2(1) Site2 they are setup with a site to site tunnel.

Each site has VPN clients that connect and I would like to allow clients from both sides access to servers on the other side of the site-to-site tunnel.

I enabled same-security-traffic permit intra-interface I also added the remote networks to access-list that is doing the split tunneling.

I think that I'm doing something wrong with nat but I'm not sure, any help would be greatly appreciated.

Site1 (172.17.2.0/24) Clients1 (10.0.254.0/24)

ASA Version 8.2(5)

!

hostname site1

names

dns-guard

!

interface Ethernet0/0

nameif outside

security-level 0

ip address site1 255.255.255.240

!

interface Ethernet0/1

nameif inside

security-level 100

ip address 172.17.2.1 255.255.255.0

!

interface Ethernet0/2

shutdown

nameif DMZ

security-level 0

ip address 10.10.10.1 255.255.255.0

!

interface Ethernet0/3

shutdown

no nameif

no security-level

no ip address

!

interface Management0/0

nameif management

security-level 0

ip address 192.168.1.1 255.255.255.0

management-only

!

ftp mode passive

same-security-traffic permit intra-interface

access-list VPN-UK extended permit ip 172.17.2.0 255.255.255.0 172.18.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.17.2.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.17.2.0 255.255.255.0 172.18.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.17.2.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list inside_nat0_outbound remark US Client to UK Server

access-list inside_nat0_outbound extended permit ip 10.0.254.0 255.255.255.0 172.18.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 192.168.123.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.18.2.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list Split_Tunnel_List standard permit 172.17.2.0 255.255.255.0

access-list Split_Tunnel_List standard permit 172.18.2.0 255.255.255.0

access-list Split_Tunnel_List standard permit 192.168.123.0 255.255.255.0

access-list Split_Tunnel_List remark UK VPN Client Pool

access-list Split_Tunnel_List standard permit 172.255.2.0 255.255.255.0

access-list outside-2-inside extended permit tcp any any eq smtp

access-list outside-2-inside extended permit tcp any any eq 82

access-list outside-2-inside extended permit tcp any any eq 81

access-list outside-2-inside extended permit tcp any any eq https

access-list outside-2-inside extended permit tcp any any eq imap4

access-list outside-2-inside extended permit tcp any any eq ldaps

access-list outside-2-inside extended permit tcp any any eq pop3

access-list outside-2-inside extended permit tcp any any eq www

access-list outside-2-inside extended permit tcp any any eq 5963

access-list outside-2-inside extended permit tcp any any eq ftp

access-list outside-2-inside extended permit tcp any any eq ftp-data

access-list outside-2-inside extended permit tcp any any eq 3389

access-list outside-2-inside extended deny tcp any any log

access-list outside-2-inside extended deny ip any any log

access-list outside-2-inside extended deny udp any any log

access-list VPN-CLIENTS extended permit ip 172.17.2.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list VPN-CLIENTS extended permit ip 172.18.2.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list VPN-CLIENTS extended permit ip 192.168.123.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 172.17.2.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 172.18.2.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 192.168.123.0 255.255.255.0

access-list VPNClient_splittunnel remark UK VPN Client Pool

access-list VPNClient_splittunnel standard permit 172.255.2.0 255.255.255.0

access-list VPN-Northwoods extended permit ip 172.17.2.0 255.255.255.0 192.168.123.0 255.255.255.0

access-list outside_nat0_outbound remark AD 5/1/13

access-list outside_nat0_outbound extended permit ip 10.0.254.0 255.255.255.0 172.18.2.0 255.255.255.0

pager lines 24

logging enable

logging buffered debugging

logging asdm informational

mtu outside 1500

mtu inside 1500

mtu DMZ 1500

mtu management 1500

ip local pool VPNUserPool 10.0.254.25-10.0.254.45 mask 255.255.255.0

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

nat-control

global (outside) 1 interface

nat (outside) 0 access-list outside_nat0_outbound

nat (inside) 0 access-list inside_nat0_outbound

nat (inside) 1 172.17.2.0 255.255.255.0

static (inside,outside) tcp interface smtp 172.17.2.200 smtp netmask 255.255.255.255

static (inside,outside) tcp interface 82 172.17.2.253 82 netmask 255.255.255.255

static (inside,outside) tcp interface 81 192.168.123.253 81 netmask 255.255.255.255

static (inside,outside) tcp interface https 172.17.2.10 https netmask 255.255.255.255

static (inside,outside) tcp interface imap4 172.17.2.10 imap4 netmask 255.255.255.255

static (inside,outside) tcp interface ldaps 172.17.2.10 ldaps netmask 255.255.255.255

static (inside,outside) tcp interface pop3 172.17.2.10 pop3 netmask 255.255.255.255

static (inside,outside) tcp interface www 172.17.2.19 www netmask 255.255.255.255

static (inside,outside) tcp interface 5963 172.17.2.108 5963 netmask 255.255.255.255

static (inside,outside) tcp interface ftp 172.17.2.7 ftp netmask 255.255.255.255

static (inside,outside) tcp interface ftp-data 172.17.2.7 ftp-data netmask 255.255.255.255

static (inside,outside) tcp interface 3389 172.17.2.29 3389 netmask 255.255.255.255

access-group outside-2-inside in interface outside

route outside 0.0.0.0 0.0.0.0 74.213.51.129 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

aaa-server DCSI_Auth protocol radius

aaa-server DCSI_Auth (inside) host 172.17.2.29

key *****

aaa-server AD protocol nt

aaa-server AD (inside) host 172.16.1.211

aaa-server AD (inside) host 172.17.2.29

aaa authentication ssh console LOCAL

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set trans_set esp-des esp-sha-hmac

crypto ipsec transform-set VPN-Client esp-3des esp-sha-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map DYN_MAP 20 set reverse-route

crypto dynamic-map outside_dyn_map 20 set transform-set VPN-Client

crypto map outside_map 20 match address VPN-UK

crypto map outside_map 20 set peer site2

crypto map outside_map 20 set transform-set trans_set

crypto map outside_map 30 match address VPN-Northwoods

crypto map outside_map 30 set peer othersite

crypto map outside_map 30 set transform-set trans_set

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

crypto ca trustpoint _SmartCallHome_ServerCA

crl configure

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption des

hash sha

group 2

lifetime 28800

crypto isakmp policy 20

authentication pre-share

encryption des

hash md5

group 2

lifetime 28800

telnet timeout 5

ssh timeout 60

console timeout 0

dhcpd address 192.168.1.2-192.168.1.254 management

dhcpd enable management

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

group-policy VPNClients internal

group-policy VPNClients attributes

dns-server value 10.0.1.30

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value VPNClient_splittunnel

default-domain value domain.local

user-authentication enable

tunnel-group VPNclient type remote-access

tunnel-group VPNclient general-attributes

address-pool VPNUserPool

authentication-server-group DCSI_Auth

default-group-policy VPNClients

tunnel-group VPNclient ipsec-attributes

pre-shared-key *****

tunnel-group othersite type ipsec-l2l

tunnel-group othersite ipsec-attributes

pre-shared-key *****

tunnel-group site2 type ipsec-l2l

tunnel-group site2 ipsec-attributes

pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic

class-map imblock

match any

class-map p2p

match port tcp eq www

class-map P2P

match port tcp eq www

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum client auto

  message-length maximum 512

policy-map type inspect im impolicy

parameters

match protocol msn-im yahoo-im

  drop-connection

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect rsh

  inspect rtsp

  inspect esmtp

  inspect sqlnet

  inspect skinny 

  inspect sunrpc

  inspect xdmcp

  inspect sip 

  inspect netbios

  inspect tftp

  inspect ip-options

  inspect pptp

policy-map type inspect http P2P_HTTP

parameters

match request uri regex _default_gator

  drop-connection log

match request uri regex _default_x-kazaa-network

  drop-connection log

policy-map IM_P2P

class imblock

  inspect im impolicy

class P2P

  inspect http P2P_HTTP

!

service-policy global_policy global

service-policy IM_P2P interface inside

prompt hostname context

no call-home reporting anonymous

Cryptochecksum:7717a11f5f2dce11af0f35cee7b4c893

: end

Site2 (172.18.2.0/24) Clients1 (172.255.2.0/24)

ASA Version 8.2(1)

!

names

name 172.18.2.2 UKserver

!

interface Vlan1

nameif inside

security-level 100

ip address 172.18.2.1 255.255.255.0

!

interface Vlan2

nameif GuestWiFi

security-level 0

ip address 192.168.2.1 255.255.255.0

!

interface Vlan3

nameif outside

security-level 0

ip address site2 255.255.255.252

!

interface Ethernet0/0

switchport access vlan 3

!

interface Ethernet0/1

!

interface Ethernet0/2

switchport trunk allowed vlan 1-2

switchport trunk native vlan 2

switchport mode trunk

speed 100

duplex full

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

ftp mode passive

same-security-traffic permit intra-interface

access-list USER_VPN extended permit ip 172.18.2.0 255.255.255.0 172.255.2.0 255.255.255.0

access-list USER_VPN extended permit ip 172.17.2.0 255.255.255.0 172.255.2.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 172.18.2.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 172.17.2.0 255.255.255.0

access-list VPNClient_splittunnel standard permit 172.255.2.0 255.255.255.0

access-list Outside_2_Inside extended permit tcp any host otherhost eq smtp

access-list Outside_2_Inside extended permit tcp any host otherhost eq pop3

access-list Outside_2_Inside extended permit tcp any host otherhost eq imap4

access-list Outside_2_Inside extended permit tcp any host otherhost eq www

access-list Outside_2_Inside extended permit tcp any host otherhost eq https

access-list Outside_2_Inside extended permit tcp any host otherhost eq ldap

access-list Outside_2_Inside extended permit tcp any host otherhost eq ldaps

access-list Outside_2_Inside extended permit tcp any host otherhost eq nntp

access-list Outside_2_Inside extended permit tcp any host otherhost eq 135

access-list Outside_2_Inside extended permit tcp any host otherhost eq 102

access-list Outside_2_Inside extended permit tcp any host otherhost eq 390

access-list Outside_2_Inside extended permit tcp any host otherhost eq 3268

access-list Outside_2_Inside extended permit tcp any host otherhost eq 3269

access-list Outside_2_Inside extended permit tcp any host otherhost eq 993

access-list Outside_2_Inside extended permit tcp any host otherhost eq 995

access-list Outside_2_Inside extended permit tcp any host otherhost eq 563

access-list Outside_2_Inside extended permit tcp any host otherhost eq 465

access-list Outside_2_Inside extended permit tcp any host otherhost eq 691

access-list Outside_2_Inside extended permit tcp any host otherhost eq 6667

access-list Outside_2_Inside extended permit tcp any host otherhost eq 994

access-list Outside_2_Inside extended permit icmp any any echo

access-list Outside_2_Inside extended permit icmp any any echo-reply

access-list Outside_2_Inside extended permit tcp any host site2 eq smtp

access-list Outside_2_Inside extended permit tcp any host site2 eq pop3

access-list Outside_2_Inside extended permit tcp any host site2 eq imap4

access-list Outside_2_Inside extended permit tcp any host site2 eq www

access-list Outside_2_Inside extended permit tcp any host site2 eq https

access-list Outside_2_Inside extended permit tcp any host site2 eq ldap

access-list Outside_2_Inside extended permit tcp any host site2 eq ldaps

access-list Outside_2_Inside extended permit tcp any host site2 eq nntp

access-list Outside_2_Inside extended permit tcp any host site2 eq 135

access-list Outside_2_Inside extended permit tcp any host site2 eq 102

access-list Outside_2_Inside extended permit tcp any host site2 eq 390

access-list Outside_2_Inside extended permit tcp any host site2 eq 3268

access-list Outside_2_Inside extended permit tcp any host site2 eq 3269

access-list Outside_2_Inside extended permit tcp any host site2 eq 993

access-list Outside_2_Inside extended permit tcp any host site2 eq 995

access-list Outside_2_Inside extended permit tcp any host site2 eq 563

access-list Outside_2_Inside extended permit tcp any host site2 eq 465

access-list Outside_2_Inside extended permit tcp any host site2 eq 691

access-list Outside_2_Inside extended permit tcp any host site2 eq 6667

access-list Outside_2_Inside extended permit tcp any host site2 eq 994

access-list Outside_2_Inside extended permit tcp any host site2 eq sip

access-list Outside_2_Inside extended permit tcp any host site2 range 8000 8005

access-list Outside_2_Inside extended permit udp any host site2 range 8000 8005

access-list Outside_2_Inside extended permit udp any host site2 eq sip

access-list Outside_2_Inside extended deny tcp any any log

access-list Outside_2_Inside extended deny udp any any log

access-list VPN-USA extended permit ip 172.255.2.0 255.255.255.0 172.17.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.18.2.0 255.255.255.0 172.17.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.18.2.0 255.255.255.0 172.255.2.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.255.2.0 255.255.255.0 172.17.2.0 255.255.255.0

access-list Split_Tunnel_List remark Networks to allow over VPN

access-list Split_Tunnel_List standard permit 172.18.2.0 255.255.255.0

access-list Split_Tunnel_List standard permit 172.17.2.0 255.255.255.0

access-list Split_Tunnel_List standard permit 172.255.2.0 255.255.255.0

access-list Split_Tunnel_List standard permit 10.0.254.0 255.255.255.0

pager lines 20

logging enable

logging monitor debugging

logging buffered debugging

logging asdm informational

logging debug-trace

mtu inside 1500

mtu GuestWiFi 1500

mtu outside 1500

ip local pool ClientVPN 172.255.2.100-172.255.2.124

no failover

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-621.bin

no asdm history enable

arp timeout 14400

nat-control

global (outside) 1 interface

nat (inside) 0 access-list inside_nat0_outbound

nat (inside) 1 172.18.2.0 255.255.255.0

nat (GuestWiFi) 2 192.168.2.0 255.255.255.0

static (inside,outside) tcp interface smtp UKserver smtp netmask 255.255.255.255

static (inside,outside) tcp interface pop3 UKserver pop3 netmask 255.255.255.255

static (inside,outside) tcp interface imap4 UKserver imap4 netmask 255.255.255.255

static (inside,outside) tcp interface www UKserver www netmask 255.255.255.255

static (inside,outside) tcp interface https UKserver https netmask 255.255.255.255

static (inside,outside) tcp interface ldap UKserver ldap netmask 255.255.255.255

static (inside,outside) tcp interface ldaps UKserver ldaps netmask 255.255.255.255

static (inside,outside) tcp interface nntp UKserver nntp netmask 255.255.255.255

static (inside,outside) tcp interface 135 UKserver 135 netmask 255.255.255.255

static (inside,outside) tcp interface 102 UKserver 102 netmask 255.255.255.255

static (inside,outside) tcp interface 390 UKserver 390 netmask 255.255.255.255

static (inside,outside) tcp interface 3268 UKserver 3268 netmask 255.255.255.255

static (inside,outside) tcp interface 3269 UKserver 3269 netmask 255.255.255.255

static (inside,outside) tcp interface 993 UKserver 993 netmask 255.255.255.255

static (inside,outside) tcp interface 995 UKserver 995 netmask 255.255.255.255

static (inside,outside) tcp interface 563 UKserver 563 netmask 255.255.255.255

static (inside,outside) tcp interface 465 UKserver 465 netmask 255.255.255.255

static (inside,outside) tcp interface 691 UKserver 691 netmask 255.255.255.255

static (inside,outside) tcp interface 6667 UKserver 6667 netmask 255.255.255.255

static (inside,outside) tcp interface 994 UKserver 994 netmask 255.255.255.255

access-group Outside_2_Inside in interface outside

route outside 0.0.0.0 0.0.0.0 87.224.93.53 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

aaa-server vpn protocol radius

aaa-server vpn (inside) host UKserver

key DCSI_vpn_Key07

aaa authentication ssh console LOCAL

http server enable

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set trans_set esp-des esp-sha-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map outside_dyn_map 20 set transform-set trans_set

crypto dynamic-map DYN_MAP 20 set reverse-route

crypto map outside_map 20 match address VPN-USA

crypto map outside_map 20 set peer othersite2 site1

crypto map outside_map 20 set transform-set trans_set

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

crypto isakmp identity address

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption des

hash sha

group 2

lifetime 28800

crypto isakmp policy 20

authentication pre-share

encryption des

hash md5

group 2

lifetime 28800

telnet timeout 5

ssh timeout 25

console timeout 0

dhcpd dns UKserver 8.8.8.8

!

dhcpd address 172.18.2.100-172.18.2.149 inside

dhcpd enable inside

!

dhcpd address 192.168.2.50-192.168.2.74 GuestWiFi

dhcpd enable GuestWiFi

!

no threat-detection basic-threat

no threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

group-policy USER_VPN internal

group-policy USER_VPN attributes

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value Split_Tunnel_List

user-authentication enable

tunnel-group othersite2 type ipsec-l2l

tunnel-group othersite2 ipsec-attributes

pre-shared-key *

tunnel-group USER_VPN type remote-access

tunnel-group USER_VPN general-attributes

address-pool ClientVPN

authentication-server-group (outside) vpn

default-group-policy USER_VPN

tunnel-group USER_VPN ipsec-attributes

pre-shared-key *

tunnel-group site1 type ipsec-l2l

tunnel-group site1 ipsec-attributes

pre-shared-key *

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect rsh

  inspect rtsp

  inspect sqlnet

  inspect skinny

  inspect sunrpc

  inspect xdmcp

  inspect tftp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:d000c75c8864547dfabaf3652d81be71

: end





33 Replies 33

Hi,

To be honest I cant see a problem in the configurations that should prevent the connections between the networks mentioned in the 2 cases above

172.17.2.x to 172.18.2.x Fails

172.255.2.x to 172.17.2.x Fails

There seems to be NAT0 configurations and also the L2L VPN ACLs are fine. We have also added the "inspect icmp" to the configurations so that should be fine.

I guess you could try on the Site 1 ASA this "packet-tracer" command and copy the output here. Please issue the command twice and copy the second commands output here.

packet-tracer input inside icmp 172.17.2.100 8 0 172.18.2.100

- Jouni

Phase: 1

Type: ROUTE-LOOKUP

Subtype: input

Result: ALLOW

Config:

Additional Information:

in   0.0.0.0         0.0.0.0         outside

Phase: 2

Type: IP-OPTIONS

Subtype:

Result: ALLOW

Config:

Additional Information:

Phase: 3

Type: INSPECT

Subtype: np-inspect

Result: ALLOW

Config:

class-map inspection_default

match default-inspection-traffic

policy-map global_policy

class inspection_default

  inspect icmp

service-policy global_policy global

Additional Information:

Phase: 4

Type: INSPECT

Subtype: inspect-im

Result: ALLOW

Config:

Additional Information:

Phase: 5

Type: INSPECT

Subtype: np-inspect

Result: ALLOW

Config:

Additional Information:

Phase: 6

Type: NAT-EXEMPT

Subtype:

Result: ALLOW

Config:

nat-control

  match ip inside 172.17.2.0 255.255.255.0 outside 172.18.2.0 255.255.255.0

    NAT exempt

    translate_hits = 171557, untranslate_hits = 19784

Additional Information:

Phase: 7

Type: NAT

Subtype:

Result: ALLOW

Config:

nat (inside) 1 172.17.2.0 255.255.255.0

nat-control

  match ip inside 172.17.2.0 255.255.255.0 outside any

    dynamic translation to pool 1 (site1 [Interface PAT])

    translate_hits = 7786557, untranslate_hits = 534025

Additional Information:

Phase: 8

Type: NAT

Subtype: host-limits

Result: ALLOW

Config:

nat (inside) 1 172.17.2.0 255.255.255.0

nat-control

  match ip inside 172.17.2.0 255.255.255.0 outside any

    dynamic translation to pool 1 (74.213.51.130 [Interface PAT])

    translate_hits = 7786586, untranslate_hits = 534043

Additional Information:

Phase: 9

Type: VPN

Subtype: encrypt

Result: ALLOW

Config:

Additional Information:

Phase: 10

Type: VPN

Subtype: ipsec-tunnel-flow

Result: ALLOW

Config:

Additional Information:

Phase: 11

Type: IP-OPTIONS

Subtype:

Result: ALLOW

Config:

Additional Information:

Phase: 12

Type: FLOW-CREATION

Subtype:

Result: ALLOW

Config:

Additional Information:

New flow created with id 10804128, packet dispatched to next module

Result:

input-interface: inside

input-status: up

input-line-status: up

output-interface: outside

output-status: up

output-line-status: up

Action: allow

Hi,

The ouput seems to state that the traffic is indeed forwarded to the L2L VPN connection

Can you PING from the 172.18.2.0/24 network hosts to the 172.17.2.0/24 network hosts?

Have you tried multiple different target hosts on the networks you are trying to ping so that we possibly rule out that the actual devices just arent answering to these PINGs?

- Jouni

I fixed it, ran this on the UK site

no access-list inside_nat0_outbound extended permit ip 172.18.2.0 255.255.255.0 10.0.254.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip 172.17.2.0 255.255.255.0 10.0.254.0 255.255.255.0

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: