10-25-2006 08:27 AM - edited 02-21-2020 02:41 PM
I have set up a remote access VPN between a Cisco ASA 5510 and a remote access client. The VPN successfully connects, but no network traffic is able to be passed. I have attached my configuration. Any help would be greatly appreciated.
Solved! Go to Solution.
10-30-2006 07:06 PM
Mike,
Glad to know that your issue is resolved.
If you dont mind, could you update the Forum saying that the answers provided resolved your issue, so others can benefit by looking at the answers.
Thanks,
Arul
10-25-2006 09:01 AM
Mike,
Your access-list for Inside_nat0_outbound, should be
access-list Inside_nat0_outbound extended permit ip 172.16.1.0 255.255.255.0 10.0.0.0 255.255.255.0
Let me know if it helps.
Regards,
Arul
10-25-2006 01:29 PM
Thanks for the reply Arul,
I made that change, but the symptom remains the same, VPN connects but no traffic. Any other ideas?
Mike
10-25-2006 05:52 PM
Mike,
What is the IP Address that you are trying to access after establishing the tunnel.
Also, did you do a clear xlate after changing the nat 0 access-list. If you are still having issues, could you post the output of "show crypto ipsec sa" once the tunnel is established and you try to access the internal hosts.
Regards,
Arul
10-26-2006 07:39 AM
I have tried to access 172.16.1.2 via ping, 172.16.1.51\cdrive, a shared resource. I have also tried to access the same resources using the 10.0.0.0 ip scheme. No luck. I did do a clear xlate after changing the access-list. I have attached the output for "show crypto ipsec sa" after attempting to access the hosts. (I have x'ed the public ips).
10-26-2006 06:55 PM
Mike,
Looking at the IPSEC SA, the IPSEC packets are not even making it to the ASA.
What is the internet gateway @ the location from where you are doing this testing and is your PC IP Address getting a Static Public IP Address when traffic is destined to the internet or is it Port Address Translated.
And also, what option are you using to connect to the VPN Server. Is it IPSEC, IPSEC Over UDP or IPSEC Over TCP.
If you are using IPSEC, then UDP Port 500 and Protocol 50 (ESP) are used to build the tunnel and encrypt the packets. So, if your office is set up for PATing your IP, then this set up will not work. Since Port Address Translation does not understand Protocol and your IPSEC packets will get dropped at the PATing Device.
Also, look at the statistics under VPN Client and see if the packets are getting encrypted. If you see encrypted packets counters getting increased, then you know that the encrypted packets are leaving the PC but getting dropped somewhere in between the VPN Client and ASA.
I hope it helps.
Regards,
Arul
10-30-2006 02:47 PM
Arul,
Thanks for the info. You are correct. The issue was that I was PATing my IP and therefore needed to add one more command to my configuration as follows:
isakmp nat-traversal 20
This is now allowing the traffic to pass over the PAT.
Thanks for all the help.
Mike
10-30-2006 07:06 PM
Mike,
Glad to know that your issue is resolved.
If you dont mind, could you update the Forum saying that the answers provided resolved your issue, so others can benefit by looking at the answers.
Thanks,
Arul
10-26-2006 01:53 AM
I've been looking at ASA Dialup VPNs for over a week now, used Netscreens before - much nicer.
What messages are you getting in the ASDM log?
These are usually a good place to start.
Dean
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide