08-27-2012 06:04 PM
I have a working "tunnelall" group policy for anyconnect vpn working on my production ASA just fine. I'm working on new policy on a lab ASA connected to a different public net. That's working fine for the most part (implementing DAP is the goal,) but I've tried to set up another tunnelall hairpin on this ASA and no matter what I try I can't get it working. I can see the 0.0.0.0 route set in the anyconnect client, but the traffic goes nowhere. Here's the relevant code:
interface Ethernet0/0
nameif outside
security-level 0
ip address 173.xx.yy.61 255.255.255.240
same-security-traffic permit intra-interface
ip local pool TestVPN 192.168.102.240-192.168.102.254 mask 255.255.255.0
global (outside) 1 interface
nat (outside) 1 192.168.102.0 255.255.255.0
route outside 0.0.0.0 0.0.0.0 173.xx.yy.62 1
route outside 192.168.102.0 255.255.255.0 173.xx.yy.62 1
webvpn
enable outside
svc image disk0:/anyconnect-win-2.5.2014-k9.pkg 1 regex "Windows NT"
svc image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2 regex "Intel Mac OS X"
svc image disk0:/anyconnect-linux-2.5.2014-k9.pkg 3 regex "Linux"
svc image disk0:/anyconnect-linux-64-2.5.2014-k9.pkg 4 regex "Linux"
svc enable
group-policy TunnelAll internal
group-policy TunnelAll attributes
dns-server value 10.1.5.10
vpn-tunnel-protocol svc
split-tunnel-policy tunnelall
default-domain value xxx.yyy
address-pools value TestVPN
group-policy DfltGrpPolicy attributes
dns-server value 10.1.5.10
vpn-tunnel-protocol svc
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_access_SPLIT
default-domain value xxx.yyy
address-pools value TestVPN
I've eliminated the inside related code as that is all working fine. I can reach hosts on my 10 network with no issue. Shouldn't the ASA simply nat and turn the inbound vpn packets around for internet destinations?
08-27-2012 10:33 PM
Config looks fine to me.
Are you able to ping the internet? 4.2.2.2?
Or only dns resolution doesn't work?
08-27-2012 10:49 PM
No, I can't reach any hosts beyond my internal nets.. DNS is fine since an internal resolver is used. Tcpdump confirms all traffic is targeting the tunnel.
08-28-2012 01:35 AM
After you are connected to the VPN, pls check which tunnel-group and group-policy you are connected to.
08-28-2012 08:34 AM
Yes, I've checked this and it is using the TunnelAll group policy. I can flip this on or off using an LDAP attribute map for "member-of" an AD group. That is working properly and if they are not in the group they get the default policy.
08-27-2012 11:41 PM
split-tunnel-policy tunnelspecified
split-tunnel-network-list value VPN_access_SPLIT
Have you tried using "split-tunnel-policy tunnelall"? With your config you tell your ASA to only send the specified traffic through the tunnel. What's in the VPN_access_SPLIT-ACL? If its an "any" it probably should work. But it's not very elegant to configure it that way.
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
08-28-2012 08:37 AM
Actually you are looking at the default policy, which is not used in this case. Above that you'll see the TunnelAllpolicy that is used in this case based on the user being a member of an AD group (attribute-map) and I've verified when this occurs it is applying the TunnelAll policy. If I pull the user out of the AD group the default policy is applied, the split tunnel is in effect and local routing is used for internet.
08-28-2012 02:00 PM
Actually you are looking at the default policy, which is not used in this case
now I see it. It's hard to read without any indentation ...
Have you controlled the routing-table of the client if that reflects the settings from the AnyConnect-Client?
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
08-28-2012 02:06 PM
Sorry for the lack on indentation. . .
No, I haven't done any routing adjustments on the client. Anyconnect creates a low metric 0.0.0.0 route on the virual interface.
08-28-2012 02:10 PM
No, I haven't done any routing adjustments on the client. Anyconnect creates a low metric 0.0.0.0 route on the virual interface
That's what I mean, is that routing-adjustment by AnyConnect really in place when your client connects?
08-28-2012 02:19 PM
I assume it is, since the windows routing table indicates it is:
===========================================================================
Interface List
19...00 05 9a 3c 7a 00 ......Cisco AnyConnect VPN Virtual Miniport Adapter for
Windows
17...68 a3 c4 4a 59 ff ......Bluetooth Device (Personal Area Network)
14...a0 88 b4 48 8d 10 ......Intel(R) Centrino(R) Advanced-N 6205
12...5c 26 0a 58 1a 7f ......Intel(R) 82579LM Gigabit Network Connection
1...........................Software Loopback Interface 1
13...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter
11...00 00 00 00 00 00 00 e0 Microsoft Teredo Tunneling Adapter
15...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #2
18...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
===========================================================================
IPv4 Route Table
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 10.8.5.2 10.8.5.49 25
0.0.0.0 0.0.0.0 192.168.102.1 192.168.102.240 2
.
.
Note also that I've tested from two different Mac's running the same version of AnyConnect and I fail in the same way. Routing table looks good there too.
08-28-2012 02:23 PM
Ok, then to the next test: When you send a massive amount of pings to the internet, which counter increase in the AnyConnect Statistics? Do any counters increase on the ASA?
--
Don't stop after you've improved your network! Improve the world by lending money to the working poor:
http://www.kiva.org/invitedby/karsteni
08-28-2012 03:07 PM
Okay, you're on to something now. I pinged the internet with 1K packets and could see the anyconnect sent byte count increasing in 1K clicks, while the ASA bit rate and input bytes counts on outside almost remained flat. I then pinged an internal host with the same size packet and could see the ASA bitrate and input packet count increasing as I would have expected.
So it seems that while anyconnect shows a secured route of 0.0.0.0/0.0.0.0 it's not forwarding the internet traffic across the vpn interface? This is happening on three different clients, one windows and two macs.
08-28-2012 02:10 PM
Please try "same-security-traffic permit intra-interface" in ASA...
"A good rating is as good or even better than a thank you, remember to rate the helpful posts "
08-28-2012 02:12 PM
Sorry try "same-security-traffic permit inter-interface" in ASA..
"A good rating is as good or even better than a thank you, remember to rate the helpful posts "
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide