08-04-2011 02:33 PM - edited 02-21-2020 05:29 PM
I'm trying to connect two ASA 5505s for a IPSec L2L VPN. They can connect, but not pass traffic from the AnyConnect subnet. I've added the config from ASA-2, with the LAN subnet of 192.168.138.0 and a subnet of 192.168.238.0 for AnyConnect client. I'm trying to get the AnyConnect Clients access to the 192.168.137.0 LAN behind ASA-1 at 1.1.1.1. Having both 192.168.238.0 and 192.168.138.0 both access 192.168.137.0 is acceptable. There's probably a lot of cruft in this config, as I've been reading all over forums and docs without much success. Can someone point me in the right direction? : ASA Version 8.2(1) ! hostname asa-wal names name 192.168.238.0 anyconnect-vpn ! interface Vlan1 nameif inside security-level 100 ip address 192.168.138.1 255.255.255.0 ! interface Vlan11 mac-address c03f.0e3b.1923 nameif outside security-level 0 ip address 2.2.2.2 255.255.255.248 ! same-security-traffic permit inter-interface same-security-traffic permit intra-interface object-group protocol TCPUDP protocol-object udp protocol-object tcp object-group service Munin tcp-udp port-object eq 4949 object-group service Webmin tcp port-object eq 10000 access-list inside_nat0_outbound extended permit ip 192.168.138.0 255.255.255.0 any access-list icmp_ping extended permit icmp any any echo-reply access-list icmp_ping extended permit ip 192.168.138.0 255.255.255.0 any access-list split-tunnel standard permit 192.168.138.0 255.255.255.0 access-list 100 extended permit icmp any any echo-reply access-list 100 extended permit icmp any any time-exceeded access-list 100 extended permit icmp any any unreachable access-list NO_NAT extended permit ip anyconnect-vpn 255.255.255.0 any access-list NONAT extended permit ip 192.168.138.0 255.255.255.0 anyconnect-vpn 255.255.255.0 access-list outside_access_in extended permit tcp any interface outside eq ssh access-list outside_access_in extended permit icmp any any echo-reply access-list outside_access_in extended permit icmp any any time-exceeded access-list outside_access_in extended permit icmp any any unreachable access-list outside_access_in extended permit tcp 192.168.137.0 255.255.255.0 anyconnect-vpn 255.255.255.0 access-list outside_1_cryptomap extended permit ip anyconnect-vpn 255.255.255.0 192.168.137.0 255.255.255.0 access-list inside_nat0_outbound_1 extended permit ip 192.168.138.0 255.255.255.0 anyconnect-vpn 255.255.255.0 access-list inside_nat0_outbound_1 extended permit ip anyconnect-vpn 255.255.255.0 192.168.137.0 255.255.255.0 access-list LAN_Traffic extended permit ip anyconnect-vpn 255.255.255.0 192.168.137.0 255.255.255.0 access-list vpn_nonat extended permit ip anyconnect-vpn 255.255.255.0 192.168.137.0 255.255.255.0 ip local pool AnyConnect 192.168.238.101-192.168.238.125 mask 255.255.255.0 global (outside) 1 interface nat (inside) 0 access-list NONAT nat (inside) 2 access-list vpn_nonat nat (inside) 1 0.0.0.0 0.0.0.0 static (inside,outside) tcp interface ssh 192.168.138.4 ssh netmask 255.255.255.255 access-group icmp_ping in interface inside access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 2.2.2.1 1 dynamic-access-policy-record DfltAccessPolicy network-acl inside_nat0_outbound network-acl NO_NAT aaa authentication ssh console LOCAL http server enable http bobx-vpn 255.255.255.0 inside http 192.168.137.0 255.255.255.0 inside http 192.168.1.104 255.255.255.255 inside http 192.168.138.0 255.255.255.0 inside http anyconnect-vpn 255.255.255.0 inside http redirect outside 80 no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec transform-set Wal2Box esp-aes-256 esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto map outside_map 1 match address outside_1_cryptomap crypto map outside_map 1 set pfs group1 crypto map outside_map 1 set peer 98.110.179.36 crypto map outside_map 1 set transform-set ESP-3DES-SHA crypto map Wal2Box 1 match address LAN_Traffic crypto map Wal2Box 1 set peer 98.110.179.36 crypto map Wal2Box 1 set transform-set Wal2Box crypto map Wal2Box interface outside crypto isakmp enable outside crypto isakmp policy 1 authentication pre-share encryption aes-256 hash sha group 2 lifetime 86400 crypto isakmp policy 5 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp policy 10 authentication pre-share encryption des hash sha group 2 lifetime 86400 crypto isakmp nat-traversal 22 telnet timeout 5 ssh 192.168.138.0 255.255.255.0 inside ssh timeout 30 console timeout 0 management-access inside dhcpd dns 8.8.8.8 8.8.4.4 dhcpd auto_config outside ! dhcpd address 192.168.138.101-192.168.138.132 inside dhcpd dns 8.8.8.8 8.8.4.4 interface inside dhcpd lease 86400 interface inside dhcpd domain inc.internal interface inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp server 129.6.15.29 ntp server 129.6.15.28 prefer webvpn enable inside enable outside anyconnect-essentials svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1 svc enable tunnel-group-list enable group-policy DfltGrpPolicy attributes vpn-filter value NO_NAT vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn split-tunnel-network-list value split-tunnel webvpn svc compression deflate group-policy Wal-AnyConnect internal group-policy Wal-AnyConnect attributes split-tunnel-policy tunnelspecified split-tunnel-network-list value split-tunnel tunnel-group DefaultRAGroup general-attributes address-pool AnyConnect default-group-policy Wal-AnyConnect strip-realm strip-group tunnel-group AnyConnectClientProfile type remote-access tunnel-group AnyConnectClientProfile general-attributes address-pool AnyConnect default-group-policy Wal-AnyConnect tunnel-group AnyConnectClientProfile webvpn-attributes group-alias AnyConnectVPNClient enable tunnel-group 1.1.1.1 type ipsec-l2l tunnel-group 1.1.1.1 ipsec-attributes pre-shared-key * ! class-map global-class match default-inspection-traffic ! ! policy-map global-policy class global-class inspect pptp ! Cryptochecksum:762f0186ad987cda4b450f6b4929cb60 : end
Message was edited by: Shawn Barrick - line breaks
Solved! Go to Solution.
08-05-2011 12:37 PM
It looks good Shawn but I just noticed a mistake on the asa-wal, you have a vpn-filter applied on the DfltGrpPolicy and since you don't have any value defined on the Wal-AnyConnect group-policy then is gonna inherit the vpn-filter from the DfltGrpPolicy, remember that vpn-filters must be applied on inbound direction, I mean from the pool to the resources you want them to have access to. This is the ACL you have for the filter:
access-list NO_NAT extended permit ip anyconnect-vpn 255.255.255.0 any
That is not in the inbound direction, besides looks like you want to allow access to anything as long as the traffic is comming from the 192.168.238.0, if that is the case you can do this:
group-policy DfltGrpPolicy attributes
vpn-filter none
Remember to disconnect and reconnect after the above change...
If you actually need to be more specific allowing traffic for the clients then apply the rules on inbound for example:
Your pool in this case is 192.168.238.0 /24 and the local subnet is 192.168.138, for this purpose the 192.168.137 will be considered local too because from the Anyconnect perspective it will be seen as local even though it's a remote network reachable via a L2L tunnel the Anyconnect client does not know it.
The following ACE will allow the Anyconnect client to telnet to the local networks:
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 192.168.138.0 255.255.255.0 eq 23
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 192.168.137.0 255.255.255.0 eq 23
The following ACE will allow the local networks to telnet to the Anyconnect Client:
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 eq 23 192.168.138.0 255.255.255.0
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 eq 23 192.168.137.0 255.255.255.0
Notice that the first two ACEs will allow the local network to initiate aconnection to the Anyconnect client on any TCP port if it uses a source port of 23 while the last two ACEs will allow the Anyconnect client to initiate a connection to the local networks on any TCP port if it uses a source port of 23.
Regards,
08-04-2011 05:04 PM
Hello Shawn,
Add these lines to this ASA:
no nat (inside) 2 access-list vpn_nonat
no access-list vpn_nonat extended permit ip anyconnect-vpn 255.255.255.0 192.168.137.0 255.255.255.0
access-list NONAT extended permit ip 192.168.138.0 255.255.255.0 192.168.137.0 255.255.255.0
access-list LAN_Traffic extended permit ip 192.168.138.0 255.255.255.0 192.168.137.0 255.255.255.0
access-list split-tunnel standard permit 192.168.137.0 255.255.255.0
same-security-traffic permit intra-interface
If still doesn't work attach both current configuration and I will take a look at them...
Regards,
08-05-2011 09:34 AM
08-05-2011 10:27 AM
Hi Shawn,
It looks good, did you disconnect and reconnect the client?
On the remote end you are missing this line:
access-list NONAT extended permit ip 192.168.137.0 255.255.255.0 waltham-lan 255.255.255.0
Please get the sh-vpnsessiondb det svc on the asa-wal and also get the "sh cry ipsec sa" on both sites.
If possible on the "boxborough-vpn" ASA get the output of the following command:
packet-tracer input inside icmp 192.168.137.5 8 0 192.168.238.5 det
Regards,
08-05-2011 10:57 AM
08-05-2011 12:37 PM
It looks good Shawn but I just noticed a mistake on the asa-wal, you have a vpn-filter applied on the DfltGrpPolicy and since you don't have any value defined on the Wal-AnyConnect group-policy then is gonna inherit the vpn-filter from the DfltGrpPolicy, remember that vpn-filters must be applied on inbound direction, I mean from the pool to the resources you want them to have access to. This is the ACL you have for the filter:
access-list NO_NAT extended permit ip anyconnect-vpn 255.255.255.0 any
That is not in the inbound direction, besides looks like you want to allow access to anything as long as the traffic is comming from the 192.168.238.0, if that is the case you can do this:
group-policy DfltGrpPolicy attributes
vpn-filter none
Remember to disconnect and reconnect after the above change...
If you actually need to be more specific allowing traffic for the clients then apply the rules on inbound for example:
Your pool in this case is 192.168.238.0 /24 and the local subnet is 192.168.138, for this purpose the 192.168.137 will be considered local too because from the Anyconnect perspective it will be seen as local even though it's a remote network reachable via a L2L tunnel the Anyconnect client does not know it.
The following ACE will allow the Anyconnect client to telnet to the local networks:
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 192.168.138.0 255.255.255.0 eq 23
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 192.168.137.0 255.255.255.0 eq 23
The following ACE will allow the local networks to telnet to the Anyconnect Client:
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 eq 23 192.168.138.0 255.255.255.0
access-list vpnfilt-ra permit 192.168.238.0 255.255.255.255 eq 23 192.168.137.0 255.255.255.0
Notice that the first two ACEs will allow the local network to initiate aconnection to the Anyconnect client on any TCP port if it uses a source port of 23 while the last two ACEs will allow the Anyconnect client to initiate a connection to the local networks on any TCP port if it uses a source port of 23.
Regards,
08-05-2011 01:54 PM
Gustavo,
The group policy change did it. Thanks so much for your assistance.
08-05-2011 03:00 PM
Great news! Glad I could help :-)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide