cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4894
Views
0
Helpful
6
Replies

Problem with AnyConnect VPN on ASA 5505

r.stalets
Level 1
Level 1

Hello everyone,

We're troubleshooting an issue where a client cannot pass any traffic across an AnyConnect VPN with an ASA5505 as the endpoint. The client receives and IP address in the 172.16.0.1/24 range and the ASA creates a static route to the 10.0.0.0/24 internal network but we cannot ping or connect to any internal IP address. The connection appears to fully build and pass traffic (based on the byte counts which increase) but we can't talk to the main network.

Does anyone have any ideas as to what I can check?

Thanks!

Ryan

1 Accepted Solution

Accepted Solutions

Thanks for the update.

Pls kindly mark the post as answered so others can learn from your question.

View solution in original post

6 Replies 6

John Blakley
VIP Alumni
VIP Alumni

Is it only 1 client having the problem or all clients? Is this subnet separate from the standard ipsec vpn pool? If so, make sure that you have a route back to the 172.16.0.0/24 subnet from your 10.x.x.x network.

If it's just the one client, how are they connecting? Cell card, DSL, cable?

HTH,

John

HTH, John *** Please rate all useful posts ***

I agree with Blakley. I ahd this problem the other day on a 5510. I felt completely stupid, since we have a POS Checkpoint and an ASA side by side for testing purposes. Both the ASA and Checkpoint have the same VPN DHCP Pool range. So when I was testing the Remote Access VPN on the ASA, I could see the pings going to the outside interface but they never responded because all the clients on the internal network are still using the Checkpoint as the default gateway. When I manually had a co-worker, put a route add command in WIndows to point back to the ASA for the VPN DHCP Pool, I received ping replies like a champ.

So I tried using the internal DHCP server to get clients onto the same subnet as internal hosts but no dice, still not getting ping replies.

AnyConnect client should not be in the same subnet as the internal hosts. It needs to be unique subnet within your environment, so you were on the right path initially.

If you can share your config, that would be easier for us to check.

In the meantime, a few things to check:

1) Have you configured split tunnel policy?

2) Do you have NAT exemption configured?

3) Any VPN filter configured that might be blocking the traffic?

4) Does the internal network know how to route back to the VPN Pool subnet (ie: via the ASA)

5) Lastly, do you have "inspect icmp" configured?

r.stalets
Level 1
Level 1

Thanks everyone for your suggestions. I referred to the syslog and discovered that even with a NAT exemption configured, it was denying the traffic between the VPN and internal networks because of a NAT conflict (I can't remember the exact error). I manually configured an extra NAT entry to do (inside, outside) 10.0.0.0/24 -> 172.16.1.0/24 Original and it works. Then I configured split tunneling to make everything work perfectly.

Thanks again!

Ryan

Thanks for the update.

Pls kindly mark the post as answered so others can learn from your question.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: