02-11-2013 05:43 PM
Hi,
I have a problem where I cannot reach VPN clients with their vpn pool IP from the inside, or from the asa itself. VPN clients connect and can access internal network fine. I have no nat configured for the vpn pool range, and packet tracer encrypts the packet and puts it down the tunnel. I'm not sure whats wrong.
Here's some relevant config:
object network obj-192.168.245.0
subnet 192.168.245.0 255.255.255.0
ip local pool vpn 192.168.245.1-192.168.245.50
nat (inside,outside) source static any any destination static obj-192.168.245.0 obj-192.168.245.0 no-proxy-arp route-lookup
Packet tracer output:
firewall# packet-tracer input inside icmp x.x.x.x 8 0 192.168.245.33
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 192.168.245.33 255.255.255.255 outside
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group acl-inside in interface inside
access-list acl-inside extended permit icmp any any echo
Additional Information:
Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type:
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside,outside) source static any any destination static obj-192.168.245.0
obj-192.168.245.0 no-proxy-arp route-lookup
Additional Information:
Static translate x.x.x.x/0 to x.x.x.x/0
Phase: 8
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 277723432, packet dispatched to next module
Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
There is no route to the vpn pool address though. Maybe this is the problem? I'm sure this used to work before we upgraded to 8.4.
Solved! Go to Solution.
02-11-2013 10:10 PM
Check if firewall is enabled on your ravpn client host and blocking all your pings.
02-11-2013 08:58 PM
Hello Wayne,
No route is required, it should be implied that there will be connecting from the outside so the outside should be the one interface used to route back to this guys,
Just as a test can you create a more specific object network ( with the LAN )
object network LAN
subnet 192.168.12.0 255.255.255.0
nat (inside,outside) 1 source static LAN LAN destination static obj-192.168.245.0 obj-192.168.245.0
Then let us know the result,
Also is this an IPSec client or Anyconnect deployment?
02-11-2013 09:19 PM
Hi,
Thanks for your help with my issue. The clients are using Cisco VPN client, ie IPSec.
I tried your suggestion but still got the same result. I connected a vpn client and got an IP from the pool (192.168.245.40). Then tried a ping from an inside host. No reply.
firewall(config)# object network inside_subnet
firewall(config-network-object)# subnet 172.20.0.0 255.255.0.0
firewall(config-network-object)# exi
firewall(config)# nat (inside,outside) 1 source static inside_subnet inside_subnet destination static obj-192.168.245.0 obj-192.168.245.0
firewall# ping inside 192.168.245.40
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.245.40, timeout is 2 seconds:
?????
Success rate is 0 percent (0/5)
firewall# packet-tracer input inside icmp 172.20.5.103 8 0 192.168.245.40
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 192.168.245.40 255.255.255.255 outside
Phase: 3
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group acl-inside in interface inside
access-list acl-inside extended permit icmp any any echo
Additional Information:
Phase: 4
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: INSPECT
Subtype: np-inspect
Result: ALLOW
Config:
Additional Information:
Phase: 6
Type:
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 7
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (inside,outside) source static inside_subnet inside_subnet destination stati
c obj-192.168.245.0 obj-192.168.245.0
Additional Information:
Static translate 172.20.5.103/0 to 172.20.5.103/0
Phase: 8
Type: VPN
Subtype: encrypt
Result: ALLOW
Config:
Additional Information:
Phase: 9
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 278219622, packet dispatched to next module
Result:
input-interface: inside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: allow
02-11-2013 10:10 PM
Check if firewall is enabled on your ravpn client host and blocking all your pings.
02-11-2013 10:13 PM
Thanks Andrew. But the firewall is not enabled on the client. This was the first thing I checked.
02-12-2013 07:56 AM
Can you share the entire configuration please?
Do you have NAT-T enabled? If not please do
Regards,
02-12-2013 11:43 AM
Hi,
did you check routing at the inside hosts so that they point to the ASA ?
please get these outputs:
cap capin interface inside match icmp any any
cap asp type asp-drop all
clear crypto ipsec sa counters
then, run a continuous ping from one of the inside hosts, and get:
show cap in
show cap asp
show crypto ipsec sa
----
Hope this helps
Mashal
02-12-2013 05:44 PM
We don't have NAT-T enabled. Do you think this will help? The clients can access internal hosts with no issues.
Mashal,
It's not a routing issue, I can't ping the clients from the asa itself. To confirm I did the capture for icmp and the pings are reaching the asa. I also tried the asp capture you suggested, but there was way too many logs and I couldn't find the relevant entries. What are you looking for with the asp-drop capture? Can I filter it down?
02-12-2013 06:06 PM
We don't have NAT-T enabled. Do you think this will help? The clients can access internal hosts with no issues??
YES, I have this same issue once.. Try that and I got to work....
Regards,
Julio Carvajal
Advanced Security Trainer
02-12-2013 06:37 PM
Thanks everyone for your help. Turns out this is a firewall problem on the client after all. While we had disabled the firewall for the Domain networks profile, it was still enabled for private and public. The VPN adapter must get assigned to the public profile and not Domain profile like I thought (This is for Windows 7).
02-13-2013 07:16 AM
Hello Wayne,
Good to know that,
Please mark the question as answered so anyone can learn from this topic,
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide