cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2530
Views
0
Helpful
3
Replies

VPN connects but cannot ping or access resources

pmattson00
Level 1
Level 1

I am hoping this is an easy fix and it is something I am missing.  I have been looking at this for several hours.

Scenario:

I have Anyconnect Essentials so I am using the SSL connection

I have changed my external IP and domain name in my configuration I am posting.

My VPN connection appears to be working fine.  I actually was able to connect in 3 different locations with 3 different external IP address.

From location 1 I receive an IP address of 192.168.30.10, like it should.  I can ping 192.168.1.1, but not 192.168.1.6 which is my temporary resource, the firewall is disabled on 192.168.1.6.

From location 2 I receive an IP address of 192.168.30.11, like it should.  I was able to ping 192.168.30.10, could not try 192.168.1.1 because the place closed.

Any help would be appreciated, it is starting to get late so I hope I gave enough detail.  I feel so close but yet so far.

ciscoasa# show run

: Saved

:

ASA Version 8.2(1)

!

hostname ciscoasa

names

!

interface Vlan1

nameif inside

security-level 100

ip address 192.168.1.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 22.22.22.246 255.255.255.252

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

ftp mode passive

clock timezone CST -6

clock summer-time CDT recurring

dns domain-lookup inside

dns domain-lookup outside

same-security-traffic permit inter-interface

same-security-traffic permit intra-interface

object-group icmp-type ALLOWPING

icmp-object echo

icmp-object time-exceeded

icmp-object echo-reply

icmp-object traceroute

icmp-object source-quench

icmp-object unreachable

access-list 10 extended permit ip any any

access-list 10 extended permit icmp any any

pager lines 24

logging asdm informational

mtu inside 1500

mtu outside 1500

ip local pool SSLClientPoolNew 192.168.30.10-192.168.30.25 mask 255.255.255.0

icmp unreachable rate-limit 1 burst-size 1

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 1 192.168.1.0 255.255.255.0

route outside 0.0.0.0 0.0.0.0 22.22.22.245 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

network-acl 10

webvpn

svc ask none default svc

aaa authentication telnet console LOCAL

http server enable

http 192.168.1.0 255.255.255.0 inside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

telnet 0.0.0.0 0.0.0.0 inside

telnet timeout 5

ssh timeout 5

console timeout 0

management-access inside

dhcpd dns 8.8.8.8

dhcpd auto_config outside

!

dhcpd address 192.168.1.5-192.168.1.36 inside

dhcpd enable inside

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

enable inside

enable outside

anyconnect-essentials

svc image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 1

svc image disk0:/anyconnect-win-2.5.2014-k9.pkg 2

svc enable

tunnel-group-list enable

group-policy SSLClientPolicy internal

group-policy SSLClientPolicy attributes

vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn

default-domain value mydomain.com

address-pools value SSLClientPoolNew

webvpn

svc keep-installer installed

svc rekey time 180

svc rekey method ssl

svc modules value vpngina

group-policy DfltGrpPolicy attributes

vpn-tunnel-protocol webvpn

username test password xxxxxxxxxxxxxx encrypted privilege 15

username ljb1 password xxxxxxxxxxxxxx encrypted

tunnel-group SSLClientProfile type remote-access

tunnel-group SSLClientProfile general-attributes

default-group-policy SSLClientPolicy

tunnel-group SSLClientProfile webvpn-attributes

group-alias SSLVPNClient enable

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map global_policy

class inspection_default

inspect icmp

!

service-policy global_policy global

prompt hostname context

Cryptochecksum:ed683c7f1b86066d1d8c4fff6b08c592

: end

1 Accepted Solution

Accepted Solutions

raga.fusionet
Level 4
Level 4

Patrick,

You are missing the NAT excemption. Please add the following and try again:

access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0

nat (inside) 0 access-list nonat

Let us know if you're still having problems after that.

Raga

View solution in original post

3 Replies 3

raga.fusionet
Level 4
Level 4

Patrick,

You are missing the NAT excemption. Please add the following and try again:

access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.30.0 255.255.255.0

nat (inside) 0 access-list nonat

Let us know if you're still having problems after that.

Raga

Raga,

Thanks that worked I guess I had been looking at it for so long I forgot about all of my access-list.

I knew I was missing something simple.

Regards,

Patrick

Hey Patrick,

Good to hear that it worked!

Have a good one.

Raga

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: