06-20-2011 01:24 AM - edited 02-21-2020 05:24 PM
Hi,
Got a single asa 5505 configured in the office. we have 3 site to site vpn connections from this device, which all work from within the office.
Ive not setup my pc to connect from home to the asa via the ciso client.
i can connect to all LAN servers on the local subnet, however i cannot connect through the ASA to any of my site to site vpn's.
if i do an ipconfig on my home pc i can see my local ip, mask & gw, and i can see my assigned remote access ip & mask but no gw.
I cannot ping any remote site to site pc's by IP or name.
Any ideas on what im missing?
Many Thanks
Solved! Go to Solution.
06-22-2011 09:33 PM
The configuration on the ASA is correct, with one missing configuration line:
same-security-traffic permit intra-interface
This should resolve the issue.
06-20-2011 01:36 AM
To access all the site-to-site vpn, via remote access vpn client to 5505, the following is required:
ASA 5505:
1) If you have split tunnel configured for remote access vpn, you would need to include all the remote site-to-site LAN subnet as well in the split tunnel ACL.
2) Configure "same-security-traffic permit intra-interface"
3) On each of the crypto map towards the site-to-site vpn, you would need to include the respective crypto ACL as follows:
access-list
Each remote site-to-site vpn:
1) Crypto map towards the ASA5505, crypto ACL as follows:
access-list
2) NAT exemption access-list to include exemption between
Hope this helps.
06-20-2011 02:26 AM
Hi, Thanks for the response,
is there a way in the ASDM Gui to make the changes? im still very new to the cisco.
Many Thanks
06-20-2011 04:39 AM
Yes, you can make changes via ASDM as per my explaination above. It would be difficult to provide you with the step by step via ASDM.
If you can send a copy of "show run", i can give you the command line that you can enter.
BTW, do you also have access to the other end of the site-to-site vpn as you would need to make changes there as well.
06-22-2011 01:55 AM
Hi, heres a copy of my running config
: Saved : ASA Version 8.2(1) ! hostname ciscoasa domain-name synlog.co.uk enable password wN5U1JK95lCIofCc encrypted passwd 2KFQnbNIdI.2KYOU encrypted names name 10.48.106.0 scanw description scanw name 10.48.38.0 scap description scap name 10.48.106.2 NWCMS description SCANW_CMS name 10.48.106.3 NWDB description SCANW_DB name 10.48.106.4 NW_BK description SCANW_BK name 10.48.38.127 PrudhoDB description Prudhoe_DB name 10.48.38.135 PrudhoeBK description Prudhoe_BK name 10.48.38.131 PrudhoeCMS description Prudhoe_CMS name 10.250.37.0 Boston description Boston name 10.249.14.0 iLondon description iLondon ! interface Vlan1 nameif inside security-level 100 ip address 192.159.100.252 255.255.255.0 ! interface Vlan2 nameif outside security-level 0 ip address 212.2.16.213 255.255.255.240 ! interface Vlan5 nameif dmz security-level 50 ip address dhcp ! interface Ethernet0/0 switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7 ! ftp mode passive clock timezone GMT/BST 0 clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00 dns domain-lookup outside dns server-group DefaultDNS name-server 135.196.0.14 name-server 8.8.8.8 name-server 156.154.70.1 domain-name synlog.co.uk object-group network SCA description SCA S2S VPN network-object scanw 255.255.255.0 network-object scap 255.255.255.0 object-group protocol DM_INLINE_PROTOCOL_1 protocol-object ip protocol-object udp protocol-object tcp object-group protocol DM_INLINE_PROTOCOL_2 protocol-object ip protocol-object icmp protocol-object udp protocol-object tcp object-group service DM_INLINE_SERVICE_1 service-object icmp service-object tcp eq ftp service-object tcp service-object ip object-group network SCAVPN network-object host NWCMS network-object host NWDB network-object host NW_BK network-object host PrudhoDB network-object host PrudhoeCMS network-object host PrudhoeBK object-group service DM_INLINE_SERVICE_2 service-object ip service-object icmp service-object tcp-udp eq www service-object tcp eq sqlnet object-group protocol DM_INLINE_PROTOCOL_3 protocol-object ip protocol-object icmp protocol-object tcp object-group service DM_INLINE_SERVICE_3 service-object ip service-object icmp service-object tcp service-object tcp eq www service-object tcp eq sqlnet object-group service DM_INLINE_SERVICE_4 service-object ip service-object icmp service-object tcp service-object tcp eq www service-object tcp eq sqlnet access-list outside_access_in extended permit icmp any any access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_2 object-group SCAVPN 192.159.100.0 255.255.255.0 access-list outside_access_in extended permit object-group DM_INLINE_PROTOCOL_3 Boston 255.255.255.0 192.159.100.0 255.255.255.0 access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_4 iLondon 255.255.255.0 192.159.100.0 255.255.255.0 access-list inside_nat0_outbound extended permit ip any 192.159.100.128 255.255.255.224 access-list inside_nat0_outbound extended permit ip 192.159.100.0 255.255.255.0 object-group SCAVPN access-list inside_nat0_outbound extended permit ip 192.159.100.0 255.255.255.0 Boston 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.159.100.0 255.255.255.0 iLondon 255.255.255.0 access-list inside_nat0_outbound extended permit ip 192.159.100.0 255.255.255.0 192.159.100.128 255.255.255.224 access-list inside_nat0_outbound extended permit ip iLondon 255.255.255.0 192.159.100.128 255.255.255.224 access-list inside_nat0_outbound extended permit ip Boston 255.255.255.0 192.159.100.128 255.255.255.224 access-list outside_1_cryptomap extended permit ip 192.159.100.0 255.255.255.0 object-group SCAVPN access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 192.159.100.0 255.255.255.0 object-group SCAVPN access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 192.159.100.0 255.255.255.0 any access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 192.159.100.0 255.255.255.0 Boston 255.255.255.0 access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 192.159.100.0 255.255.255.0 iLondon 255.255.255.0 access-list outside_2_cryptomap extended permit ip 192.159.100.0 255.255.255.0 Boston 255.255.255.0 access-list outside_3_cryptomap extended permit ip 192.159.100.0 255.255.255.0 iLondon 255.255.255.0 access-list synvpn_cisco_splitTunnelAcl standard permit Boston 255.255.255.0 access-list synvpn_cisco_splitTunnelAcl standard permit iLondon 255.255.255.0 access-list synvpn_cisco_splitTunnelAcl standard permit 192.159.100.0 255.255.255.0 access-list DefaultRAGroup_splitTunnelAcl standard permit host NWDB access-list DefaultRAGroup_splitTunnelAcl standard permit 192.159.100.0 255.255.255.0 access-list DefaultRAGroup_splitTunnelAcl standard permit iLondon 255.255.255.0 access-list DefaultRAGroup_splitTunnelAcl standard permit Boston 255.255.255.0 access-list Synergyvpn_splitTunnelAcl standard permit iLondon 255.255.255.0 access-list Synergyvpn_splitTunnelAcl standard permit Boston 255.255.255.0 access-list Synergyvpn_splitTunnelAcl standard permit 192.159.100.0 255.255.255.0 pager lines 24 logging enable logging asdm-buffer-size 350 logging asdm debugging logging from-address cisco_asa@xxxx..co.uk logging recipient-address anish@xxxx.co.uk level errors logging ftp-bufferwrap logging ftp-server 192.159.100.187 \log ciscolog **** mtu inside 1500 mtu outside 1500 mtu dmz 1500 ip local pool VPN_IP_Pool 192.159.100.141-192.159.100.149 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 no asdm history enable arp timeout 14400 global (outside) 1 interface nat (inside) 0 access-list inside_nat0_outbound nat (inside) 1 0.0.0.0 0.0.0.0 access-group inside_access_in in interface inside access-group outside_access_in in interface outside route outside 0.0.0.0 0.0.0.0 212.xxx.xxx.211 1 timeout xlate 3:00:00 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 dynamic-access-policy-record DfltAccessPolicy http server enable http server idle-timeout 10 http 192.159.100.0 255.255.255.0 inside http 212.xxx.xxx.xx2 255.255.255.255 outside http 66.236.xxx.xxx 255.255.255.255 outside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac crypto ipsec security-association lifetime seconds 28800 crypto ipsec security-association lifetime kilobytes 4608000 crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 5 set pfs group1 crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 5 set transform-set TRANS_ESP_3DES_MD5 ESP-3DES-MD5 ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-DES-SHA ESP-DES-MD5 crypto map outside_map 1 match address outside_1_cryptomap crypto map outside_map 1 set pfs crypto map outside_map 1 set peer 193.xxx.xxx.3 crypto map outside_map 1 set transform-set ESP-3DES-MD5 crypto map outside_map 2 match address outside_2_cryptomap crypto map outside_map 2 set pfs crypto map outside_map 2 set peer 64.xxx.xxx.2 crypto map outside_map 2 set transform-set ESP-3DES-SHA crypto map outside_map 3 match address outside_3_cryptomap crypto map outside_map 3 set peer 89.xxx.xxx.2 crypto map outside_map 3 set transform-set ESP-3DES-SHA crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP crypto map outside_map interface outside crypto isakmp enable outside crypto isakmp policy 5 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400 crypto isakmp policy 10 authentication pre-share encryption 3des hash sha group 2 lifetime 86400 crypto isakmp policy 30 authentication pre-share encryption 3des hash md5 group 2 lifetime 28800 telnet timeout 5 ssh 66.xxx.xxx.46 255.255.255.255 outside ssh timeout 60 ssh version 2 console timeout 0 dhcpd auto_config outside ! dhcpd dns 192.159.100.201 192.159.100.204 interface inside ! threat-detection basic-threat threat-detection statistics port threat-detection statistics protocol threat-detection statistics access-list threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200 ntp server 135.196.68.97 source outside prefer ntp server 192.159.100.204 source inside prefer webvpn enable outside group-policy DefaultRAGroup internal group-policy DefaultRAGroup attributes wins-server value 192.159.100.204 192.159.100.201 dns-server value 192.159.100.204 192.159.100.201 vpn-tunnel-protocol IPSec l2tp-ipsec default-domain value synlog.co.uk group-policy DefaultRAGroup_1 internal group-policy DefaultRAGroup_1 attributes dns-server value 192.159.100.204 192.159.100.201 vpn-tunnel-protocol IPSec l2tp-ipsec split-tunnel-policy tunnelspecified split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl default-domain value synlog.co.uk group-policy Synergyvpn internal group-policy Synergyvpn attributes wins-server value 192.159.100.204 dns-server value 192.159.100.204 192.159.100.201 vpn-tunnel-protocol IPSec split-tunnel-policy tunnelspecified split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl default-domain value synlog.co.uk username afell001 password 8VrHWA45uBkqQfOIU8Pjqw== nt-encrypted privilege 0 username afell001 attributes vpn-group-policy DefaultRAGroup username amackan password 3YGN2gDYGpVslfyx/ZiNqQ== nt-encrypted privilege 0 username amackan attributes vpn-group-policy DefaultRAGroup username anish password 8+idUUQRIw6HW9nYjNetZg== nt-encrypted privilege 0 username anish attributes vpn-group-policy DefaultRAGroup_1 tunnel-group DefaultRAGroup general-attributes address-pool VPN_IP_Pool authorization-server-group LOCAL default-group-policy DefaultRAGroup_1 tunnel-group DefaultRAGroup ipsec-attributes pre-shared-key * isakmp keepalive disable tunnel-group DefaultRAGroup ppp-attributes authentication ms-chap-v2 tunnel-group 193.xxx.xxx.3 type ipsec-l2l tunnel-group 193.xxx.xxx.3 ipsec-attributes pre-shared-key * tunnel-group 64.xxx.xxx.2 type ipsec-l2l tunnel-group 64.xxx.xxx.2 ipsec-attributes pre-shared-key * tunnel-group 89.xxx.xxx.2 type ipsec-l2l tunnel-group 89.xxx.xxx.2 ipsec-attributes pre-shared-key * tunnel-group Synergyvpn type remote-access tunnel-group Synergyvpn general-attributes address-pool VPN_IP_Pool default-group-policy Synergyvpn tunnel-group Synergyvpn ipsec-attributes pre-shared-key * ! class-map inspection_default match default-inspection-traffic ! ! policy-map type inspect dns preset_dns_map parameters message-length maximum 512 policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp ! service-policy global_policy global smtp-server 192.159.100.199 prompt hostname context Cryptochecksum:b8f81a7ed53921bcec21cb0ee7652705 : end asdm location scap 255.255.255.0 inside asdm location scanw 255.255.255.0 inside asdm location PrudhoDB 255.255.255.255 inside asdm location PrudhoeCMS 255.255.255.255 inside asdm location PrudhoeBK 255.255.255.255 inside asdm location NWCMS 255.255.255.255 inside asdm location NWDB 255.255.255.255 inside asdm location NW_BK 255.255.255.255 inside asdm location iLondon 255.255.255.0 inside asdm location Boston 255.255.255.0 inside no asdm history enable
Many Thanks again.
06-22-2011 09:33 PM
The configuration on the ASA is correct, with one missing configuration line:
same-security-traffic permit intra-interface
This should resolve the issue.
06-23-2011 07:43 AM
Thanks, this is now working.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide