07-20-2007 01:00 PM - edited 02-21-2020 01:36 AM
Trying to connect a remote client using SSL VPN through web interface. When attempting to ping LAN side (192.168.1.2) through inside interface I am getting this in the log -
Deny icmp src inside:192.168.1.2 dst outside 192.168.50.1 (type 0,code 0) by access-group "inside_access_in" [0x0,0x0]
The VPN pool is using 192.168.50.0/24 and the inside LAN is 192.168.1.0/24. I am connecting to the WAN interface and the SSL VPN connects with no problem. Any suggestions?
Thanks,
Mike
07-20-2007 09:00 PM
Hi Mike
Could you post the config (minus any sensitive info).
The access-list inside_access_in is blocking the traffic. Is there an access-list on your inside interface.
Jon
07-22-2007 07:47 AM
Mike,
Like Jon said, if you could post the config. It will help out.
Also, can you do send the output of the following, if you cant post the config.
sh run sysopt
sh run nat
Thanks
Gilbert
07-23-2007 08:57 AM
07-23-2007 09:21 AM
If you were going to allow this traffic in the acl you need to write it like this, yours is backwards.
access-list inside_access_in extended permit icmp 192.168.1.0 255.255.255.0 192.168.50.0 255.255.255.0
The way you currently have your inside_access_in acl written, you are pretty much stopping all traffic originated from the inside. Is this what you want? I recommend removing the acl entirely.
Please rate helpful posts.
07-23-2007 12:55 PM
Thanks, that fixed the problem. I had to also create a rule on the access-list outside to let the traffic out to the VPN clients. Many thanks for your help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide