cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
770
Views
0
Helpful
14
Replies

ASA 5505 ver. 9,1 Anyconnect tread connection

Stefano Grassi
Level 1
Level 1

Hi guys I have configured a asa 5505 for webvpn and anyconnect client .

Webvpm work properly as I expect grant acces to server and so on

Anyconnect estabilish connection and try to acces at server on inside network without success, I attach config and log where you can se the messages.

Someone have some suggestion? I suppose is the timeout.

 

Here the config in attach you can find the log file

 

 

 

Saved
: Written by enable_15 at 13:50:10.879 UTC Tue Apr 7 2015
!
ASA Version 9.1(5) 
!
hostname 
enable password F2nFaHZwcBED/oWO encrypted
names
ip local pool vpnpool 192.168.10.1-192.168.10.250 mask 255.255.255.0
!
interface Ethernet0/0
 switchport access vlan 10
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
 switchport access vlan 20
!
interface Ethernet0/6
!
interface Ethernet0/7
!
interface Vlan1
 no nameif
 security-level 100
 no ip address
!
interface Vlan10
 nameif outside
 security-level 0
 ip address 212.66.103.154 255.255.255.248 
!
interface Vlan20
 nameif inside
 security-level 100
 ip address 192.168.1.11 255.255.255.0 
!
ftp mode passive
dns domain-lookup outside
dns domain-lookup inside
same-security-traffic permit intra-interface
object network obj_any
 host 192.168.1.130
 description Server_Enrico
object network obj-inside
 subnet 192.168.1.0 255.255.255.0
object network Obj-Anyconnectpool
 subnet 192.168.10.0 255.255.255.0
object network obj-outside
 subnet 212.66.103.152 255.255.255.248
object network NETWORK_OBJ_192.168.10.0_24
 subnet 192.168.10.0 255.255.255.0
object network Server
 host 192.168.1.129
object-group service DM_INLINE_SERVICE_3
 service-object icmp 
 service-object tcp 
 service-object tcp destination eq https 
 service-object tcp destination eq ssh 
object-group service DM_INLINE_SERVICE_2
 service-object icmp 
 service-object tcp destination eq www 
 service-object tcp destination eq https 
 service-object tcp destination eq ssh 
object-group service DM_INLINE_SERVICE_1
 service-object icmp 
 service-object tcp destination eq www 
 service-object tcp destination eq https 
 service-object tcp destination eq telnet 
object-group service DM_INLINE_SERVICE_4
 service-object icmp 
 service-object tcp destination eq www 
 service-object tcp destination eq https 
 service-object tcp destination eq ssh 
object-group service DM_INLINE_SERVICE_5
 service-object icmp 
 service-object tcp 
 service-object tcp destination eq www 
 service-object tcp destination eq https 
access-list outside_access extended permit icmp host 42.144.141.230 host 192.168.10.1 unreachable 
access-list outside_access extended permit object-group DM_INLINE_SERVICE_2 any4 object obj_any 
access-list outside_access extended permit object-group DM_INLINE_SERVICE_5 object Obj-Anyconnectpool any 
access-list outside_access extended permit object-group DM_INLINE_SERVICE_4 any object Obj-Anyconnectpool 
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 object Obj-Anyconnectpool object obj-inside 
access-list inside_access_in extended permit ip object Obj-Anyconnectpool any 
access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_3 object obj-inside object Obj-Anyconnectpool 
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-722.bin
no asdm history enable
arp timeout 14400
no arp permit-nonconnected
nat (outside,outside) source static Obj-Anyconnectpool Obj-Anyconnectpool destination static Obj-Anyconnectpool Obj-Anyconnectpool
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.10.0_24 NETWORK_OBJ_192.168.10.0_24 no-proxy-arp route-lookup
!
object network obj_any
 nat (inside,outside) static 212.66.103.155
object network obj-inside
 nat (any,outside) dynamic interface
object network Obj-Anyconnectpool
 nat (any,outside) dynamic interface
object network obj-outside
 nat (any,outside) dynamic interface
access-group outside_access in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 212.66.103.153 1 
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
 webvpn
  url-list value Rova
  port-forward enable Prova
  file-browsing enable
  file-entry enable
  http-proxy enable
  url-entry enable
user-identity default-domain LOCAL
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec ikev2 ipsec-proposal DES
 protocol esp encryption des
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal 3DES
 protocol esp encryption 3des
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES
 protocol esp encryption aes
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES192
 protocol esp encryption aes-192
 protocol esp integrity sha-1 md5
crypto ipsec ikev2 ipsec-proposal AES256
 protocol esp encryption aes-256
 protocol esp integrity sha-1 md5
crypto ipsec security-association pmtu-aging infinite
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca trustpoint ASDM_TrustPoint0
 enrollment self
 subject-name CN=Trinitywpn
 crl configure
crypto ca trustpool policy
crypto ca certificate chain ASDM_TrustPoint0
 certificate 41071d55
    308201d7 30820140 a0030201 02020441 071d5530 0d06092a 864886f7 0d010105 
    05003030 31133011 06035504 03130a54 72696e69 74797770 6e311930 1706092a 
    864886f7 0d010902 160a5472 696e6974 7977706e 301e170d 31353034 30373038 
    33353038 5a170d32 35303430 34303833 3530385a 30303113 30110603 55040313 
    0a547269 6e697479 77706e31 19301706 092a8648 86f70d01 0902160a 5472696e 
    69747977 706e3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 
    818100ae ea8bd599 f6326dfc 6aade623 58ae0963 940bf998 a4f44dfb a82e9d2b 
    e4b3d090 9a3ed60b 017dae8c aa99c29d 611c69d3 c9b0ebd9 70010ce7 b3bc300f 
    2d399446 9df9651b 9213fcf1 be9e1f72 ad1608ad f798ce60 83191eef 67a5ed39 
    45cccfad 565130b9 b15eb10f 3e37a9d9 928c311e 39d0baa8 d7281fdd 9ab1101e 
    778dd502 03010001 300d0609 2a864886 f70d0101 05050003 81810018 1e48904e 
    22e56922 95c87743 f88471e7 8ab5ab10 d0a1200c 95849c96 1e5eb6f8 e4863cbe 
    f414f9be 84877dd0 194e965e d70e9b30 28ba5602 256f2d5c d9107122 1c05d1c3 
    2dba4f40 02b328e5 75f1080e 2b3eb820 79c79344 bca1d755 4d7165d8 34d542b0 
    b2e011d6 2bf0388e e758ed41 ecb60e7e dd78580d fc36df89 054e0c
  quit
crypto ikev2 policy 1
 encryption aes-256
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 10
 encryption aes-192
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 20
 encryption aes
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 30
 encryption 3des
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 policy 40
 encryption des
 integrity sha
 group 5 2
 prf sha
 lifetime seconds 86400
crypto ikev2 enable outside client-services port 443
crypto ikev2 remote-access trustpoint ASDM_TrustPoint0
crypto ikev1 enable outside
crypto ikev1 policy 10
 authentication crack
 encryption aes-256
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 20
 authentication rsa-sig
 encryption aes-256
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 30
 authentication pre-share
 encryption aes-256
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 40
 authentication crack
 encryption aes-192
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 50
 authentication rsa-sig
 encryption aes-192
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 60
 authentication pre-share
 encryption aes-192
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 70
 authentication crack
 encryption aes
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 80
 authentication rsa-sig
 encryption aes
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 90
 authentication pre-share
 encryption aes
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 100
 authentication crack
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 110
 authentication rsa-sig
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 120
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 130
 authentication crack
 encryption des
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 140
 authentication rsa-sig
 encryption des
 hash sha
 group 2
 lifetime 86400
crypto ikev1 policy 150
 authentication pre-share
 encryption des
 hash sha
 group 2
 lifetime 86400
client-update enable
telnet timeout 5
no ssh stricthostkeycheck
ssh timeout 5
ssh key-exchange group dh-group1-sha1
console timeout 0
no vpn-addr-assign aaa
no vpn-addr-assign dhcp

dhcpd auto_config outside
!
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ssl trust-point ASDM_TrustPoint0 outside
webvpn
 enable outside
 anyconnect image disk0:/anyconnect-win-3.1.05187-k9.pkg 1
 anyconnect image disk0:/anyconnect-macosx-i386-3.1.05187-k9.pkg 2
 anyconnect image disk0:/anyconnect-linux-64-3.1.05187-k9.pkg 3
 anyconnect profiles anycoinnect1_client_profile disk0:/anycoinnect1_client_profile.xml
 anyconnect profiles sslgorup disk0:/sslgorup.xml
 anyconnect enable
 port-forward Prova ssh 212.66.103.155 ssh ssh
 port-forward Prova www 212.66.103.155 www http
 tunnel-group-list enable
group-policy DfltGrpPolicy attributes
 webvpn
  port-forward enable Prova
group-policy GroupPolicy1 internal
group-policy GroupPolicy1 attributes
 wins-server none
 dns-server none
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless
 default-domain none
group-policy GroupPolicy_anycoinnect1 internal
group-policy GroupPolicy_anycoinnect1 attributes
 wins-server none
 dns-server value 8.8.8.8
 vpn-tunnel-protocol ikev2 ssl-client 
 default-domain none
 webvpn
  anyconnect profiles value anycoinnect1_client_profile type user
group-policy Clientgroup internal
group-policy Clientgroup attributes
 vpn-tunnel-protocol ssl-clientless
 split-tunnel-policy tunnelall
 webvpn
  anyconnect profiles value sslgorup type user
  always-on-vpn profile-setting
username m.demartino password HHX8Zi8N8yAAHLSk encrypted
username m.demartino attributes
 vpn-tunnel-protocol ssl-clientless
 webvpn
  url-list value Rova
username m.bisio password uu/WJ/ekPDuYo47l encrypted
username m.bisio attributes
 vpn-group-policy GroupPolicy1
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless
 webvpn
  url-list value Rova
username user1 password nEM2casnzboh/swE encrypted
username user1 attributes
 vpn-group-policy Clientgroup
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client 
username e.farabollini password cE.4LYqGTdUIkVgf encrypted
username e.farabollini attributes
 vpn-group-policy GroupPolicy1
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless
 webvpn
  url-list value Rova
username s.stefanoni password scoxK4UWrGJWy61i encrypted
username s.stefanoni attributes
 vpn-group-policy GroupPolicy1
 vpn-tunnel-protocol ssl-client ssl-clientless
 webvpn
  url-list value Rova
username s.grassi password F6JZrIQiRDF4d/v3 encrypted
username s.grassi attributes
 vpn-group-policy GroupPolicy1
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless
 webvpn
  url-list value Rova
username p.valle password mE0Gcv5so2HkNTzH encrypted
username p.valle attributes
 vpn-group-policy GroupPolicy1
 vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless
 webvpn
  url-list value Rova
tunnel-group DefaultWEBVPNGroup general-attributes
 address-pool vpnpool
 default-group-policy GroupPolicy1
 password-management password-expire-in-days 30
tunnel-group sslgroup type remote-access
tunnel-group Anyconnect type remote-access
tunnel-group Anyconnec type remote-access
tunnel-group anycoinnect1 type remote-access
tunnel-group anycoinnect1 general-attributes
 address-pool vpnpool
 default-group-policy GroupPolicy_anycoinnect1
tunnel-group anycoinnect1 webvpn-attributes
 group-alias anycoinnect1 enable
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
no call-home reporting anonymous
Cryptochecksum:d7a9e5108a58ab794b66d897e1501f96
: end

14 Replies 14

Andre Neethling
Level 4
Level 4

Good day. Can you please post the result of "show Nat"? What error messages are you receiving from the anyconnect client?

Hi good day to you

On anyconnect I receive timed out on applicationa and this is the show nat

 

 sh nat
Manual NAT Policies (Section 1)
1 (outside) to (outside) source static Obj-Anyconnectpool Obj-Anyconnectpool   destination static Obj-Anyconnectpool Obj-Anyconnectpool
    translate_hits = 140, untranslate_hits = 140
2 (inside) to (outside) source static any any   destination static NETWORK_OBJ_192.168.10.0_24 NETWORK_OBJ_192.168.10.0_24 no-proxy-arp route-lookup
    translate_hits = 166, untranslate_hits = 166

Auto NAT Policies (Section 2)
1 (inside) to (outside) source static obj_any 212.66.103.155
    translate_hits = 0, untranslate_hits = 2971
2 (any) to (outside) source dynamic obj-outside interface
    translate_hits = 0, untranslate_hits = 0
3 (any) to (outside) source dynamic obj-inside interface
    translate_hits = 0, untranslate_hits = 0
4 (any) to (outside) source dynamic Obj-Anyconnectpool interface
    translate_hits = 14695, untranslate_hits = 1267

Good day. It seems like most of your hits are for the anyconnect pool to outside dynamic PAT.

4 (any) to (outside) source dynamic Obj-Anyconnectpool interface
    translate_hits = 14695, untranslate_hits = 1267

 

Is this rule to provide internet access to the anyconnect clients? It could be that you are NATing the anyconnect traffic before it can be routed back to the anyconnect client. That rule has the most hits.

To test can you please disable this rule to test?

object network Obj-Anyconnectpool
 nat (any,outside) dynamic interface

 

Hi I have disabled this rule the results is that no client can connect anymore without this one.

 

Hi. I just noticed that you have 2 objects referencing the Any connect pool. Can you enable the object rule I asked you to disable? Then can you add the "after-auto" keyword to the following rule?

nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.10.0_24 NETWORK_OBJ_192.168.10.0_24 no-proxy-arp route-lookup

Mate done nothing change I have added an extended acl for to grant access at anyconnect pool to inside, nothing change I can navigate on internet during vpn connection, no acces at inside service ... I thought that will be easy to configure anyconnect ....

Can you post yout "show nat" output after adding that rule to section 3 of the nat policies?

btw...... it is easy to setup anyconnect. ..... mine was working in no time. 

Hi sorry for delay.

I have reconfigured the ASA with this guideline 

http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100918-asa-sslvpn-00.html

This is the show nat :

Trxxxxxx# sh nat
Manual NAT Policies (Section 1)
1 (inside) to (outside) source static obj-inside obj-inside   destination static obj-AnyconnectPool obj-AnyconnectPool
    translate_hits = 29, untranslate_hits = 29

Auto NAT Policies (Section 2)
1 (inside) to (outside) source static obj_any 212.66.103.155
    translate_hits = 0, untranslate_hits = 40
2 (any) to (outside) source dynamic obj-inside interface
    translate_hits = 0, untranslate_hits = 0

 

Another info form ASA I can ping the client and the server that I'm using for test

 

But from client I can't reach inside server

§In attach you can find a config file and the debug file .. I'm really frustrated foirm this nothing change for simple config ....

 


Please help me

Can you try this please?

 

nat (inside,outside) after-auto source static obj-inside obj-inside destination static obj-AnyconnectPool obj-AnyconnectPool

What is the purpose of this static rule?

I have done with after auto nothing change I'm unable with anyconnect client to reach the inside network.

 

the purpose of the NATrule is to tunnel network , as I read in http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100918-asa-sslvpn-00.html

 

But if is worng, please help for to finbd a right config , I need that anyconnect client can connect to inside network and navigate in internet, the second work proeprly the acces to inside network  not , I can't ping , ssh or https anything to or from inside doesn't  work but from ASA I can ping client and sevrer on inside too....

 

what do you think should be an issue in the version ?

Hi someone have some suggestion can help?

Hi,

I think I don't see any configuration issues on the ASA device.

Try these two things:-

1) Verify the routes on the Any connect client

2) try to ping the internal resource and apply captures on the Inside interface from the assigned IP for the any connect client to the resource IP and see what traffic you see.

EDIT:- Also , i see these logs which i think points to the issue on the Internal device:-

6|Apr 21 2015|08:27:27|302014|192.168.10.1|53407|192.168.1.22|443|Teardown TCP connection 936 for outside:192.168.10.1/53407(LOCAL\user1) to inside:192.168.1.22/443 duration 0:00:30 bytes 0 SYN Timeout (user1)

SYN is getting timed out on the ASA device. Try the captures and i think that will give you more information on this issue.

Thanks and Regards,

Vibhor Amrodia

Hi I have to capture this , but from webvpn clientless I can reach everithing without

problem .

So hope tomorrow to have capture. I'm really frustrated is first time lose so much time withou success.

Thanks a lot for helping

Review Cisco Networking products for a $25 gift card