cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1017
Views
0
Helpful
1
Replies

spilt tunnel problem

Jie Lu
Level 1
Level 1

Hello, everybody. I have issue about spilt tunnel of ezvpn client. My customer's branch site is connected to ASA 5510 with a router that is configured as a hardware client, the mode is network extension. The branch site have 2 networks, 142.10.64.0/24 is the local lan and 192.168.1.0/24 is the server and is configured spilt tunnel to let client to visit. when the remote users login with the client software, the client software have received two spilt tunnels. when I ping from the client to any network of the branch site, it can be done. But I can't use as the source of the server network in branch site ping the client. The local lan can. I wanna know that does only one tunnel active in the client? Here is my ASA configuration:

WB-VPNSer-5510# sh run

: Saved

:

ASA Version 8.4(1)

!

hostname WB-VPNSer-5510

enable password 2KFQnbNIdI.2KYOU encrypted

passwd 2KFQnbNIdI.2KYOU encrypted

names

!

interface Ethernet0/0

nameif outside

security-level 0

ip address 222.216.28.135 255.255.255.128

!

interface Ethernet0/1

shutdown

nameif inside

security-level 100

no ip address

!

interface Ethernet0/2

shutdown

no nameif

no security-level

no ip address

!            

interface Ethernet0/3

shutdown

no nameif

no security-level

no ip address

!

interface Management0/0

shutdown

no nameif

no security-level

no ip address

!

ftp mode passive

dns domain-lookup outside

same-security-traffic permit inter-interface

same-security-traffic permit intra-interface

object-group service DM_INLINE_SERVICE_1

service-object esp

service-object udp destination eq isakmp

access-list internet extended permit object-group DM_INLINE_SERVICE_1 any any

access-list internet extended permit ip any any

access-list ezvpn_splitTunnelAcl standard permit 142.10.64.0 255.255.255.0

access-list ezvpn_splitTunnelAcl standard permit 192.168.1.0 255.255.255.0

access-list ezvpn_splitTunnelAcl standard permit 172.16.1.0 255.255.255.0

access-list remote_splitTunnelAcl standard permit 172.16.1.0 255.255.255.0

pager lines 24

mtu outside 1500

mtu inside 1500

ip local pool client 172.16.1.100-172.16.1.199 mask 255.255.255.0

icmp unreachable rate-limit 1 burst-size 1

icmp permit any outside

icmp permit any echo-reply outside

asdm image disk0:/asdm-641.bin

no asdm history enable

arp timeout 14400

access-group internet global

route outside 0.0.0.0 0.0.0.0 222.216.28.129 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication ssh console LOCAL

http server enable

http 0.0.0.0 0.0.0.0 outside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec ikev1 transform-set remote esp-3des esp-md5-hmac

crypto dynamic-map remote 1 set ikev1 transform-set remote

crypto dynamic-map remote 1 set reverse-route

crypto map remote 1 ipsec-isakmp dynamic remote

crypto map remote interface outside

crypto ikev1 enable outside

crypto ikev1 policy 10

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

telnet timeout 5

ssh 0.0.0.0 0.0.0.0 outside

ssh timeout 5

console timeout 0

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

ssl encryption rc4-sha1

webvpn

group-policy DfltGrpPolicy attributes

dns-server value 192.168.1.230

split-tunnel-policy tunnelspecified

group-policy remote internal

group-policy remote attributes

vpn-tunnel-protocol ikev1 l2tp-ipsec

password-storage enable

split-tunnel-policy tunnelspecified

split-tunnel-network-list value remote_splitTunnelAcl

nem enable

group-policy ezvpn internal

group-policy ezvpn attributes

vpn-tunnel-protocol ikev1 l2tp-ipsec

password-storage enable

split-tunnel-policy tunnelspecified

split-tunnel-network-list value ezvpn_splitTunnelAcl

username admin password lxHIQV3npwOuCcNf encrypted privilege 15

username wbzy_test001 password FW08MdHWVfpdRSQU encrypted

username wbzy_test001 attributes

service-type remote-access

username cisco password ffIRPGpDSOJh9YLq encrypted

username cisco attributes

service-type remote-access

tunnel-group remote type remote-access

tunnel-group remote general-attributes

authentication-server-group (outside) LOCAL

default-group-policy remote

tunnel-group remote ipsec-attributes

ikev1 pre-shared-key *****

tunnel-group ezvpn type remote-access

tunnel-group ezvpn general-attributes

address-pool client

authentication-server-group (outside) LOCAL

default-group-policy ezvpn

tunnel-group ezvpn ipsec-attributes

ikev1 pre-shared-key *****

!

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum 512

policy-map global_policy

class inspection_default

  inspect dns preset_dns_map

  inspect ftp

  inspect h323 h225

  inspect h323 ras

  inspect netbios

  inspect rsh

  inspect rtsp

  inspect skinny 

  inspect esmtp

  inspect sqlnet

  inspect sunrpc

  inspect tftp

  inspect sip 

  inspect xdmcp

  inspect ip-options

  inspect icmp

!

service-policy global_policy global

prompt hostname context

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:df94a153b5f856c07a09255ef947fc9d

: end

and here is the ipsec sa in asa:

   WB-VPNSer-5510# sh crypto ipsec sa

interface: outside

    Crypto map tag: remote, seq num: 1, local addr: 222.216.28.135

      local ident (addr/mask/prot/port): (142.10.64.0/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (172.16.1.100/255.255.255.255/0/0)

      current_peer: 121.31.246.33, username: cisco

      dynamic allocated peer ip: 172.16.1.100

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 222.216.28.135/4500, remote crypto endpt.: 121.31.246.33/13965

      path mtu 1500, ipsec overhead 66, media mtu 1500

      current outbound spi: 04F34E76

      current inbound spi : 19577A26

    inbound esp sas:

      spi: 0x19577A26 (425163302)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 20480, crypto-map: remote

         sa timing: remaining key lifetime (sec): 3593

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    outbound esp sas:

      spi: 0x04F34E76 (83054198)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 20480, crypto-map: remote

         sa timing: remaining key lifetime (sec): 3593

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    Crypto map tag: remote, seq num: 1, local addr: 222.216.28.135

      local ident (addr/mask/prot/port): (172.16.1.0/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (172.16.1.100/255.255.255.255/0/0)

      current_peer: 121.31.246.33, username: cisco

      dynamic allocated peer ip: 172.16.1.100

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

      #pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 222.216.28.135/4500, remote crypto endpt.: 121.31.246.33/13965

      path mtu 1500, ipsec overhead 66, media mtu 1500

      current outbound spi: 0326A0D8

      current inbound spi : 08C3450E

    inbound esp sas:

      spi: 0x08C3450E (147014926)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 20480, crypto-map: remote

         sa timing: remaining key lifetime (sec): 3593

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x0000003F

    outbound esp sas:

      spi: 0x0326A0D8 (52863192)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 20480, crypto-map: remote

         sa timing: remaining key lifetime (sec): 3593

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    Crypto map tag: remote, seq num: 1, local addr: 222.216.28.135

      local ident (addr/mask/prot/port): (172.16.1.0/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (142.100.66.254/255.255.255.255/0/0)

      current_peer: 222.216.165.196, username: cisco

      dynamic allocated peer ip: 0.0.0.0

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 222.216.28.135/4500, remote crypto endpt.: 222.216.165.196/18337

      path mtu 1500, ipsec overhead 66, media mtu 1500

      current outbound spi: BBEAB755

      current inbound spi : 2C11BB75

    inbound esp sas:

      spi: 0x2C11BB75 (739359605)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28605

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    outbound esp sas:

      spi: 0xBBEAB755 (3152721749)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28605

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    Crypto map tag: remote, seq num: 1, local addr: 222.216.28.135

      local ident (addr/mask/prot/port): (172.16.1.0/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (142.10.64.0/255.255.255.0/0/0)

      current_peer: 222.216.165.196, username: cisco

      dynamic allocated peer ip: 0.0.0.0

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

      #pkts decaps: 10, #pkts decrypt: 10, #pkts verify: 10

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 222.216.28.135/4500, remote crypto endpt.: 222.216.165.196/18337

      path mtu 1500, ipsec overhead 66, media mtu 1500

      current outbound spi: B8CCEDAC

      current inbound spi : 216E0166

    inbound esp sas:

      spi: 0x216E0166 (560857446)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28603

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x000007FF

    outbound esp sas:

      spi: 0xB8CCEDAC (3100437932)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28603

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    Crypto map tag: remote, seq num: 1, local addr: 222.216.28.135

      local ident (addr/mask/prot/port): (172.16.1.0/255.255.255.0/0/0)

      remote ident (addr/mask/prot/port): (192.168.1.0/255.255.255.0/0/0)

      current_peer: 222.216.165.196, username: cisco

      dynamic allocated peer ip: 0.0.0.0

      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0

      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0

      #pkts compressed: 0, #pkts decompressed: 0

      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0

      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0

      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0

      #send errors: 0, #recv errors: 0

      local crypto endpt.: 222.216.28.135/4500, remote crypto endpt.: 222.216.165.196/18337

      path mtu 1500, ipsec overhead 66, media mtu 1500

      current outbound spi: 06769CF1

      current inbound spi : 78E0C604

    inbound esp sas:

      spi: 0x78E0C604 (2027996676)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28602

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

    outbound esp sas:

      spi: 0x06769CF1 (108436721)

         transform: esp-3des esp-md5-hmac no compression

         in use settings ={RA, Tunnel,  NAT-T-Encaps, }

         slot: 0, conn_id: 12288, crypto-map: remote

         sa timing: remaining key lifetime (sec): 28601

         IV size: 8 bytes

         replay detection support: Y

         Anti replay bitmap:

          0x00000000 0x00000001

1 Reply 1

amohabir1
Level 1
Level 1

How are those subnets set up at your customer site? Where do they terminate? Can you provide a diagram of what it looks like?