Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Community Member

VPN can connect but I can't access any of my internal networks

Hey All,

I have a particular problem i can't seem to resolve.

I can connect to my VPN, but once connected I cannot resolve or get to any of my internal networks.

Here is part of the config that refers to anything with the VPN connection

access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 192.168.198.0 255.255.255.0

access-list inside_nat0_outbound remark allows anything on the 192.168.x.x/24 network to talk to the secure VPN clients

access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.0.0 10.110.198.0 255.255.255.0

access-list inside_nat0_outbound remark allows anything on the 10.x.x.x/8 network talk to Unsecure VPN clients

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 192.168.198.0 255.255.255.0

access-list inside_nat0_outbound remark allows anything on the 10.x.x.x/8 network talk to Secure VPN clients

access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.0.0.0 10.110.198.0 255.255.255.0

access-list inside_nat0_outbound extended permit ip any 209.136.69.64 255.255.255.192

access-list GDMVPN_splitTunnelACL standard permit 192.168.187.0 255.255.255.0

access-list GDMVPN_splitTunnelACL remark Access to Louisville Subnet

access-list GDMVPN_splitTunnelACL standard permit 10.110.0.0 255.255.0.0

access-list GDMVPN_splitTunnelACL remark Access to Lexington Subnet

access-list GDMVPN_splitTunnelACL standard permit 10.120.0.0 255.255.0.0

access-list GDMVPN_splitTunnelACL remark Access to Cincinnati Subnet

access-list GDMVPN_splitTunnelACL standard permit 10.130.0.0 255.255.0.0

access-list GDMVPN_splitTunnelACL remark Access to Covington Subnet

access-list GDMVPN_splitTunnelACL standard permit 10.140.0.0 255.255.0.0

access-list GDMVPN_splitTunnelACL remark Access to Frankfort Subnet

access-list GDMVPN_splitTunnelACL standard permit 10.150.0.0 255.255.0.0

access-list GDMVPN_splitTunnelACL standard permit 192.168.118.0 255.255.255.0

access-list GDMVPN_splitTunnelACL standard permit 192.168.28.0 255.255.255.0

access-list GDMVPN_splitTunnelACL standard permit 192.168.13.0 255.255.255.0

access-list GDMVPN_splitTunnelACL standard permit 192.168.18.0 255.255.255.0

ip local pool GDMVPNPool 192.168.198.1-192.168.198.254 mask 255.255.255.0

group-policy GDMVPN internal

group-policy GDMVPN attributes

dns-server value 192.168.187.42

split-tunnel-policy tunnelspecified

split-tunnel-network-list value GDMVPN_splitTunnelACL

default-domain value greenebaum.com

split-dns value greenebaum.com gdm.com

tunnel-group GDMVPN type remote-access

tunnel-group GDMVPN general-attributes

address-pool (900RAWTWC) GDMVPNPool

address-pool GDMVPNPool

default-group-policy GDMVPN

tunnel-group GDMVPN ipsec-attributes

pre-shared-key HIDDEN

1 REPLY
Community Member

Re: VPN can connect but I can't access any of my internal networ

ok not sure, but I after I rebooted the ASA 3 times it started working...no clue why

216
Views
0
Helpful
1
Replies
CreatePlease to create content