Cisco Firewall :: ASA5520 Split-TunnelAcl Set Group Is Not Working

Oct 21, 2012

I have an ASA5520 with mobile VPN Ipsec.The "splitTunnelAcl" set the group is not working.

View 7 Replies


ADVERTISEMENT

Cisco Firewall :: Cut-Through Proxy Not Working With ASA5520

Jan 16, 2012

I'm trying to configure an ASA 5520 with cut-through proxy feature. The user is required to be authenticated when trying to access an outside resource from the inside. This is a test lab before it is implemented in production. [code]

View 15 Replies View Related

Cisco Firewall :: Inspect Not Working In ASA5520?

Aug 15, 2012

I have a cisco ASA5520 box running with IOS version8.2(5)13 where default policy map is applied globally. But I have not seen any traffic being inspected through included protocol defined under policy map.All configuration seems to be ok for me.
 
service-policy global_policy global
 Global policy:
  Service-policy: global_policy
Class-map: inspection_default
Inspect: ftp, packet 0, drop 0, reset-drop 0

[code]....

View 1 Replies View Related

Cisco Firewall :: SSH Stopped Working On ASA5520?

Mar 27, 2012

I can no longer SSH to a primary active firewall. It had all of a sudden stopped working.  However I am able to SSH to the secondary standby firewall without any problems. I did try to regenerate the RSA key on the primary fw, but still unable to connect. The only way I can connect to it is by using telnet.
 
I ran the "show asp table socket" command and I'm seeing port 22 listening on the primary IP address (not the standby), foreign address is 0.0.0.0:*. I did a packet capture on port 22 on the inside inside, seeing my request hit the fw and then right away a reset back from the fw.
 
version 8.2.(5)
model ASA5520
 
I'm hitting a bug in the software version I'm running? Or what else can I check before rebooting the primary fw?

View 6 Replies View Related

Cisco Firewall :: Gmail Outlook Not Working Behind ASA5520

May 17, 2013

internet is working with the client except for gmail account using outlook 2010.

View 1 Replies View Related

Cisco Firewall :: PIX To ASA5520 Migration Some Services Aren't Working

May 20, 2013

I've recently migrated a PIX 525 to ASA 5520, but for some reason (through ASA) the users from OUTSIDE aren't able access services published in DMZ as well as some DMZ servers aren't able to communicate to some OUTSIDE services.
 
-INSIDE to DMZ is working fine. (through ASA)

-INSIDE to OUTSIDE is working fine. (through ASA)
 
Below is the configuration from my PIX (where everything works just fine) as well as the one on the ASA (where there is a problem), what could be the cause?In the below case the DMZ hosts from 11.1.10.0 aren't able to access SMTP services (through ASA) and the OUTSIDE users aren't able to access DMZ web server (11.1.10.40) through ASA, this all just works fine with PIX.
 
object-group network inside_subnet_all   network-object object inside_subnet_a   network-object object inside_subnet_b   network-object object inside_subnet_c   network-object object inside_subnet_d   network-object object inside_subnet_e   network-object object inside_subnet_f   network-object object inside_subnet_g   network-object object inside_subnet_.access-list OUTSIDE extended permit tcp any object host-11.1.10.40 object- group WWW-HTTPS access-list DMZ extended permit object SMTP object dmz_subnet any access-list INSIDE extended permit ip

View 1 Replies View Related

Cisco Firewall :: NAT On ASA5520 Not Working / Leading To Client-less VPN Failing

May 15, 2012

I have a Cisco ASA5520 that I have setup to allow a GRE tunnel through from a router at site B. This all works fine when I use the below NAT with associated router object on the inside
 
object network SWTEST nat (inside,outside) static interface
 
My problem comes in that this kills off my Cleintless VPN connection to the same firewall, I changed my NAT to point at another of my statically assigned IP addresses, and then nothing works. Can anyone help with what I've done wrong, or what i should do? My rule base allows any GRE in from the source, and rules all look fine.

View 2 Replies View Related

Cisco VPN :: OpenLDAP Group Authentication With ASA5520 RA-VPN

Jul 24, 2011

I've configured RA VPN on ASA5520 with OpenLDAP server authentication. It works fine for all the users existed in LDAP database, but my requirement is I want one particular group to be able to access VPN and not all the users. I have checked most of Cisco documents but all are leading to Microsoft's AD and LDAP attribute map creation. Is there any way to achieve the same thing with OpenLDAP server and not with AD?

View 4 Replies View Related

Cisco VPN :: ASA5520 Two VPN Group Clients To Use Two VLAN

May 9, 2012

I have a VPN network (in ASA 5520) with two VLAN (999 and 997) and two remote clients (User1 and User2). The VPN connection with both users is correctly connected but I can't make a ping to another computer of the same VPN network, when the VPN network is connected. For eg: When User1 is connected, has the IP: 172.16.1.230, but can't make ping to another connected PC (IP:172.16.1.236). [code]

View 3 Replies View Related

Cisco Firewall :: ASA5520 To ASA5520 Via L2L Tunnel

May 31, 2011

Our firewall expert has gone off on long term illness leave and I am trying to pick up the pieces :-(
 
We have an ASA 5520 (local office) talking to another ASA (remote office) via a VPN Tunnel.
 
My 1st problem is that I cannot ping from my inside network (local) to the outside interface of my remote ASA.
 
My 2nd is that I have debug enabled on my rules but am not logging anything.

View 1 Replies View Related

Cisco VPN :: Split Tunneling On ASA5505 Not Working?

Mar 29, 2012

I am currently trying to configure an Easy VPN connection from an ASA 5505 to and ASA 5520.  I have enabled split tunnelling and in the group policy defined the network to be tunneled but when I activate the VPN it tunnels everything from the host computer connected to the ASA 5505.  I get no internet access.  Have been trying to troubleshoot this for days.Hee are soe specifics, running version 8.2(5) on the 5505 and the 5520 and below is the local config on the 5505 for the Easy VPN:
 
vpnclient server **.***.***.**
vpnclient mode network-extension-mode
vpnclient nem-st-autoconnect
vpnclient vpngroup dbernstein-5505 password *****
vpnclient username dbernstein password *****
vpnclient ipsec-over-tcp port 10000
vpnclient enable
 
and the downloaded dynamic policy:
 
Current Server                                 : 12.***.163.**
Primary DNS                                  : ***.160.***.39
Default Domain                               : cisco.com
PFS Enabled                                  : No
Secure Unit Authentication Enabled  : No
User Authentication Enabled            : No
Split Tunnel Networks                      : ***.160.***.0/255.255.255.0
Backup Servers                               : None

View 9 Replies View Related

Cisco VPN :: ASA 8.2 / No Split Tunnel / NAT For Internet Not Working?

May 27, 2013

I'm configurig a VPN profile with NO split tunneling. The tunnel is working to the inside, but I'm not able to get internet access. Below are the NAT statements that I created.
 
nat (outside) 2 0.0.0.0 0.0.0.0
global (outside) 2 (ip address) 
 
I'm familiar with 8.6 nat statements, but with 8.2 it's not letting me put in the same commands.

View 2 Replies View Related

Cisco Routers :: RV082 Split Tunnel Not Working?

Aug 21, 2012

I have a RV082 v2 with Firmware 2.0.2.01-tm with a Site-to-Site VPN to a Cisco ASA5510.
 
The PCs behind the RV082 can not see two webservers behind the ASA5510. Both servers have full DNS registration and are accessable from other sites with RV042 routers.

View 0 Replies View Related

Cisco Switching/Routing :: 2821 - Router VPN Client Split Tunnel Is Not Working

Mar 14, 2013

i've configured Cisco VPN CLient on a router 2821, and it is working fine.I could access inside resourses normally>the problem is that when i connect with VPN i lost connectivity to internet? What is wrong with my configuration? Below the running config of the router.
 
CISCO2821#sh run
Building configuration... 
Current configuration : 5834 bytes
!
version 12.4

[Code].....

View 3 Replies View Related

Cisco VPN :: ASA5520 SSL VPN Portal Not Working

Feb 17, 2010

I'm trying to setup the SSL VPN portal:When I connect via HTTPS to the ASA5520 outside interface I get the login prompt and after successfully login it takes me directly to the Anyconnect client download (starts Anyconnect immediately) even though in the group policy is configured to not prompt the use to chose the post login and the post login is ste to go to Clientless SSL VPN Portal?

View 7 Replies View Related

Cisco :: 7510 AP Group Not Working As Well

Sep 27, 2012

I Have an issue about AP Group.On my scenario, I have one Flex WLC 7510 using software version 7.0.220, And all APs are 1131.I have some sites with H-Reap, where H-Reap is configured properly.The Access Points are set with AP Group. AP Group is configured properly too. Each AP Group was configured for one site and was configured 2 SSIDs in each AP Group. All sites has 2 differents SSIDs.During some basic tests, in one site with 9 APs, I saw:

1. When the Access Points are registred on WLC, all APs are working fine. All APs has its 2 SSID added on slot 0 (radio 0)

2. If I disable the link between WLC and Access Points, 7 Access Points delete SSIDs on your AP Groups and replace it with 16 SSIDs (SSIDs on Default Group configured on WLC)

View 1 Replies View Related

Cisco VPN :: ASA 5520 / Error / Split Tunnel Attributes(51) Greater Than Max Allowed Split Attributes(50)

Jul 21, 2012

We have ASA 5520 acting as the VPN Server and Cisco 1941 router as EZVPN client. Since last few days client is not able to establish vpn connection. 1941 router is continuously generating the below log messages
 
001569: Jul 22 12:19:05.883 ABC: %CRYPTO-4-EZVPN_SA_LIMIT: EZVPN(VPNGROUP) Split tunnel attributes(51) greater than max allowed split attributes(50)
 001574: Jul 22 12:19:07.835 ABC: %CRYPTO-6-EZVPN_CONNECTION_DOWN: (Client)  User=vpn_user  Group=VPNGROUP Client_public_addr=<client public ip>  Server_public_addr=<server public ip>
 004943: Jul 22 11:32:42.247 ABC: %IP_VFR-4-FRAG_TABLE_OVERFLOW: Dialer1: the fragment table has reached its maximum threshold 16

View 3 Replies View Related

Cisco VPN :: ASA5520 Secure Desktop / ActiveX Not Working With IE 10

May 26, 2013

we noticed that the Cisco Secure Desktop / Hostscan is not working with Internet Explorer 10 on Windows7/Windows8.
 
As described here, the SSL VPN is/should working but no documentation about Cisco Secure Desktop / Hostscan. url...It's a Cisco ASA5520 with the lates release.

- ASA Version 9.1(2)
- ASDM 7.1(3)
- Cisco Secure Desktop  csd_3.6.6249-k9.pkg
- Hostscan hostscan_3.1.03104-k9.pkg

View 5 Replies View Related

Cisco :: 1131 - AP Group Not Working Properly

Sep 27, 2012

I have one Flex WLC 7510 using software version 7.0.220, And all APs are 1131.
 
I have some sites with H-Reap, where H-Reap is configured properly.
 
The Access Points are set with AP Group. AP Group is configured properly too.
 
Each AP Group was configured for one site, and they was configured with 2 SSIDs. All sites has 2 differents SSIDs. During some basic tests, in one site with 9 APs, I saw:
 
1. When the Access Points are registred on WLC, all APs are working fine.     All APs has your 2 SSID added on slot 0 (radio 0)

2. If I disable the link between WLC and Access Points, 7 access points delete SSIDs on your AP Groups and replace it with 16 SSIDs (SSIDs on Default Group) configured on WLC.

View 5 Replies View Related

Cisco VPN :: ASA5520 RemoteAccess VPN Not Working / VPNC Client Is Connecting

Jan 15, 2013

i have configured remote access VPN to cisco ASA 5520, Cisco vpn client is connecting fine and both phases are coming up but ipsec phase packets are not encapsulating. and ima not able reach the remote subnets 192.168.10.0 and 192.168.180.0. [code]

View 4 Replies View Related

Cisco Firewall :: 5510 Split Traffic Between VPN And Internet Using Different ISPs

Aug 25, 2011

What we are trying to accomplish here use two ISP's (one cable and one T1), use the Cable line for site-to-site VPN and use T1 line for all internet traffic. We currently use the following configuration: Cisco 2820 routers terminating the T1 -> HP switch -> Cisco AS 5510 port 0 -> port 1 to LAN switch (Nortel 5510)We want to force all VPN traffic (using 10.0.0.0/24 subnets - 10.0.1.0, 10.0.2.0, etc) through a cable connection, perhaps on port 2 of the ASA, then all non VPN traffic goes to the T1.

View 1 Replies View Related

Cisco Firewall :: ASA 5505 Split Traffic On Dual ISPs

Jul 31, 2012

I have an ASA 5505 current f/w & the security plus license (to get the 3 nameif interfaces). Can I split traffic between two ISPs, (VPN traffic to one destination on a T-1 on one VLAN, and all other traffic using DSL to another VLAN) and using a different nat policy on both? I know load balacing isn't supported, only failover. I was just wondering if there was a way to make this work.

View 3 Replies View Related

Cisco VPN :: ASA 5510 - Group-Lock Not Working With Web VPN And RADIUS Authentication

May 16, 2013

I'm on an ASA 5510 running 8.2(5)41. I have clientless WebVPN configured to authenticate against an RSA RADIUS server, which has users assigned to RADIUS Class attribute 25 to match the group-lock values assigned to each ASA group-policy. This of course is to ensure users can only access the login page's drop-down VPN profiles they are assigned to by the RADIUS server. I have two other ASA 5510s (same code level) using the same RADIUS server with group-lock enabled but for IPSec remote access VPN's, and the group-lock feature works fine.

WebVPN, however, is authenticating any user to any VPN profile without regard to the RADIUS Class attribute 25 they are assigned. If I configure the VPN profiles to authenticate locally and assign group-lock to individual ASA user accounts, group-lock works. As soon as I point it back to the RADIUS server, group-lock does nothing. From the 'debug aaa' below for user 'corpvpnstp', you can see the RADIUS server sends back the attribute 25 values of "ou=stp.Client;" and "ou=stp.ClientDRC;" for this user. The ASA profile this user has attempted to connect to is "EMS-Admin", which should get denied by the ASA. Instead, the ASA successfully authenticates the user.

View 4 Replies View Related

Cisco Firewall :: ASA 5510 / Internet Access For Remote VPN With Split Tunneling

Jun 23, 2011

I have a remote VPN with split tunnelling enabled. Currently, users connected to this VPN browses internet with his/her internet connection. Now, my requirement is that a roaming user connecting to the vpn must use our company's internet connection for his browsing purposes. How can I do this?Equipment we are using: ASA 5510

View 3 Replies View Related

Cisco Firewall :: Number Assigned For Firewall-group On 6509 Significant

Nov 17, 2011

Is there any significance to the parameter "firewall-group" in the command

firewall vlan-group <firewall-group> <vlan-id>…<vlan-id>?
 
In other words is the series of commands
 
firewall switch 1 module 3 vlan-group 1,2
firewall vlan-group 1 100,101,102
firewall vlan-group 2 200,201,202
 
exactly equivalent to
 
firewall switch 1 module 3 vlan-group 3
firewall vlan-group 3 100,101,102,200,201,202
 
or
 
firewall switch 1 module 3 vlan-group 1,2,3
firewall vlan-group 1 100,200
firewall vlan-group 2 101,201
firewall vlan-group 3 102,202

All three of these options associate the same set of  vlans to the FWSM but using different groupings. As far as I can tell, these groupings have no functional significance either on the switch side or the FWSM side. These are simply three different ways of specifying exactly the same thing? Am I correct?

View 2 Replies View Related

Cisco Firewall :: ASA5520 Bypass All Network Through Firewall

Dec 22, 2011

With regarding to the firewall ASA5520, i'm using it in my network, all the confiuration are properly configured and working but with the use of proxy address in internet explorer(e.:206.53.155.129/3128) all the blocked contents as easily accessible simply it bypass all the network through firewall.so will u guide me to block the proxy servers.

View 1 Replies View Related

Cisco Firewall :: Add New Vlan In Existing Firewall Group In 6500?

Jan 19, 2013

I want to add new vlan in existing firewall group in 6500. I am confused if it will add new vlan or overwrite.. I am using ASASM module with 6500.

View 3 Replies View Related

Cisco Firewall :: Keep ASA5520 Firewall In Sync

Aug 22, 2011

I have two asa 5520 firewalls. one at my primary data center connected to our production Internet feed, and one at my fail over data center connected to a backup internet feed. I was wondering if there was an easy way to keep the firewall rules in sync between the two firewalls. We have failover with our isp that will move our public facing address block from our primary site to our dr site in the event of a disaster so the ip addresses will not change if we were to have to fail over to the DR site. currently i just have to do any changes that i make on the fail over server but would like a way to at least simi-automat this if not fully automat this so that i can eliminate the possibility of human error of a change happening at primary but never getting don at DR.

View 1 Replies View Related

Cisco Firewall :: Only One Internet IP Can Be Used In Asa5520?

Sep 25, 2011

I have a asa5520 with five Internet IP.One for the internet interface and the others are static maped to dmz hosts. It runs rightly until yesterday.Now it will lose the connection to the gateway many times everyday and the dmz hosts can not connect to internet any time. configuration(simplified):
 
!
interface GigabitEthernet0/0
nameif internet
security-level 0

[Code]....

I called ISP to check,when ISP clear their router's ARP, the asa will lose the connection at the same time and then the ISP's router couldn't learn the ASA's MAC. After I 'clear arp' manually,The ISP's router can learn the ASA's MAC and the connection recovered,but the DMZ's cann't access internet still (of course,There is no problem between DMZ and ASA ,I ping the internet gateway from DMZ host and can not get any reply.).

View 2 Replies View Related

Cisco Firewall :: Upgrade 8.2.2 On ASA5520?

Oct 3, 2011

We have 2 x ASA5520 and I upgraded this to 8.2.2 last year, I see 8.2.5 and now 8.4 is out.  If we are having no issues, is it best just to leave it as it is?  I can see a couple of features I may find useful in 8.2.5, but 8.4 seems like a huge jump and a risky one too.

View 1 Replies View Related

Cisco :: Firewall ASA5520 Is Very Slow

May 8, 2011

I have one firewall ASA5520, are very slow

View 3 Replies View Related

Cisco Firewall :: Cannot Ping ASA5520 From LAN

Mar 7, 2011

I am trying to introduce an ASA5520 to my network based on the following diagram: ISP Internet ------> ASA5520 ------- > Cisco Router ------> LAN. The problem is I cannot ping the ASA from the LAN. I can ping it from  inside the router.  I already allow ICMP within ASA. If i remove the  cisco router and replace it by a swich, I can ping the ASA with NO problem.

View 5 Replies View Related

Cisco Firewall :: ASA5520 With Different CPU Type?

May 16, 2011

We want to use ASA5520 but both Firewall have different CPU. One has CPU Pentium 4 2400 MHz and another has Pentium 4 Celeron 2000 MHz. Can it be configured for replica / failover?

View 5 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved