Ive already configure cisco vpn remote access, the connection is fine and also i can established a vpn but the problem is after connecting to vpn i cannot access any internal IP on my LAN my lan ip is 10.238.151.0/24
Here is my config
ASA# sh rjn un : Saved : ASA Version 8.0(4) ! hostname CISCOASA domain-name enable password LmE6IK3nzBzzPpel encrypted passwd 2745OAJS2l2oSQqc encrypted names ! interface GigabitEthernet0/0 nameif outside security-level 0 ip address xxx.xxx.9.194 255.255.255.224 standby xxx.xxx.9.195 ! interface GigabitEthernet0/1 nameif inside security-level 100 ip address 10.238.10.50 255.255.255.0 standby 10.238.10.52 ! interface GigabitEthernet0/2 nameif dmz security-level 50 ip address 192.168.238.1 255.255.255.0 standby 192.168.238.2 ! <--- More --->
interface GigabitEthernet0/3 description LAN/STATE Failover Interface ! interface Management0/0 shutdown no nameif no security-level no ip address ! ftp mode passive clock timezone PHST 8 dns domain-lookup outside dns domain-lookup inside dns server-group DefaultDNS name-server 10.236.9.21 name-server 10.238.9.21 domain-name travellers same-security-traffic permit intra-interface object-group network NG_PROXY network-object host 10.238.10.64 network-object host 10.238.10.252 object-group service SG_PROXY tcp-udp port-object eq 443 port-object eq 20 <--- More --->
Does that IP subnet know that RA users are behind ASA (routing wise) ? Are you able to ping the inside interface of the ASA (It's not allowed in currect config but you can fix this)? Or anything on 10.238.10.0/24 ?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :