cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
3225
Views
4
Helpful
7
Replies

Cisco Any Connect - No access to LAN

Michael Moore
Level 1
Level 1

Good Day everyone,

 

I have a test CISCO ASA thats in a lab. Outside interface connected to the Internet and inside interface connected to the LAN. I set up SSL VPN using the Wizard and when i fire up my anyconnect application (from outside my network to test connectivity) I am able to connect but return traffic does not function. I see sent packet bytes increasing but nothing coming back. 

 

Below is my configuration

 


internal-fw-home/sec# show running-config 
: Saved

: Serial Number: xxxxxxxxxxx
: Hardware:   ASA5505, 512 MB RAM, CPU Geode 500 MHz
:
ASA Version 9.2(2)4 
!
hostname internal-fw-home
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 2KFQnbNIdI.2KYOU encrypted
names
ip local pool ANYCONNECT-POOL 192.168.100.30-192.168.100.254 mask 255.255.255.0
!
interface Ethernet0/0
 description DESKTOP_PC
!
<--- More --->
              
interface Ethernet0/1
 description CABLEVISION
 switchport access vlan 12
!
interface Ethernet0/2
 description WiFi
!
interface Ethernet0/3
 description LAB equipment
!
interface Ethernet0/4
!
interface Ethernet0/5
 shutdown
!
interface Ethernet0/6
 shutdown
!
interface Ethernet0/7
 shutdown
!
interface Vlan1
 nameif inside
 security-level 100
p address 10.1.1.1 255.255.255.0 
!
interface Vlan12
 description CKT-CABLEVISION-20MB-0/1
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
boot system disk0:/asa922-4-k8.bin
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
 name-server 8.8.4.4
 domain-name default.domain.invalid
object network NETWORK_OBJ_192.168.100.0_24
 subnet 192.168.100.0 255.255.255.0
access-list SPLIT-TUNNEL standard permit 10.1.1.0 255.255.255.0 
logging enable
logging timestamp
logging buffered debugging
logging trap informational
logging asdm debugging
logging device-id hostname
logging host inside 10.1.1.2
logging permit-hostdown
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-731.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source dynamic any interface
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.100.0_24 NETWORK_OBJ_192.168.100.0_24 no-proxy-arp route-lookup
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
<--- More --->
              
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication http console LOCAL 
aaa authentication ssh console LOCAL 
aaa authentication enable console LOCAL 
aaa authorization command LOCAL 
aaa authorization exec LOCAL auto-enable
http server enable
http 10.1.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
crypto ipsec ikev2 ipsec-proposal AES256
 protocol esp encryption aes-256
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
 protocol esp encryption aes-192
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
 protocol esp encryption aes
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
 protocol esp encryption 3des
<--- More --->
              
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
 protocol esp encryption des
 protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_2
 enrollment self
 subject-name CN=10.1.1.1,CN=internal-fw-home
 crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_2
 certificate 74bd8e54
    30820243 308201ac a0030201 02020474 bd8e5430 0d06092a 864886f7 0d010105 
    05003066 31193017 06035504 03131069 6e746572 6e616c2d 66772d68 6f6d6531 
    11300f06 03550403 13083130 2e312e31 2e313136 30340609 2a864886 f70d0109 
    02162769 6e746572 6e616c2d 66772d68 6f6d652e 64656661 756c742e 646f6d61 
    696e2e69 6e76616c 6964301e 170d3134 31323238 32323231 33385a17 0d323431 
    32323532 32323133 385a3066 31193017 06035504 03131069 6e746572 6e616c2d 
    66772d68 6f6d6531 11300f06 03550403 13083130 2e312e31 2e313136 30340609 
    2a864886 f70d0109 02162769 6e746572 6e616c2d 66772d68 6f6d652e 64656661 
    756c742e 646f6d61 696e2e69 6e76616c 69643081 9f300d06 092a8648 86f70d01 
<--- More --->
              
    01010500 03818d00 30818902 81810084 0b7119f5 01187fa1 730cbefd 1154c6de 
    61f50fab cbc5ddf7 88f09c61 1b420c60 2a722f2c 68528ab9 379217b6 1bee2a39 
    15083a20 5f0c058e 9540b64b 3cb528da e0a9f84d 0aa91378 e7dd1234 06e83cb8 
    d9de6523 58bd5252 059508d8 6cec826b 3ca707ea 39bc9a59 909f7830 bf855bb4 
    1d092baa 639f37d9 d2d38f20 2c49db02 03010001 300d0609 2a864886 f70d0101 
    05050003 8181001b 519e6757 dfd094ca b9845095 6e419740 da0b0d81 1fa78221 
    de7b32bd b2dff5e9 e19181c0 44afe0ec f7952449 7d53fce5 ec9b497b 19ccd15c 
    1274b49d 7f615290 9c07c0be 7b737101 8f9a4384 c0ef780c dff68253 5170d664 
    9fe1889d f4e3e205 94d6b02c 7bea7b5d a281ebec 458eb83a fa02a619 343aba28 
    8466e0af c31cf6
  quit
crypto ikev2 enable outside
crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_2
telnet timeout 5
ssh stricthostkeycheck
ssh 10.1.1.0 255.255.255.0 inside
ssh x.x.x.x 255.255.255.255 outside
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcp-client client-id interface outside
dhcpd address 10.1.1.2-10.1.1.12 inside

dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 206.246.122.250 source outside
ntp server 66.219.116.140 source outside
ntp server 165.193.126.229 source outside prefer
ssl trust-point ASDM_Launcher_Access_TrustPoint_2 inside vpnlb-ip
ssl trust-point ASDM_Launcher_Access_TrustPoint_2 inside
webvpn
 enable outside
 anyconnect image disk0:/anyconnect-win-3.1.05182-k9.pkg 1
 anyconnect enable
 tunnel-group-list enable
group-policy DfltGrpPolicy attributes
 dns-server value 8.8.4.4
 vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
 default-domain value default.domain.invalid
group-policy GroupPolicy_SSL-VPN internal

group-policy GroupPolicy_SSL-VPN attributes
 wins-server none
 dns-server value 10.1.1.1 8.8.4.4
 vpn-tunnel-protocol ssl-client 
 default-domain value default.domain.invalid
username e19262 password 4IOKIX/1luwaGA94 encrypted
username michael password 2THh7qjMF9mCrgtP encrypted privilege 15
tunnel-group SSL-VPN type remote-access
tunnel-group SSL-VPN general-attributes
 address-pool ANYCONNECT-POOL
 default-group-policy GroupPolicy_SSL-VPN
tunnel-group SSL-VPN webvpn-attributes
 group-alias SSL-VPN enable
!
!
prompt hostname priority 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
  subscribe-to-alert-group diagnostic
<--- More --->
              
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:7e4a9b7cbb1e9276cfd27aaa5d6b6300
: end

internal-fw-home/sec#                   

7 Replies 7

Poonam Garg
Level 3
Level 3

Hi Michael,

Although you have exempted the Anyconnect Pool from NAT but it seems the problem with order of operation of NAT statement. Twice NAT statements are executed in the order they are configured.

According to your configuration:

nat (inside,outside) source dynamic any interface
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.100.0_24 

So, your dynamic rule will hit first and second stement will never be getting any hit count. Reordering your NAT statements may help.

nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.100.0_24 

nat (inside,outside) source dynamic any interface

"show nat detail" must show your static nat on first position.

 

HTH

"Please rate helpful posts"

Poonam Garg,

 

Reordering the NAT statements improved my situation greatly. Thanks for the advice.

Now I have two more issues. I can now ping a LIVE workstation over the tunnel but DNS resolution does not work. I cant get to external sites. The second issue is how do I enable administration of the ASA over the tunnel.  Please take a look at the new configuration along with IP settings on my workstation that has successfully connected to the ASA.

 

### Workstation ###

 

   Primary Dns Suffix  . . . . . . . :
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : default.domain.invalid
                                       home

Ethernet adapter Local Area Connection 5:

   Connection-specific DNS Suffix  . : default.domain.invalid
   Description . . . . . . . . . . . : Cisco AnyConnect Secure Mobility Client V
irtual Miniport Adapter for Windows x64
   Physical Address. . . . . . . . . : 00-05-9A-3C-7A-00
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::74f6:6b4f:a0ac:2e0e%22(Preferred)
   Link-local IPv6 Address . . . . . : fe80::f59b:2b3d:1b03:b6d5%22(Preferred)
   IPv4 Address. . . . . . . . . . . : 192.168.100.30(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : ::
                                       192.168.100.1
   DHCPv6 IAID . . . . . . . . . . . : 369100186
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1A-A3-19-E3-A4-17-31-17-CF-80

   DNS Servers . . . . . . . . . . . : 8.8.4.4
   NetBIOS over Tcpip. . . . . . . . : Enabled

 


C:\Users\Michael>nslookup
DNS request timed out.
    timeout was 2 seconds.
Default Server:  UnKnown
Address:  8.8.4.4

> google.com
Server:  UnKnown
Address:  8.8.4.4

DNS request timed out.
    timeout was 2 seconds.
DNS request timed out.
    timeout was 2 seconds.
DNS request timed out.
    timeout was 2 seconds.
DNS request timed out.
    timeout was 2 seconds.
*** Request to UnKnown timed-out

 

### Current configuration on ASA ###

 


ASA Version 9.2(2)4 
!
hostname internal-fw-home
domain-name default.domain.invalid
enable password 8Ry2YjIyt7RRXU24 encrypted
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
xlate per-session deny tcp any6 any4
xlate per-session deny tcp any6 any6
xlate per-session deny udp any4 any4 eq domain
xlate per-session deny udp any4 any6 eq domain
xlate per-session deny udp any6 any4 eq domain
xlate per-session deny udp any6 any6 eq domain
passwd 2KFQnbNIdI.2KYOU encrypted
names
ip local pool ANYCONNECT-POOL 192.168.100.30-192.168.100.254 mask 255.255.255.0
!
interface Ethernet0/0
 description DESKTOP_PC
!
<--- More --->
              
interface Ethernet0/1
 description CABLEVISION
 switchport access vlan 12
!
interface Ethernet0/2
 description WiFi
!
interface Ethernet0/3
 description LAB equipment
!
interface Ethernet0/4
!
interface Ethernet0/5
 shutdown
!
interface Ethernet0/6
 shutdown
!
interface Ethernet0/7
 shutdown
!
interface Vlan1
 nameif inside
 security-level 100
ip address 10.1.1.1 255.255.255.0 
!
interface Vlan12
 description CKT-CABLEVISION-20MB-0/1
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
boot system disk0:/asa922-4-k8.bin
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
 name-server 8.8.4.4
 domain-name default.domain.invalid
object network NETWORK_OBJ_192.168.100.0_24
 subnet 192.168.100.0 255.255.255.0
access-list SPLIT-TUNNEL standard permit 10.1.1.0 255.255.255.0 

pager lines 24
logging enable
logging timestamp
logging buffered debugging
logging trap informational
logging asdm debugging
logging device-id hostname
logging host inside 10.1.1.2
logging permit-hostdown
mtu inside 1500
mtu outside 1500
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-731.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.100.0_24 NETWORK_OBJ_192.168.100.0_24 no-proxy-arp route-lookup
nat (inside,outside) source dynamic any interface
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication http console LOCAL 
aaa authentication ssh console LOCAL 
aaa authentication enable console LOCAL 
aaa authorization command LOCAL 
aaa authorization exec LOCAL auto-enable
http server enable
http 10.1.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
crypto ipsec ikev2 ipsec-proposal AES256
 protocol esp encryption aes-256
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
 protocol esp encryption aes-192
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
 protocol esp encryption aes
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
 protocol esp encryption 3des
protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal DES
 protocol esp encryption des
 protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpoint ASDM_Launcher_Access_TrustPoint_2
 enrollment self
 subject-name CN=10.1.1.1,CN=internal-fw-home
 crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_Launcher_Access_TrustPoint_2
 certificate 74bd8e54
    30820243 308201ac a0030201 02020474 bd8e5430 0d06092a 864886f7 0d010105 
    05003066 31193017 06035504 03131069 6e746572 6e616c2d 66772d68 6f6d6531 
    11300f06 03550403 13083130 2e312e31 2e313136 30340609 2a864886 f70d0109 
    02162769 6e746572 6e616c2d 66772d68 6f6d652e 64656661 756c742e 646f6d61 
    696e2e69 6e76616c 6964301e 170d3134 31323238 32323231 33385a17 0d323431 
    32323532 32323133 385a3066 31193017 06035504 03131069 6e746572 6e616c2d 
    66772d68 6f6d6531 11300f06 03550403 13083130 2e312e31 2e313136 30340609 
    2a864886 f70d0109 02162769 6e746572 6e616c2d 66772d68 6f6d652e 64656661 
    756c742e 646f6d61 696e2e69 6e76616c 69643081 9f300d06 092a8648 86f70d01 
<--- More --->
              
    01010500 03818d00 30818902 81810084 0b7119f5 01187fa1 730cbefd 1154c6de 
    61f50fab cbc5ddf7 88f09c61 1b420c60 2a722f2c 68528ab9 379217b6 1bee2a39 
    15083a20 5f0c058e 9540b64b 3cb528da e0a9f84d 0aa91378 e7dd1234 06e83cb8 
    d9de6523 58bd5252 059508d8 6cec826b 3ca707ea 39bc9a59 909f7830 bf855bb4 
    1d092baa 639f37d9 d2d38f20 2c49db02 03010001 300d0609 2a864886 f70d0101 
    05050003 8181001b 519e6757 dfd094ca b9845095 6e419740 da0b0d81 1fa78221 
    de7b32bd b2dff5e9 e19181c0 44afe0ec f7952449 7d53fce5 ec9b497b 19ccd15c 
    1274b49d 7f615290 9c07c0be 7b737101 8f9a4384 c0ef780c dff68253 5170d664 
    9fe1889d f4e3e205 94d6b02c 7bea7b5d a281ebec 458eb83a fa02a619 343aba28 
    8466e0af c31cf6
  quit
crypto ikev2 enable outside
crypto ikev2 remote-access trustpoint ASDM_Launcher_Access_TrustPoint_2
telnet timeout 5
ssh stricthostkeycheck
ssh 10.1.1.0 255.255.255.0 inside
ssh 192.168.100.0 255.255.255.0 inside
ssh 71.190.152.162 255.255.255.255 outside
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0

dhcp-client client-id interface outside
<--- More --->
              
dhcpd address 10.1.1.2-10.1.1.12 inside
dhcpd dns 8.8.8.8 8.8.4.4 interface inside
dhcpd auto_config outside interface inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics port
threat-detection statistics protocol
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 206.246.122.250 source outside
ntp server 66.219.116.140 source outside
ntp server 165.193.126.229 source outside prefer
ssl trust-point ASDM_Launcher_Access_TrustPoint_2 inside vpnlb-ip
ssl trust-point ASDM_Launcher_Access_TrustPoint_2 inside
webvpn
 enable outside
 anyconnect image disk0:/anyconnect-win-3.1.05182-k9.pkg 1
 anyconnect enable
 tunnel-group-list enable
group-policy DfltGrpPolicy attributes
 dns-server value 8.8.4.4
 vpn-tunnel-protocol ikev2 ssl-client ssl-clientless
 default-domain value default.domain.invalid
<--- More --->
              
group-policy GroupPolicy_SSL-VPN internal
group-policy GroupPolicy_SSL-VPN attributes
 wins-server none
 dns-server value 8.8.4.4
 vpn-tunnel-protocol ssl-client 
 default-domain value default.domain.invalid
username e19262 password 4IOKIX/1luwaGA94 encrypted
username michael password 2THh7qjMF9mCrgtP encrypted privilege 15
tunnel-group SSL-VPN type remote-access
tunnel-group SSL-VPN general-attributes
 address-pool ANYCONNECT-POOL
 default-group-policy GroupPolicy_SSL-VPN
tunnel-group SSL-VPN webvpn-attributes
 group-alias SSL-VPN enable
!
!
prompt hostname priority 
no call-home reporting anonymous
call-home
 profile CiscoTAC-1
  no active
  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
  destination address email callhome@cisco.com
  destination transport-method http
<--- More --->
              
  subscribe-to-alert-group diagnostic
  subscribe-to-alert-group environment
  subscribe-to-alert-group inventory periodic monthly
  subscribe-to-alert-group configuration periodic monthly
  subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:2f078a53c55494e1ef7b8acc548962d2
: end

internal-fw-home/sec#                                   

Hi Michael,

Right now you have not applied split-tunneling. Right now the default route on your workstation will be pointing to appliance inside interface. (use "route print" command).

Your SSL-VPN group policy is pointing to external DNS (server dns-server value 8.8.4.4 on internet ). Presently you cannot reach DNS server as every traffic of your workstation is going via tunnel.

You need to configure split-tunneling, so that :

The default route points to physical adapter, and route to split network will point to VPN adapter.

 

But there should be a way to force all traffic through the tunnel including DNS queries.

If I do any kind of checking on what my external IP is it should be that of the ASA outside interface.

 

Or am I incorrect in this assumption.

Hi Michael,

When you don't configure split tunnel, route print will show two default routes:

First Pointing to your physical adapter and default GW configured on your adapter but having higher metric.

Second pointing to VPN Adapter interface and default gateway (one of the IP address from the pool, it assume as inside address of ASA) with lower metric.So it will be the only one used when Split tunnel is not configured.

 

When you configure split tunnel, you will get only one default route that will point to your physical adapter, whereas ASA inside address space (split tunnel subnet) will be reachable via VPN adapter.

Hope it will clear the doubt. Attached is the route print for above scenario

HI Michael,

Thanks for rating the post.

Please mark the answer as correct, if it resolved your issue, so that it can be helpful for others also.

 

Roman Mamontov
Level 1
Level 1

Good Day everyone,

 

I have similar problem too: I have AnyConnect (SMC 4.0.00051) VPN to ASA 9.2(3)4.

Now I see in AnyConnect SMC zero received bytes, but # sh vpn-sessiondb anyconnect show:

 

Assigned IP : 10.199.99.10 Public IP : X.X.X.X

Protocol : IKEv2 IPsecOverNatT AnyConnect-Parent

License : AnyConnect Premium

Encryption : IKEv2: (1)AES256 IPsecOverNatT: (1)AES256 AnyConnect-Parent: (1)none

Hashing : IKEv2: (1)SHA1 IPsecOverNatT: (1)SHA1 AnyConnect-Parent: (1)none

Bytes Tx : 55719 Bytes Rx : 371564

 

I don't see any dropped packets, related with AnyConnect in asp-drop all capture type. If I ping from AnyConnect SMC host after inside interface, I see these packets and reply packet to ASA in trace.

 

In ASA's route table I see static route to AnyConnect host:

S 10.199.99.10 255.255.255.255 [1/0] via my.default.gateway.1, outside

I check NAT statement, but as I understand, it look correctly:

# sh nat detail

Manual NAT Policies (Section 1)

...

...

12 (inside) to (outside) source static localnet localnet destination static remote_ikev2 remote_ikev2

translate_hits = 118, untranslate_hits = 118

Source - Origin: 192.168.70.0/24, Translated: 192.168.70.0/24

Destination - Origin: 10.199.99.0/24, Translated: 10.199.99.0/24

 

Auto NAT Policies (Section 2)

...

...

6 (inside) to (outside) source dynamic obj_any interface

translate_hits = 9636, untranslate_hits = 2695

Source - Origin: 0.0.0.0/0, Translated: my.outside.interface.IP/21

 

So, what I don't see any incoming bytes, receive control frames only?