cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4194
Views
0
Helpful
4
Replies

Cisco ASA 5505 remote VPN access to local network

ciunetworks
Level 1
Level 1

I have Two ASA  5505's setup in a site to site VPN which works perfectly.  Now I also  need to have remote client VPN access with the Cisco VPN dialer to the  1st site.  I can get the VPN dialer to connect the the VPN and get a VPN  IP address, but I have no access to the remote network.  can someone  take a look and see what I am missing?  I have attached the ASA running  config.

1 Accepted Solution

Accepted Solutions

Apologize for the misunderstanding.

To access the 10.10.100.x subnet from remote vpn client, the vpn-filter ACL is the other way round.

Please kindly swap the following ACL:

FROM:

access-list outside_cryptomapVPN extended permit ip any 10.10.20.0 255.255.255.224

TO:

access-list outside_cryptomapVPN extended permit ip 10.10.20.0 255.255.255.224 any

Hope that helps.

View solution in original post

4 Replies 4

Jennifer Halim
Cisco Employee
Cisco Employee

The configuration hasn't included VPN access from remote VPN client towards the remote network via the site-to-site VPN.

There are a few things that need to be added/modified to this ASA as follows:

Add the following:

access-list outside_20_cryptomap extended permit ip 10.10.20.0 255.255.255.0 192.168.100.0 255.255.255.0

same-security-traffic permit intra-interface

access-list DSILREMOTE_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0

Modify the following:

no crypto map outside_map 10 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map 1000 ipsec-isakmp dynamic outside_dyn_map

VPN Client dynamic crypto map can't be on the lowest sequence number hence updating it from seq# of 10 to 1000.

On the remote ASA, you would need to also add the following:

1) Mirror image crypto ACL on the site-to-site VPN to include the above:

permit ip 192.168.100.0 255.255.255.0 10.10.20.0 255.255.255.0

2) NAT exemption ACL to include the following:

permit ip 192.168.100.0 255.255.255.0 10.10.20.0 255.255.255.0

Hope that helps.

Thanks for the reply.

I changed the Seq # on the dynamic map to 1000 and that has not seemed to do anything for me.

As for the 192.168.100.0 network, I do not need the remote VPN dialer users to get to that Network.


I have two sites:

Site 1 : 10.10.100.x

Site 2: 192.168.100. x

remote VPN users using the VPN Dialer need access to Site 1.

Right now, the Site to Site VPN between Site 1 and Site 2 works perfectly,  the VPN Client will connect, but I cannot see Site 1 LAN devices, such as the server which is 10.10.100.25.

Any other suggestions?

Apologize for the misunderstanding.

To access the 10.10.100.x subnet from remote vpn client, the vpn-filter ACL is the other way round.

Please kindly swap the following ACL:

FROM:

access-list outside_cryptomapVPN extended permit ip any 10.10.20.0 255.255.255.224

TO:

access-list outside_cryptomapVPN extended permit ip 10.10.20.0 255.255.255.224 any

Hope that helps.

Perfect....  Thanks so much!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: