cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
353
Views
5
Helpful
4
Replies

No reply from VPN connection on ASA 5505 7.2(4)

eringuet
Level 1
Level 1

Hello,

I followed this guide to setup my vpn using the CLI:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008060f25c.shtml

My setup is pretty basic except that I use radius authentication.

Right now, I can connect, the authentication works, the split tunneling works, but I can't access the inside LAN. I see the packets go in but they can't get out. I've been looking around for a while I can't figure out how to permit the packets back on the tunnel.

trying a ftp connection:

My logs show:

Built inbound UDP connection 4460548 for outside:192.168.1.200/63414 (192.168.1.200/63414) to inside:srv-office1/53 (srv-office1/53) (user)

and then

Teardown UDP connection 4460451 for outside:192.168.1.200/53943 to inside:srv-office1/53 duration 0:02:08 bytes 245 (user)

If I packet trace 192.168.1.200 (vpn client) to 192.168.1.10 (srv-office1) with ftp it shows that flow is denied by configured rule.

The rule is inside

2 any any ip Deny Default Implicit rule

So I'm guessing I'm missing a rule somewhere...

Someone pointed me to

sysopt connection permit-vpn

but when I run sh run sysopt there is no output. Is it normal?

I attached parts of the configuration.

Regards,

4 Replies 4

andrew.prince
Level 10
Level 10

Etienne,

Try using a differnet IP subnet for the VPN access, say 192.168.2.0/24 and re-test.

Remember to also configure the layer 3 routing device (if you have one) with a static route for the new VPN subnet pointing to the ASA.

HTH>

Hello Etienne

access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.1.0 255.255.255.0

no access-list inside_nat0_outbound extended permit ip any 192.168.1.0 255.255.255.0

clear xlate

Will solve your issue, but as Andrew mentioned, using a pool in a different subnet is the best practise.

Regards

Alright,

I have it working now.

Here is what I did:

no ip local pool Local_IPs 192.168.1.0 ...

ip local pool Local_IPs 192.168.2.1-192.168.2.15 mask 255.255.255.240

access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.240

nat (inside) 0 access-list inside_nat0_outbound

And it works.

Thanks for the help!

np - glad to help.