08-30-2011 09:29 AM
Good afternoon
I´m having an issue regarding the propagation of routes to VPN users that authenticate through the asa tunnel-group.
I have a VPN-Users-Pool from where my users receive their IP address, and after authentication and the tunnel is established the idea is for the user to get to the following networks defined in the following ACL:
access-list Inside standard permit 10.1.0.0 255.255.0.0
access-list Inside standard permit 192.168.15.0 255.255.224.0
Now the problem is that after the tunnel is established the only route the user receives is the default route (which is not suposed to be sent). The user does not receive the specified routes in the ACL above. He also does not receive the netmask and assumes a /8 netmask (given that the network pool from where he is receiving the IP is a class A network).
The network routing is working as expected (when I add the static routes directly to the users PC, everything works OK). It´s just the issue of the ASA not propagating the routes as it should.
Here are my split tunneling settings:
group-policy DefaultRAGroup attributes
vpn-idle-timeout 1
vpn-tunnel-protocol l2tp-ipsec
pfs disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
(...)
group-policy DfltGrpPolicy attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
(...)
Any ideas?
I apreciate your help
Best regards
Solved! Go to Solution.
08-31-2011 05:59 AM
Just a question, I see:
group-policy DefaultRAGroup attributes
vpn-tunnel-protocol l2tp-ipsec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
group-policy DefaultRAGroup_1 internal
group-policy DefaultRAGroup_1 attributes
split-tunnel-policy tunnelspecified
It looks like on your policy
DefaultRAGroup_1 you don't define ACL, and the other one seems to be for L2TP/IPSEC. How do you connect to the ASA, using L2TP/IPSEC or Cisco IPSEC client ? Also, if your users are put into this group policy:
DefaultRAGroup_1 it looks like the acl is missing for split tunneling
08-30-2011 10:32 AM
Hi,
Can you please paste the full config ?
Thanks
08-30-2011 11:01 AM
Thank you for your reply. I´m sending the config bellow (I´ve cleared all info confidential such as IPs, passwords, timeout values, etc, but i think what you have bellow is enough to get a clear picture):
ASA Version 8.2(1)
!
hostname asa-xxxx
enable password xxxxxxxxx encrypted
passwd xxxxxxxxxx encrypted
names
!
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 197.X.XX.XX 255.255.255.248
!
interface GigabitEthernet0/1
nameif vpncorp
security-level 50
ip address 10.X.XX.XX 255.255.255.248
!
interface GigabitEthernet0/2
shutdown
no nameif
no security-level
no ip address
!
interface GigabitEthernet0/3
shutdown
no nameif
no security-level
no ip address
!
interface Management0/0
speed 100
duplex full
nameif mgmt
security-level 100
ip address 10.x.xx.xx 255.255.255.240
management-only
!
ftp mode passive
dns server-group DefaultDNS
domain-name zz.df.es
access-list Inside standard permit 10.1.0.0 255.255.0.0
access-list Inside standard permit 192.168.15.0 255.255.224.0
pager lines 24
logging enable
logging timestamp
logging buffer-size 14000
logging buffered debugging
logging asdm debugging
logging facility 21
logging host mgmt 10.xx.x.x
logging class auth trap informational
logging class config trap informational
logging class ha trap informational
logging class sys trap informational
logging class vpdn trap informational
logging class vpn trap informational
mtu outside 1500
mtu vpncorp 1500
mtu mgmt 1500
ip local pool VPN-01-pool 10.XX.XX.X-10.XX.XX.XX mask 255.255.252.0
ip local pool VPN-02-pool 10.xx.xx.x-10.xx.xx.xx mask 255.255.252.0
ip local pool VPN-USER-pool 192.168.xx.x-192.168.xx.xx mask 255.255.0.0
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
route outside 0.0.0.0 0.0.0.0 197.xx.xx.xx 1
route vpncorp 10.x.x.x 255.xx.xx.xx 10.xx.xx.xx 1
route vpncorp 10.xx.xx.xx 255.255.0.0 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.0 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.248 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.0 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.255 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.255 10.xx.xx.xx 1
route mgmt 10.xx.xx.xx 255.255.255.255 10.xx.xx.xx 1
dynamic-access-policy-record DfltAccessPolicy
aaa-server mgmtt protocol radius
aaa-server mgmtt (mgmt) host 10.xx.x.xx
timeout xxx
key xxxxxxxxxx
authentication-port xxx
accounting-port xxxx
aaa-server mgmtt (mgmt) host 10.xx.xx.xx
timeout xxx
key xxxxxx
authentication-port xxxx
accounting-port xxxx
aaa-server Users protocol radius
accounting-mode simultaneous
interim-accounting-update
aaa-server Users (mgmt) host 10.xx.xx.xx
key xxxxx
authentication-port xxxx
accounting-port xxxx
aaa-server Users-2 protocol radius
accounting-mode simultaneous
interim-accounting-update
aaa-server users-2 (mgmt) host 10.xx.xx.xxx
key xxxx
authentication-port xxx
accounting-port xxxx
aaa authentication ...
aaa authentication ...
aaa authentication ...
aaa authorization ...
aaa accounting ...
aaa accounting ...
aaa accounting ...
snmp-server ...
crypto ipsec transform-set ...
crypto ipsec transform-set ...
crypto ipsec transform-set ...
crypto ipsec transform-set ...
crypto ipsec transform-set ...
crypto ipsec transform-set ...
crypto ipsec security-association lifetime seconds xxx
crypto ipsec security-association lifetime kilobytes xxx
crypto dynamic-map vpn-ra-dyn_map 10 set ...
crypto map outside_map 100 ipsec-isakmp dynamic vpn-ra-dyn_map
crypto map outside_map interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy ...
authentication pre-share
encryption xxx
hash xxx
group x
lifetime xxx
crypto isakmp policy xxx
authentication pre-share
encryption xxx
hash xxx
group x
lifetime xxx
telnet timeout xxx
ssh 10.x.x.x 255.255.255.255 mgmt
ssh timeout x
ssh version x
console timeout x
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
vpn-idle-timeout 1
vpn-tunnel-protocol l2tp-ipsec
pfs disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
default-domain value xx.xx.es
group-policy DefaultRAGroup_1 internal
group-policy DefaultRAGroup_1 attributes
vpn-idle-timeout 1
split-tunnel-policy tunnelspecified
username ...
username ...
username ...
tunnel-group DefaultRAGroup general-attributes
authentication-server-group (outside) Users
accounting-server-group users
default-group-policy DefaultRAGroup
tunnel-group DefaultRAGroup ipsec-attributes
pre-shared-key xxxxx
tunnel-group DefaultRAGroup ppp-attributes
no authentication chap
authentication ms-chap-v2
tunnel-group asa type remote-access
tunnel-group asa general-attributes
address-pool VPN-user-pool
authentication-server-group (outside) test
accounting-server-group test
tunnel-group asa ipsec-attributes
pre-shared-key xxxx
tunnel-group asa ppp-attributes
no authentication chap
no authentication ms-chap-v1
authentication ms-chap-v2
tunnel-group tstvpn type remote-access
tunnel-group tstvpn general-attributes
authentication-server-group (outside) users-2
accounting-server-group users-2
default-group-policy DefaultRAGroup
tunnel-group tstvpn ipsec-attributes
pre-shared-key xxxx
tunnel-group tstvpn ppp-attributes
no authentication chap
authentication ms-chap-v2
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum xxxx
policy-map global_policy
class inspection_default
inspect xxxx
inspect ...
...
!
service-policy global_policy global
prompt hostname context
Cryptochecksum:xxxxxx
: end
08-31-2011 03:38 AM
Anyone?
08-31-2011 03:43 AM
Hi Zarahell,
please try to replace standard ACL by Extended ACLs
So
access-list Inside standard permit 10.1.0.0 255.255.0.0
access-list Inside standard permit 192.168.15.0 255.255.224.0
would become
access-list Inside extended permit 10.1.0.0 255.255.0.0 any
access-list Inside extended permit 192.168.15.0 255.255.224.0 any
And let us know if any improvements
08-31-2011 05:39 AM
Bastien Migette
I actually thought of that a couple of hours ago...but the configurations were made via GUI, so I´m assuming a standard ACL should work since it was set by the Cisco software itself.
I´ll try ASAP and get back to you.
08-31-2011 05:48 AM
Nope
It didn´t work; I've replaced the ACL for the extended one and still no results.
Any more ideas?
08-31-2011 05:59 AM
Just a question, I see:
group-policy DefaultRAGroup attributes
vpn-tunnel-protocol l2tp-ipsec
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
group-policy DefaultRAGroup_1 internal
group-policy DefaultRAGroup_1 attributes
split-tunnel-policy tunnelspecified
It looks like on your policy
DefaultRAGroup_1 you don't define ACL, and the other one seems to be for L2TP/IPSEC. How do you connect to the ASA, using L2TP/IPSEC or Cisco IPSEC client ? Also, if your users are put into this group policy:
DefaultRAGroup_1 it looks like the acl is missing for split tunneling
08-31-2011 06:06 AM
Using Cisco IPSEC client.
DefaultRAGroup_1 is a test policy. Don´t take it in regard.
08-31-2011 06:11 AM
well, i'm not sure this would be related to the issue, but can you try to change your default group-policy and add the ipsec in the vpn tunnel protocol like this;:
vpn-tunnel-protocol ipsec l2tp-ipsec
Also, in the info/statistics menu on the VPN client, there's a tab where you can see the route that are being secured. You may check this tab to see what routes are actually fetched from the VPN Client.
08-31-2011 07:55 AM
Bastien
No luck. I´ve added the line as you suggested but I still do not receive the specified routes in the ACL.
Any other suggestions?
08-31-2011 11:46 AM
Anyone?
08-31-2011 01:21 PM
Ok, so I got it to work with Cisco VPN Client (it was a matter of reconfiguration of the transform-set).
But it still does not work with native OS vpn clients (MAC, Windows, etc)...it authenticates and the tunnel is established, but the routes defined in the split tunneling are not propagated.
Is this a known issue? Does ASA require any specific configuration to make it compatible with other vpn clients than the cisco one?
09-01-2011 03:26 AM
Ok
So, new feedback...aparently split tunneling does not work over L2TP connections. It sends the routes over pure IPSEC tunnels.
Problem is, that most native vpn clients use L2TP. Anyone knows of a workaround for this? A setting from the server side (ASA) that can overcome this?
09-01-2011 07:19 AM
Finally found a way...just posting it here for someone who has the same problem.
There´s a way to workaround the issue of propagating routes over L2TP.
Just added the command to the policy group:
group-policy DefaultRAGroup attributes
intercept-dhcp 255.255.0.0 enable
It basically acts as an DHCP server engine, forcing the routes you have defined on the ACL to any authenticated user's routing table.
It's kind of a stupid workaround, because DHCP and Split Tunneling are 2 different engines, but for some reason they need to be set together: you still need the split-tunnel-policy tunnelspecified associated with the ACL for the intercept-dhcp to work for those networks.
I find it to be a very stupid solution, but it works with most Operating Systems (Snow Leopard, Lion, Windows XP and Windows 7)
However it does not work with Android, MAC OS bellow Snow Leopard (like Leopard), and WIN OS bellow XP. Basically it depends on the DHCP engine the OS is running. Still, it works with the most common operating systems, so for me this post is answered.
Summing up, basically my group-policy is set as follows:
group-policy DefaultRAGroup attributes
vpn-idle-timeout 1
vpn-tunnel-protocol l2tp-ipsec
pfs disable
split-tunnel-policy tunnelspecified
split-tunnel-network-list value Inside
intercept-dhcp 255.255.0.0 enable
Hope this helps to anyone with the same problem.
Best regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide