08-19-2014 04:40 AM
Hi,
I want to configure Easy vpn on ASA 5515-X firewall IOS version 9.1 and I don't want to use asdm.
Please let me know the configuration. Thanks.
Solved! Go to Solution.
08-22-2014 12:24 AM
I have applied nat-traversal command but still not working.
Is there any access-list required to permit vpn traffic from outdside interface to inside interface?
Is it necessary my LAN users default-gateway should be inside interface of firewall?
08-22-2014 12:24 AM
08-22-2014 02:34 AM
Please check the output below and screen shot of VPN client window is attached. I also observe that packets are only encrypting but not decrypting. There is some issue in return path.
sh vpn-sessiondb detail ra-ikev1-ipsec
Session Type: IKEv1 IPsec Detailed
Username : vpn Index : 37
Assigned IP : 192.168.50.100 Public IP : 202.59.94.141
Protocol : IKEv1 IPsecOverNatT
License : Other VPN
Encryption : IKEv1: (1)AES256 IPsecOverNatT: (1)AES128
Hashing : IKEv1: (1)SHA1 IPsecOverNatT: (1)SHA1
Bytes Tx : 0 Bytes Rx : 0
Pkts Tx : 0 Pkts Rx : 0
Pkts Tx Drop : 0 Pkts Rx Drop : 0
Group Policy : RAS-MEDIA Tunnel Group : RAS-MEDIA
Login Time : 13:09:50 UTC Fri Aug 22 2014
Duration : 0h:03m:03s
Inactivity : 0h:00m:00s
NAC Result : Unknown
VLAN Mapping : N/A VLAN : none
IKEv1 Tunnels: 1
IPsecOverNatT Tunnels: 1
IKEv1:
Tunnel ID : 37.1
UDP Src Port : 49885 UDP Dst Port : 4500
IKE Neg Mode : Aggressive Auth Mode : preSharedKeys
Encryption : AES256 Hashing : SHA1
Rekey Int (T): 86400 Seconds Rekey Left(T): 86274 Seconds
D/H Group : 2
Filter Name :
Client OS : WinNT Client OS Ver: 5.0.07.0410
IPsecOverNatT:
Tunnel ID : 37.2
Local Addr : 0.0.0.0/0.0.0.0/0/0
Remote Addr : 192.168.50.100/255.255.255.255/0/0
Encryption : AES128 Hashing : SHA1
Encapsulation: Tunnel
Rekey Int (T): 28800 Seconds Rekey Left(T): 28670 Seconds
Idle Time Out: 30 Minutes Idle TO Left : 27 Minutes
Bytes Tx : 0 Bytes Rx : 0
Pkts Tx : 0 Pkts Rx : 0
NAC:
Reval Int (T): 0 Seconds Reval Left(T): 0 Seconds
SQ Int (T) : 0 Seconds EoU Age(T) : 130 Seconds
08-22-2014 05:00 AM
Hello
Any update on it?
08-22-2014 02:45 PM
The traffic doesn't get to your ASA, so I would look for problems on the local PC.
08-25-2014 01:10 AM
It works only when I assign vpn remote users same IP address pool as for LAN.
I have re installed VPN client and check on other PC too but same problem.
I am using Cisco VPN client version vpnclient-win-msi-5.0.07.0410-k9 and Windows 7 Ultimate 1 service pack 1
VPN client shows LAN IP pool as secured routes. Please check in attached screen shots
08-25-2014 02:12 AM
In the previous screenshot the received/decrypted packets were 0, in this screenshot there are received packets which looks good. In exactly the same situation how do the contours on the ASA look like? (sh vpn-sessiondb detail ra-ikev1-ipsec)
Do you have an internal system where you can capture packets? Or a cisco catalyst? On that device you could do a "debug ip icmp" and then ping that switch from the VPN-client. It should show the ping-packets.
08-25-2014 03:40 AM
I have identified the issue, it is with following command;
split-tunnel-policy tunnelspecified
When I used this command internet works while connected with VPN but Local LAN does not work and when I use "split-tunnel-policy excludespecified" Local LAN works and internet does not works
How to make both Local LAN and internet work at the same time?
08-25-2014 04:40 AM
no its not working actually. It is for remote user side Local LAN access
08-25-2014 05:07 AM
Its working for Cisco Switch but not able to ping any machine. You can see logs
from debug ip icmp below
00:23:27: ICMP: echo reply sent, src 172.20.58.250, dst 192.168.50.101
00:23:28: ICMP: echo reply sent, src 172.20.58.250, dst 192.168.50.101
00:23:29: ICMP: echo reply sent, src 172.20.58.250, dst 192.168.50.101
00:23:30: ICMP: echo reply sent, src 172.20.58.250, dst 192.168.50.101
08-25-2014 05:23 AM
That shows that the VPN is working. Troubleshoot the machines that are not accessible. Windows-Firewall or something like that?
08-25-2014 05:28 AM
yup, after making machine gateway inside interface IP of firewall its working on one machine, I am also unable to access or ping inside interface of firewall using vpn. How it is possible to access firewall using VPN?
08-25-2014 05:31 AM
> How it is possible to access firewall using VPN?
management-access inside
"08-25-2014 11:41 AM
One last question. If my internal LAN users has some other gateway not inside interface of ASA Firewall, how they will reachable from VPN?
I can access cisco switches without gateway but on desktop machines works only when inside interface of firewall is used. as a gateway.
08-26-2014 02:57 AM
In general, each system should have a valid gateway that knows how to reach all your networks. If a different gateway is used for a particular system, that router needs a route for your VPN-pool pointing to the ASA.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
> Is there any access-list required to permit vpn traffic from outdside interface to inside interface?