cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1228
Views
25
Helpful
18
Replies

AnyConnect client to AnyConnect client conversations

nmfoxton
Level 1
Level 1

Scenario;

ASA5555x v 9.14.1 and ASA v 9.18.2

AnyConnect clients connect and ASA obtains client ip addresses from dhcp via inside interface on 10.173.96.0/19 network.

Clients are unable to establish connections between each other even though "same-security-traffic permit intra-interface" is enabled which used to function on older ASA5550 devices.... yeas ago.

I've been reading up other conversations and not quite reached a conclusion how to fix this, advice would be appreciated.

18 Replies 18

Realized that it's nat (Outside,Outside) configured, so it doesn't apply to inside->outside traffic and hence this statement is not correct: "BTW, with the below config AnyConnect users should not be able to ping inside router, because the router will also ARP for the AnyConnect client IP and ASA won't respond ("no-proxy-arp")".  Everything else should be right.

nmfoxton
Level 1
Level 1

Little bit of progress today after breaking things a bit.

I took out all of the configs and started afresh, testing as i went along.

My original statement that i gould ping the router gateway was incorrect.... i couldn't. However i could and can ping from the router gateway address to any client address ... the arp cache shows them all present. So this proves the issue isn't router or routing based. This is an ASR router acting as a local PE.

So then i added a network group and object from fresh using the dhcp pool that is assigned to clients via the inside interface.

nmfoxton_0-1671468614921.png

The corresponding config is as follows;

object network obj-clientpool
network-object object obj-clientpool
range 10.173.96.15 10.173.127.254

object-group network AnyConnectClientPool

I can now ping the gateway and clients on another local ASA attached t the same subnet. This is my test ASA so i will have to wait till another client connects to test if this works between clients. It's a step in the right direction at least

nmfoxton
Level 1
Level 1

nmfoxton_1-1671468912082.png

If this works i could actually add some advanced config to control what traffic can use it I guess as at the moment it is SIP traffic that is the challenge.

nmfoxton_2-1671469013781.png

 

 

So I've been working with TAC to find a solution, none of the discussion here resulted in a solution but obviously it's useful to show how we fixed it in the end.

1. Interface configuration

nmfoxton_0-1674741425646.png

2. Network Object configuration for the DHCP range or internal pool

nmfoxton_1-1674741501660.png

 

3. NAT configuration

nmfoxton_2-1674741626318.png

4. Crypto configuration

crypto dynamic-map Outside_dyn_map 1 set reverse-route

* NOTE this will force any current connected vpns/clients to disconnect so you need to consider the timing and impact of the change