01-18-2011 12:41 PM - edited 02-21-2020 05:06 PM
I have a question.
Cisco asa5520 endpoint @ HQ
remote access vpn setup
clients are Microsoft and/or Cisco l2tp/ipsec with computer certificates
----
dilemma ..
When employees travel together. example hotel, train or partner. They can only open 1 VPN session at a time from the remote 1 IP.
When one session is successful, no other sessions can be opened.
Anybody know if it is possible to by pass this?
NAT-t is enabled
01-18-2011 12:51 PM
Post the Group policy associated with that Tunnel Group.
check for vpn-simultaneous-logins allowed under the Group policy.
Manish
01-18-2011 12:58 PM
vpn-simultaneous-logins allowed
is for many people logging in with the same id not from the same IP ...am i correct"?
01-18-2011 01:12 PM
The following example shows how to allow a maximum of 4 simultaneous logins for the group policy named FirstGroup:
hostname(config)# group-policy FirstGroup attributes
hostname(config-group-policy)# vpn-simultaneous-logins 4
Note: When you log in using the same user account from a different PC, the current session (the connection established from another PC using the same user account) is terminated, and the new session is established. This is the default behaviour and is independent to VPN simultaneous logins.
Manish
01-18-2011 01:36 PM
that is to accept 4 sessions for that specific policy
I do not want to put a limit on that
eg
suppose I have 10 users staying at a hotel A which has a public IP
1.2.3.4
they want to connect to my HQ (cisco 5520 asa) at public IP
9.8.7.6
Once 1 user that is being NAT' ted behind 1.2.3.4 connects, the rest (other 9) can't connect.
01-18-2011 01:48 PM
Ok, Tan that is why is asked you , that do you have anything like vpn-logins configured on your
Group policy to which these users connect ??
Paste remote vpn configuration from your ASA, so that we can look at the configuration. Please remove your public ip's and passwords before pasting it here.
also paste output of this :-
sh run | inc crypto isakmp nat-t
Manish
01-18-2011 04:37 PM
well I am asking. Is it possible? What command parameter can make this work?'
My config is irrelevant at this point.
01-18-2011 04:49 PM
All you need is crypto iskamp nat-tra 30 in the global mode. I have around 20 users who use same wireless network to connect to the vpn asa and I have not seen any issues.
Manish
01-24-2011 11:42 AM
01-24-2011 02:24 PM
Tan,
Since you already have Nat-t enabled and not using any login limitation on the group policy, then please post any error messages from the client side as well as Error logs generated by your ASA. if possible get debug crypto iskmap 128 / ipsec 128 as well when recreating the issues. I did missed earlier that you were using certificate for authentication so errors logs are must.
Thanks
Manish
03-07-2011 03:39 PM
I am using a certificate to authenticate and then AD username and password.
03-08-2011 10:32 AM
I am thinking if this issue is due to the l2tp over IPSec over nat-t.
I do not encounter the same issue with ipsec over nat-t.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide