cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
979
Views
2
Helpful
9
Replies

Cisco ASA and anyconnect

Vasiliy P
Level 1
Level 1

Hello, we can't figure out what's wrong. We haven't been able to beat this for 2 weeks now. Help.
We have configured AnyConnect VPN Client Connections, but we encountered a problem:
When the client connects to AnyConnect VPN Client Connections, the client cannot work with the local network. It cannot ping gateways. It also cannot ping local machines and connect via RDP protocol. When connecting pass when pinging 1-1 packets - then interruption. No response
But all routes and ipaddresses from the pool come.
On the diagram we have shown the topology of our network and client connection via AnyConnect VPN Client Connections.
We have also provided logs and configuration of cisco asa.

VasiliyP_1-1708512223996.png

Config

 

webvpn
enable ANYCONNECT
http-headers
hsts-server
enable
max-age 31536000
include-sub-domains
no preload
hsts-client
enable
x-content-type-options
x-xss-protection
content-security-policy
anyconnect image disk0:/anyconnect-win-4.10.08025-webdeploy-k9.pkg 1 regex "Windows NT"
anyconnect image disk0:/anyconnect-linux64-4.10.08025-webdeploy-k9.pkg 2 regex "Linux"
anyconnect image disk0:/anyconnect-macos-4.10.08025-webdeploy-k9.pkg 3
anyconnect profiles CONNECT-I_LAN_client_profile disk0:/CONNECT-I_LAN_client_profile.xml
anyconnect enable
tunnel-group-list enable
cache
disable
error-recovery disable

ip local pool POOL-LOC-I 10.17.1.1-10.17.1.100 mask 255.255.252.0


tunnel-group CONNECT-I_LAN type remote-access
tunnel-group CONNECT-I_LAN general-attributes
address-pool POOL-LOC-I
default-group-policy GroupPolicy_CONNECT-I_LAN
tunnel-group CONNECT-I_LAN webvpn-attributes
group-alias CONNECT-I_LAN enable


group-policy GroupPolicy_CONNECT-I_LAN internal
group-policy GroupPolicy_CONNECT-I_LAN attributes
wins-server none
dns-server value 10.17.1.254
vpn-tunnel-protocol ikev2 ssl-client
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SPLIT_CONNECT-I
default-domain value magvatech.com
split-tunnel-all-dns disable
webvpn
anyconnect profiles value CONNECT-I_LAN_client_profile type user


route ANYCONNECT 0.0.0.0 0.0.0.0 95.70.236.224 5

access-list SPLIT_CONNECT-I remark LOC-I
access-list SPLIT_CONNECT-I standard permit 10.17.0.0 255.255.252.0

interface Ethernet1/1
no switchport
no nameif
no security-level
no ip address
!
interface Ethernet1/1.201
description ANYCONNECT
vlan 201
nameif ANYCONNECT
security-level 0
ip address 95.70.236.225 255.255.255.254

interface Ethernet1/3
no switchport
nameif LOC-LAN
security-level 100
ip address 10.17.1.253 255.255.252.0

VasiliyP_2-1708512313770.png

VasiliyP_3-1708512325697.pngVasiliyP_4-1708512348714.png

 

 

 

 

 

 

 

 

 

 

2 Accepted Solutions

Accepted Solutions

@Vasiliy P do you have a NAT exemption rule to ensure the RAVPN traffic is not unintentially translated? Example below (change objects LAN/RAVPN to reflect your networks):-

nat (LOC-LAN,ANYCONNECT) source static LAN LAN destination static RAVPN RAVPN

Also create your VPN IP pool (POOL-LOC-I) from a network that is separate from the internal LAN network - as in not within 10.17.0.0/22

View solution in original post

I use smart phone so I missing see vpn pool it indeed overlapping with Inside subnet 

Thanks

Have  a nice day 

MHM

View solution in original post

9 Replies 9

can more elaborate about anyconnect interface ?

MHM

Vasiliy P
Level 1
Level 1

interface Ethernet1/1
no switchport
no nameif
no security-level
no ip address
!
interface Ethernet1/1.201
description ANYCONNECT
vlan 201
nameif ANYCONNECT
security-level 0
ip address 95.70.236.225 255.255.255.254

VasiliyP_0-1708514839720.png

 

I use smart phone so I missing see vpn pool it indeed overlapping with Inside subnet 

Thanks

Have  a nice day 

MHM

@Vasiliy P do you have a NAT exemption rule to ensure the RAVPN traffic is not unintentially translated? Example below (change objects LAN/RAVPN to reflect your networks):-

nat (LOC-LAN,ANYCONNECT) source static LAN LAN destination static RAVPN RAVPN

Also create your VPN IP pool (POOL-LOC-I) from a network that is separate from the internal LAN network - as in not within 10.17.0.0/22

Vasiliy P
Level 1
Level 1

Changed the ip pool, which does not overlap with the LAN.
I made NAT and added routes with border router, immediately ping to the LAN worked, also RDP worked.
But the only thing I cannot ping ASA itself from the client AnyConnect. Otherwise, everything worked.
Thank you very much.

@Vasiliy P what IP address of the ASA are you pinging?

You may need to permit ICMP "icmp permit host x.x.x.x <interface>" you can use the "management-access <interfacename>" that will allow you to ping to an ASA interface when connect to a VPN.

ASA address 10.17.1.253
From the LOC-LAN interface ip 10.17.0.106/22 I am pinging ASA ip 10.17.1.253/22
But when I connect via Annyconnect and get an ip from the pool e.g. 10.17.16.10/24.
I ping everything except the ASA itself.
In ASA I have written as you recommended
icmp permit host 10.17.16.10 ANYCONNECT
management-access ANYCONNECT
But the ping does not pass these hosts to each other
10.17.1.253/22 cannot ping 10.17.16.10/24
10.17.16.10/24 cannot ping 10.17.1.253/22

@Vasiliy P The management_interface specifies the name of the management interface that you want to access when entering the ASA from another interface.

management-access LOC-LAN

https://www.cisco.com/c/en/us/td/docs/security/asa/asa92/configuration/general/asa-general-cli/admin-management.pdf

 

""From the LOC-LAN interface ip 10.17.0.106/22 I am pinging ASA ip 10.17.1.253/22""
you change the Pool Subnet but still there is conflict between Anyconnect Pool and Loc-LAN 
both use same 10.17.0.0/22 network-ID

VasiliyP_1-1708512223996.png