09-23-2015 10:05 AM - edited 02-21-2020 08:28 PM
Hello,
it is running ASA 9.1(5) on my 5505 and I can connect a VPN with my iPhone/iOS 9 over IPSec. Since iOS 8 it shows a connection on both sites but I can´t access to my network-components in my home-network. Does it need a new setting since Apple iOS8?
These are my settings:
____________________
object network NETWORK_OBJ_10.10.10.0_29
subnet 10.10.10.0 255.255.255.248
username a11 password WDQ2sa2IVt6AlpMm encrypted privilege 0
username a11 attributes
vpn-group-policy g1
exit
group-policy g1 internal
group-policy g1 attributes
vpn-tunnel-protocol ikev1
exit
tunnel-group g1 type remote-access
tunnel-group g1 general-attributes
default-group-policy g1
address-pool vpnpool1
tunnel-group g1 ipsec-attributes
ikev1 pre-shared-key **********
nat (inside,outside) 2 source static any any destination static NETWORK_OBJ_10.10.10.0_29 NETWORK_OBJ_10.10.10.0_29 no-proxy-arp route-lookup
______________________________________________
Regards
Jürgen
09-24-2015 11:34 AM
Hello Jürgen,
Can you please attach the following outputs:
1. show run nat
2. show ip
3. show run ip local pool
Let me know if you are using AnyConnect or the Built-int VPN Client on your iPhone.
Regards,
09-24-2015 12:46 PM
Hello Fabian,
thanks for your reply. I use the Built-in VPN Client on my iPhone.
Syslog of connection prcess is attached.
Here are the results:
Result of the command: "show run nat"
nat (inside,outside) source static any any destination static NETWORK_OBJ_10.10.10.0_29 NETWORK_OBJ_10.10.10.0_29 no-proxy-arp route-lookup
!
object network obj_any
nat (inside,outside) dynamic interface
Result of the command: "show ip"
System IP Addresses:
Interface Name IP address Subnet mask Method
Vlan1 inside 170.180.1.1 255.255.255.0 CONFIG
Vlan2 outside 46.223.140.113 255.255.254.0 DHCP
Current IP Addresses:
Interface Name IP address Subnet mask Method
Vlan1 inside 170.180.1.1 255.255.255.0 CONFIG
Vlan2 outside 46.223.140.113 255.255.254.0 DHCP
Result of the command: "show run ip local pool"
ip local pool vp1 10.10.10.1-10.10.10.5 mask 255.255.255.0
Regards
09-28-2015 02:50 PM
Hello Jürgen,
Ok, it does not seem you have issues connecting to the ASA but issues getting traffic to work. Let me ask you a question. Is there any layer 3 device behind the ASA inside interface? if so, please make sure there is a route back to the VPN client's pool pointing to the inside interface of the firewall. for example:
ip route 10.10.10.0 0.0.0.255 170.180.1.1
I would suggest to place a packet capture on the inside interface to see if the traffic is flowing correctly and getting back to the ASA.
09-29-2015 01:03 PM
Hello Fabian,
yes there some different layer 3 devices behind the inside interface such as NAS, PC´s, webcam...
Now I take the ASA Version 9.2(4) with the ASDM 7.4(3) and I reset the whole system. Then I started the IPsec VPN Wizard. With this I can built a VPN-connection and there is a little bit of traffic when I look the Monitoring. But I can´t access my network devices. In the logging I saw this:
______________
IPAA: DHCP configured, no viable servers found for tunnel-group 'g1'
Group = g1, Username = a11, IP = 80.187.102.233, Received unsupported transaction mode attribute: 5
______________
I this an error?
When I try to access a device I see this:
10.10.10.1 51045 170.180.1.100 80 Built inbound TCP connection 60655 for outside:10.10.10.1/51045 (10.10.10.1/51045)(LOCAL\a11) to inside:170.180.1.100/80 (170.180.1.100/80) (a11)
This seems ok but there is no reaktion on the Iphone.
As you suggestet I set a static route like this:
route outside 10.10.10.0 255.255.255.0 170.180.1.0
But after that there is no effect.
Additional I give you my setting as an attachment.
Regards
10-01-2015 09:43 AM
Hello Jürgen,
Let me make my question more specific. Is there any layer 3 device behind the inside interface of the ASA performing routing? (Router, L3 Core Switch)?
10-03-2015 01:08 PM
Hello Fabian,
there is no Router - I use the ASA as a Router. I have a Cisco EPC 3212 from my provider and there behind is the ASA 5505. Behind the ASA are two switches from Netgear (GS108E and GS108PE) - I think they are not L3 devices. The VPN with iPhone/ipsec worked with this structure very well for three years. I think there is a problem since Apple iOS 8, but I´m not sure because I don´t use the VPN every day.
(Is this correct: route outside 10.10.10.0 255.255.255.0 170.180.1.100 ?? the 170.180.1.100 is the device I want to see/control with my iPhone)
New Idea:
The firewall dashboard has a window at the right lower position of ASDM and it displays Top 10 protected servers under SYN attack. Refer to the attached picture. In this scenario my internal device the server IP 170.180.1.100 seems to be getting SYN attacks from my iPhone with the IP 10.10.10.1 through the VPN.
Is this the reason why the traffic is blocked?
How can I place a packet capture on the inside interface to see the traffic?
Regards
10-10-2015 05:31 AM
Hello Fabian,
I found the packed-tracer. It seems packets are dropped because of ACL-rules - look at these results for outside and inside interface:
___________________________
Result of the command: "packet-tracer input outside icmp 20.20.20.1 8 0 170.180.1.71 detailed"
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcc323bf8, priority=1, domain=permit, deny=false
hits=22875563, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0100.0000.0000
input_ifc=outside, output_ifc=any
Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in 170.180.1.0 255.255.255.0 inside
Phase: 3
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static NETWORK_OBJ_20.20.20.0_29 NETWORK_OBJ_20.20.20.0_29 no-proxy-arp route-lookup
Additional Information:
NAT divert to egress interface inside
Untranslate 170.180.1.71/0 to 170.180.1.71/0
Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static NETWORK_OBJ_20.20.20.0_29 NETWORK_OBJ_20.20.20.0_29 no-proxy-arp route-lookup
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcca63cc0, priority=6, domain=nat, deny=false
hits=33, user_data=0xcca63208, cs_id=0x0, flags=0x0, protocol=0
src ip/id=20.20.20.0, mask=255.255.255.248, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=inside
Phase: 5
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcbc8cfe0, priority=0, domain=nat-per-session, deny=true
hits=152793, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 6
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcc324898, priority=0, domain=permit, deny=true
hits=54755, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=outside, output_ifc=any
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
___________________________
Result of the command: "packet-tracer input inside icmp 170.180.1.71 8 0 20.20.20.1 detailed"
Phase: 1
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in 20.20.20.1 255.255.255.255 via 130.140.10.1, outside
Phase: 2
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static NETWORK_OBJ_20.20.20.0_29 NETWORK_OBJ_20.20.20.0_29 no-proxy-arp route-lookup
Additional Information:
NAT divert to egress interface outside
Untranslate 20.20.20.1/0 to 20.20.20.1/0
Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static NETWORK_OBJ_20.20.20.0_29 NETWORK_OBJ_20.20.20.0_29 no-proxy-arp route-lookup
Additional Information:
Static translate 170.180.1.71/0 to 170.180.1.71/0
Forward Flow based lookup yields rule:
in id=0xcca639e0, priority=6, domain=nat, deny=false
hits=17, user_data=0xcca63150, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=20.20.20.0, mask=255.255.255.248, port=0, tag=0, dscp=0x0
input_ifc=inside, output_ifc=outside
Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcbc8cfe0, priority=0, domain=nat-per-session, deny=true
hits=152777, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=any
Phase: 5
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcc2fe380, priority=0, domain=inspect-ip-options, deny=true
hits=288712, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=inside, output_ifc=any
Phase: 6
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcc2fde20, priority=66, domain=inspect-icmp-error, deny=false
hits=922, user_data=0xcc2fd430, cs_id=0x0, use_real_addr, flags=0x0, protocol=1
src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=0, dscp=0x0
input_ifc=inside, output_ifc=any
Phase: 7
Type: HOST-LIMIT
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0xcbdcf398, priority=0, domain=host-limit, deny=false
hits=84, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0
input_ifc=inside, output_ifc=any
Phase: 8
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0xccacbd80, priority=70, domain=encrypt, deny=false
hits=1, user_data=0x13b62c, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=20.20.20.1, mask=255.255.255.255, port=0, tag=0, dscp=0x0
input_ifc=any, output_ifc=outside
Phase: 9
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static NETWORK_OBJ_20.20.20.0_29 NETWORK_OBJ_20.20.20.0_29 no-proxy-arp route-lookup
Additional Information:
Forward Flow based lookup yields rule:
out id=0xcca641f0, priority=6, domain=nat-reverse, deny=false
hits=13, user_data=0xcca63208, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0
dst ip/id=20.20.20.0, mask=255.255.255.248, port=0, tag=0, dscp=0x0
input_ifc=inside, output_ifc=outside
Phase: 10
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 279868, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_translate
snp_fp_adjacency
snp_fp_encrypt
snp_fp_fragment
snp_ifc_stat
Module information for reverse flow ...
Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide