[c-nsp] ASA 5510 Remote VPN Problems
Andy Dills
andy at xecu.net
Tue Nov 7 15:32:44 EST 2006
Solved this with the help of a friendly TAC engineer.
Turns out you don't need to specify the addresses to encrypt when using a
dynamic map. Just needed to junk this line:
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_20.20
Thanks,
Andy
On Tue, 7 Nov 2006, Andy Dills wrote:
>
> I'm setting up remote VPN access on an ASA 5510, and I'm encountering some
> unexpected behavior.
>
> The desired configuration is pretty straightforward; remote VPN users are
> assigned 10.2.210.0/24, inside network is 10.1.210.0/24 and is configured
> with a NAT pool.
>
> Essentially, remote VPN users can get connected, but cannot communicate
> with anything on the inside interface. I'm unable to ping the inside
> interface IP, nor anything attached. From the ASA, I can ping anything on
> the inside interface but I cannot ping the remote VPN user.
>
> Can anybody suggest what I'm missing? This is driving me nuts, as this
> should work (although I'm not all that familiar with the ASA products so
> I'm sure I'm missing something).
>
> Relevant config:
>
> interface Ethernet0/0
> nameif outside
> security-level 0
> ip address OUTSIDEIP 255.255.255.252
> !
> interface Ethernet0/1
> nameif inside
> security-level 100
> ip address 10.1.210.1 255.255.255.0
>
> same-security-traffic permit inter-interface
> same-security-traffic permit intra-interface
>
> object-group network VPN
> network-object 10.2.210.0 255.255.255.0
>
> access-list vpn_splitTunnelAcl standard permit 10.0.0.0 255.0.0.0
> access-list outside_cryptomap_20.20 extended permit ip any object-group VPN
> access-list inside_nat0_outbound extended permit ip any 10.2.210.0 255.255.255.0
>
> ip local pool VPN 10.2.210.2-10.2.210.254 mask 255.255.255.0
>
> global (outside) 1 NATPOOLLOW-NATPOOLHIGH
> nat (inside) 0 access-list inside_nat0_outbound
> nat (inside) 1 10.1.210.0 255.255.255.0
>
> group-policy VPN internal
> group-policy VPN attributes
> split-tunnel-policy tunnelspecified
> split-tunnel-network-list value vpn_splitTunnelAcl
>
> crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
> crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_20.20
> crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA
> crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA
> crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
> crypto map outside_map interface outside
>
> isakmp enable outside
> isakmp policy 10 authentication pre-share
> isakmp policy 10 encryption 3des
> isakmp policy 10 hash sha
> isakmp policy 10 group 2
> isakmp policy 10 lifetime 86400
> isakmp nat-traversal 20
>
> tunnel-group waystation general-attributes
> address-pool VPN
> authentication-server-group VPN
> default-group-policy VPN
> tunnel-group VPN ipsec-attributes
> pre-shared-key *
>
>
> Any suggestions would be greatly appreciated.
>
> Thanks,
> Andy
>
> ---
> Andy Dills
> Xecunet, Inc.
> www.xecu.net
> 301-682-9972
> ---
> _______________________________________________
> cisco-nsp mailing list cisco-nsp at puck.nether.net
> https://puck.nether.net/mailman/listinfo/cisco-nsp
> archive at http://puck.nether.net/pipermail/cisco-nsp/
>
---
Andy Dills
Xecunet, Inc.
www.xecu.net
301-682-9972
---
More information about the cisco-nsp
mailing list