cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
986
Views
0
Helpful
2
Replies

VPN connects but unable to access resources on remote network

mstormzand
Level 1
Level 1

HI,

I'm able to ping the ASA interface once  the VPN is connected but unable to access any of the resources located on the remote network such as shares and computers. The cisco vpn client shows data being sent and recieved when I ping the interface on the ASA but it doesn't recieve any data when I attempt to ping or access other resources on the network. 

:

ASA Version 8.2(5)

!

hostname HOST_NAME

domain-name default.domain.invalid

names

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2

!

interface Ethernet0/3

speed 10

duplex half

!

interface Ethernet0/4

speed 100

duplex full

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

interface Vlan1

nameif inside

security-level 100

ip address 10.10.8.1 255.255.255.0

!

interface Vlan2

nameif outside

security-level 0

ip address 12.x.x.x x.x.x.x

!

boot system disk0:/asa825-k8.bin

ftp mode passive

dns domain-lookup inside

dns domain-lookup outside

dns server-group DefaultDNS

name-server 10.10.8.2

domain-name default.domain.invalid

same-security-traffic permit intra-interface

object-group service Vipre tcp

port-object range 18082 18082

port-object range 18086 18086

object-group network town

network-object 192.168.0.0 255.255.0.0

access-list outside_20_cryptomap extended permit ip 10.10.8.0 255.255.255.0 192.168.0.0 255.255.252.0

access-list new extended permit ip host 192.168.0.1 any

access-list new extended permit ip any host 192.168.0.1

access-list outside_20_cryptomap_1 extended permit ip 10.10.8.0 255.255.255.0 192.168.0.0 255.255.252.0

access-list townoffice_splitTunnelAcl standard permit 10.10.8.0 255.255.255.0

access-list townremote_splitTunnelAcl standard permit 10.10.8.0 255.255.255.0

access-list outside_access_in extended permit tcp any interface outside object-group Vipre

access-list outside_access_in extended permit tcp any object-group Vipre interface inside object-group Vipre

access-list outside_access_in extended permit tcp any eq 3389 10.10.8.0 255.255.255.0 eq 3389

access-list test extended permit ip host 192.168.0.6 host 10.10.8.155

access-list test extended permit ip host 10.10.8.155 host 192.168.0.6

access-list test extended permit ip host 10.10.8.2 host 192.168.3.116

access-list test extended permit ip host 192.168.3.116 host 10.10.8.2

access-list test extended permit ip host 10.10.8.155 host 192.168.3.116

access-list bypass extended permit ip host 10.10.8.155 host 192.168.3.116

access-list bypass extended permit tcp 192.168.0.0 255.255.0.0 10.10.8.0 255.255.255.0

access-list bypass extended permit tcp 10.10.8.0 255.255.255.0 192.168.0.0 255.255.0.0

pager lines 24

logging enable

logging buffered debugging

logging asdm informational

mtu inside 1500

mtu outside 1500

ip local pool vpn 10.10.8.125-10.10.8.149 mask 255.255.255.0

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-522.bin

no asdm history enable

arp timeout 14400

global (inside) 1 interface

global (outside) 1 interface

nat (inside) 1 192.168.0.0 255.255.0.0

nat (inside) 1 0.0.0.0 0.0.0.0

static (inside,outside) tcp interface 18082 10.10.8.2 18082 netmask 255.255.255.255

static (inside,outside) tcp interface 18086 10.10.8.2 18086 netmask 255.255.255.255

static (inside,outside) tcp interface 3389 10.10.8.2 3389 netmask 255.255.255.255

static (inside,inside) 192.168.0.0 192.168.0.0 netmask 255.255.0.0

static (inside,inside) 10.10.8.0 10.10.8.0 netmask 255.255.255.0

access-group outside_access_in in interface outside

route outside 0.0.0.0 0.0.0.0 12.70.119.65 1

route inside 192.168.0.0 255.255.0.0 10.10.8.250 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

timeout floating-conn 0:00:00

dynamic-access-policy-record DfltAccessPolicy

aaa authentication ssh console LOCAL

aaa authentication telnet console LOCAL

http server enable

http  outside

http  outside

http  inside

http  outside

http inside

http  outside

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

sysopt noproxyarp inside

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto dynamic-map outside_dyn_map 20 set pfs

crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA

crypto dynamic-map outside_dyn_map 40 set pfs

crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA

crypto dynamic-map outside_dyn_map 60 set pfs

crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA

crypto dynamic-map outside_dyn_map 80 set pfs

crypto dynamic-map outside_dyn_map 80 set transform-set ESP-3DES-SHA

crypto dynamic-map outside_dyn_map 100 set pfs

crypto dynamic-map outside_dyn_map 100 set transform-set ESP-3DES-SHA

crypto map outside_map 20 match address outside_20_cryptomap_1

crypto map outside_map 20 set pfs

crypto map outside_map 20 set peer 69.87.150.118

crypto map outside_map 20 set transform-set ESP-3DES-SHA ESP-3DES-MD5

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

crypto isakmp enable outside

crypto isakmp policy 10

authentication pre-share

encryption 3des

hash md5

group 2

lifetime 86400

crypto isakmp policy 30

authentication pre-share

encryption 3des

hash sha

group 2

lifetime 86400

crypto isakmp nat-traversal 30

telnet 10.10.8.0 255.255.255.0 inside

telnet timeout 5

ssh 63.161.207.0 255.255.255.0 outside

ssh timeout 5

console timeout 0

dhcpd dns 10.8.8.2

!

dhcpd address 10.10.8.150-10.10.8.200 inside

dhcpd dns 10.10.8.2 interface inside

!

threat-detection basic-threat

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

group-policy aaa internal

group-policy aaa attributes

dns-server value 10.10.8.2 4.2.2.2

vpn-tunnel-protocol IPSec

default-domain value domainname

group-policy bbb internal

group-policy bbb attributes

wins-server value 10.10.8.2

dns-server value 10.10.8.2

vpn-tunnel-protocol IPSec l2tp-ipsec

split-tunnel-policy tunnelall

split-tunnel-network-list value townoffice_splitTunnelAcl

default-domain value domainname.local

group-policy townremote internal

group-policy townremote attributes

wins-server value 10.10.8.2

dns-server value 10.10.8.2 4.2.2.2

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value townremote_splitTunnelAcl

default-domain value domainanme

group-policy remote internal

group-policy remote attributes

wins-server value 10.10.8.2

dns-server value 10.10.8.2

vpn-tunnel-protocol IPSec

split-tunnel-policy tunnelspecified

split-tunnel-network-list value townremote_splitTunnelAcl

default-domain value dksecurity.local

address-pools value vpn

username xxxx password . encrypted privilege 15

username xxxx attributes

vpn-group-policy dksecurityremote

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy dksecurityremote

username xxxx password . encrypted privilege 15

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy dksecurityremote

username xxx password  encrypted privilege 15

username xxxx attributes

vpn-group-policy dksecurityremote

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy dksecurityremote

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy dksecurityremote

username xxx password  encrypted privilege 15

username xxx password  encrypted privilege 15

username xxxx attributes

vpn-group-policy remote

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy remote

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy remote

username xxxx password  encrypted privilege 15

username xxx password  encrypted privilege 15

username xxx attributes

vpn-group-policy remote

tunnel-group 69.87.150.118 type ipsec-l2l

tunnel-group 69.87.150.118 ipsec-attributes

pre-shared-key *****

tunnel-group remote type remote-access

tunnel-group remote general-attributes

address-pool vpn

default-group-policy townremote

tunnel-group townremote ipsec-attributes

pre-shared-key *****

isakmp keepalive disable

tunnel-group townremote type remote-access

tunnel-group townremote general-attributes

address-pool vpn

default-group-policy townremote

tunnel-group lansingremote ipsec-attributes

pre-shared-key *****

!

class-map tcp-bypass

match access-list bypass

class-map test

match access-list new

class-map inspection_default

match default-inspection-traffic

!

!

policy-map type inspect dns preset_dns_map

parameters

  message-length maximum 512

  no dns-guard

  no protocol-enforcement

  no nat-rewrite

policy-map global_policy

class test

class inspection_default

policy-map tcp

class tcp-bypass

  set connection random-sequence-number disable

  set connection advanced-options tcp-state-bypass

!

service-policy global_policy global

service-policy tcp interface inside

prompt hostname context

call-home reporting anonymous prompt 2

call-home

profile CiscoTAC-1

  no active

  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService

  destination address email callhome@cisco.com

  destination transport-method http

  subscribe-to-alert-group diagnostic

  subscribe-to-alert-group environment

  subscribe-to-alert-group inventory periodic monthly

  subscribe-to-alert-group configuration periodic monthly

  subscribe-to-alert-group telemetry periodic daily

Cryptochecksum:c724d6744097760d94a7dcc79c39568a

: end

2 Replies 2

andrew.prince
Level 10
Level 10

You need to change the VPN pool ip subnet to something other than the same ip range used on the inside interface.

Sent from Cisco Technical Support iPad App

Made the changes to the VPN DHCP pool so now instead of 10.10.8.125-149 it is now 192.168.8.125-192.168.8.149 but is still displaying the same behavior.