cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3533
Views
15
Helpful
51
Replies

ASA VPN Cannot ping across split Tunnel

chris.bias
Level 1
Level 1

Hello little bit of a newbie when it comes to Cisco ASA and setting up the VPN but I have it configured but not able to ping anything internally. Please advise if you need to see my config I will be happy to provide it.

1 Accepted Solution

Accepted Solutions

This is normal. Since packet tracer command will look the ACL. But your actuall traffic will bypass the Outside ACL as you have sysopt permit vpn in your configuration. 

Chris, check your routing. You need to fix that. Your return traffic is going to Sonic Wall which has nothing to do with what we have been presented with so far. I am.unable to. Understand your architecture and scenario here as where in the picture is ASA and Sonicwall? 

At this moment we do not know the big picture. One thing you can do to test is add ip route 192.168.15.10 255.255.255.255 172.22.45.13 on device with ip 172.22.45.1 

 

Thanks
Raminder
PS: If this answered your question, please don't forget to rate and select as validated answer

View solution in original post

51 Replies 51

without see config we can know what is issue
BUT
do you config NAT exception ?
do you config right ACL for split reflect what ANYCONNECT POOL and INSIDE-LAN ?

@MHM Cisco World  see attached config for reference

access-list Split-Tunnel standard permit 192.168.15.0 255.255.255.0<- this must INSIDE that any connect can connect ?
the config is missing VPN POOL address ?
the since I don't know the VPN POOL subnet I could not sure If you config exception NAT or not.

@MHM Cisco World  yes the IP scheme 192.168.15.0 255.255.255.0 need to be able to access internal resources. The VPN Pool should be the VPN POOL 2.

192.168.15.0 <- this is subnet of Inside or VPN Pool ?
I cannot see VPN pool in your config !!

@MHM Cisco World  This is the VPN Pool --> 192.168.15.0

that then not correct 
in Split-acl standard ACL you must specify the INSIDE subnet not VPN POOL 

Also you need NAT exception 
nat (outside,inside) source static INSIDE  INSIDE destination static VPN-POOL VPN-POOL no-proxy-arp route-lookup

@MHM Cisco World   could you provide an example please?

Few Things missing here:

1. Your Split tunnel does not appear to be correct because:

 a. Your anyconnect pool is 192.168.15.0/24 and you are using the same subnet in the split tunnel, it actually should be the destination subnets that you need to access over vpn, fox example : access-list Split-Tunnel standard permit 10.0.0.0 255.0.0.0

2. You do not have the NAT to allow the VPN pool subnet to access internal resources, for example you need something like this:

nat (outside,inside) source static obj-AnyConnectPool obj-AnyConnectPool destination static internalSUBNETS internalSUBNETS no-proxy-arp route-lookup

3. I am not sure of your internal Network Topology but if there are some network behind another layer 3 devices, you may need to add the route to your anyconnect pool and redistribute it(this step depeneds on your topology as you do have a default route) but i would check that too

route outside 192.168.15.0 255.255.255.0 190.110.209 1 track 1

Thanks
Raminder
PS: If this answered your question, please don't forget to rate and select as validated answer

@MHM Cisco Worldand @SinghRaminder  so I made the changes but it still won't let me access any resources. See the updated config.

Few things here again:

1. provide the output of show run all sysopt

2. you do not need the highlighted line below

access-list Split-Tunnel standard permit 192.168.15.0 255.255.255.0

3. Provide the output of this command here, assuming ICMP is allowed

packet-tracer  input <inside> icmp 172.22.45.11 8 0 192.168.15.55 

4. Your NAT looks fine, tunnel-group and Group-Policy appears to be fine

5. can you make sure the routing is fine, that the subnets know how to reach other if 172.22.45.11 is behind another layer 3 device

6. I also see you have  VPN address pool called VPN_POOL_2, can you make sure it has 192.168.15.0/24 subnet in it

 

 

 

Thanks
Raminder
PS: If this answered your question, please don't forget to rate and select as validated answer

@MHM Cisco Worldand @SinghRaminder  I had to do the packet trace on the ASDM as it wouldn't let me on the command string see the attached results. Also the VPN_POOL_2 does have a subnet on it.

 

show run all sysopt:

no sysopt traffic detailed-statistics
no sysopt connection timewait
sysopt connection tcpmss 1380
sysopt connection tcpmss minimum 0
sysopt connection permit-vpn
sysopt connection reclassify-vpn
no sysopt connection preserve-vpn-flows
no sysopt radius ignore-secret
no sysopt noproxyarp outside
no sysopt noproxyarp isp2
no sysopt noproxyarp inside_port
no sysopt noproxyarp inside
no sysopt noproxyarp hvac
no sysopt noproxyarp nvr_warehouse
no sysopt noproxyarp voice
no sysopt noproxyarp physecvideo
no sysopt noproxyarp physecaccess
no sysopt noproxyarp physec_irms

You probably typed <inside> 

This was for reference only as you need to type your internal interface which could be named as inside

 

I actually need to see the route lookup. Output, It's possible icmp is not allowed inside to outside.

 

I'm not sure if I can ask for WebEx but I can do a quick video chat with you and check your setup... Check your message if you are up for it

Thanks
Raminder
PS: If this answered your question, please don't forget to rate and select as validated answer