01-23-2013 09:43 AM
Hello all,
I have the following config below on my ASA5505, where I want to be able to access remote computers who are VPN'd into the inside network, for support purposes.
I want to be able to ping the VPN ip from the LAN, and be able to connect to these computers via the VPN ip.
Any insight will be much appreciated, Many thanks!
ciscousa# sho run
: Saved
:
ASA Version 8.2(2)
!
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.2 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 18.7.1.5 255.255.255.248
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/3
speed 100
duplex full
!
ftp mode passive
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group network luxsci
access-list outside_in extended permit icmp any any
access-list split_tunnel standard permit 192.168.1.0 255.255.255.0
access-list inside_access_in extended permit ip any any
access-list outside_access_in extended permit ip any any
access-list nonat extended permit ip any 10.10.10.0 255.255.255.0
pager lines 24
logging enable
logging buffered debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu dmz 1500
ip local pool ipsec-vpn 10.10.10.1-10.10.10.20 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0
access-group inside_access_in in interface inside
access-group outside_in in interface outside
route outside 0.0.0.0 0.0.0.0 18.7.1.5 1
dynamic-access-policy-record DfltAccessPolicy
http server enable
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map internet-1_dyn_map 20 set transform-set ESP-3DES-SHA
crypto dynamic-map internet-1_dyn_map 20 set security-association lifetime seconds 28800
crypto dynamic-map internet-1_dyn_map 20 set security-association lifetime kilobytes 4608000
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime seconds 28800
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set security-association lifetime kilobytes 4608000
crypto map internet-1_map 65535 ipsec-isakmp dynamic internet-1_dyn_mapcrypto map internet-1_map interface outside
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAPcrypto map inside_map interface inside
crypto isakmp identity address
crypto isakmp enable inside
crypto isakmp enable outside
crypto isakmp policy 10
authentication …..
encryption ……
hash …..
group 1 ……
lifetime 86400
crypto isakmp nat-traversal 20
telnet timeout 5
ssh timeout 5
console timeout 0
management-access inside
dhcpd auto_config outside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl encryption rc4-sha1
webvpn
group-policy ipsec internal
group-policy ipsec attributes
split-tunnel-policy tunnelspecified
split-tunnel-network-list value split_tunnel
default-domain value company.com
tunnel-group ipsec type remote-access
tunnel-group ipsec general-attributes
address-pool ipsec-vpn
default-group-policy ipsec
tunnel-group ipsec ipsec-attributes
pre-shared-key *****
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global-policy
class inspection_default
inspect icmp
class class-default
!
Solved! Go to Solution.
01-23-2013 10:24 PM
Hi,
Do the clients have their firewalls enabled? Try disabling the firewall and see if you can connect to them.
Thanks,
Tarik Admani
*Please rate helpful posts*
01-23-2013 11:58 AM
Any help out there? Please?
01-23-2013 08:13 PM
Hello,
Can you share the logs of the ASA while you try to ping a VPN user ???
also do the following
capture capin interface inside match ip host inside_pc host vpn_client_pc
capture asp type asp-drop all circular-buffer
Then try to ping from that inside_pc ip to the vpn_client_pc ip and show the packets
and share
show cap capin
show cap asp | include vpn_client_pc
Regards
01-23-2013 09:13 PM
According to config provided, everything should work fine. Are you able to connect to LAN from ravpn clients?
01-23-2013 10:24 PM
Hi,
Do the clients have their firewalls enabled? Try disabling the firewall and see if you can connect to them.
Thanks,
Tarik Admani
*Please rate helpful posts*
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide