10-23-2006 05:04 AM - edited 02-21-2020 02:40 PM
Hi all...
I have set up my asa accepting vpn clients in from outside... My clients get their adresses from a pool 192.168.22.0/24.
ip local pool VPN_CLIENT_POOL 192.168.22.1-192.168.22.255 mask 255.255.255.0
Then I have a net that are behind another router on the LAN side that I am trying to reach :
NorAlarm(config)# sh route
S 172.16.0.0 255.255.0.0 [1/0] via 10.0.2.10, inside
I am reaching that net from the asa :
NorAlarm(config)# ping 172.16.0.13
Sending 5, 100-byte ICMP Echos to 172.16.0.13, timeout is 2 seconds:
!!!!!
but from the vpn client I am not.. I do have a route back to the vpn client net from that inside router..
C:\Documents and Settings\jpe>ping 172.16.0.13
Pinger 172.16.0.13 med 32 byte data:
Foresp?rsel avbrutt.
Foresp?rsel avbrutt.
As you can see I am not getting there. I am not sure what I do wrong here. I got the route on the vpn client also :
172.16.0.0 255.255.255.0 192.168.22.2 192.168.22.2 1
I am reaching all the servers on the inside net from my vpn clients but not on that remote net on the inside of that net again..
net :
vpn client(192.168.22.0)---ASA---inside(10.0.2.0)---router--- 172.16.0.0
Anybody that can help me understand why I am not reaching that net..
nat (inside) 0 access-list NAT-0
nat (inside) 1 0.0.0.0 0.0.0.0
access-list NAT-0 extended permit ip 10.0.2.0 255.255.255.0 192.168.22.0 255.255.255.0
access-list NAT-0 extended permit ip 172.16.0.0 255.255.0.0 192.168.22.0 255.255.255.0
access-list SPLIT_TUNNEL extended permit ip 10.0.2.0 255.255.255.0 any
access-list SPLIT_TUNNEL extended permit ip 172.16.0.0 255.255.0.0 any
10-23-2006 07:50 AM
Hi Jenseike,
Have you not answered your own question ?
"I do have a route back to the vpn client net from that inside router.. "
Is there a route to 192.168.22.x on the inside router ?
10-23-2006 08:46 AM
yes, the route are there... routing is not the problem here...
10-23-2006 01:39 PM
cool, ok, next I'd check to see if the ASA's tunnel is working properly.... i.e. set up a packet capture on the ASA's inside interface, something like
access-list sniffer permit ip any any
capture testcap access-list sniffer interface inside
show capture testcap
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide