Cisco VPN :: 5510 - Getting ASA (NEM) VPN Remote Clients (v8.4.5)?

Mar 30, 2013

I've some strange problems with multiple ASA (NEM) VPN remote clients (v8.4.5). On the HQ I've an ASA5510 (v8.4.5) with multiple NEM's connected to it. The group policy used on the HQ is configured for split tunneling. Now here's the problem;
 
The remote ASA (NEM) constructs easily a VPN connection to the main location; it seems that everything works well. Traffic through most of the tunneled networks works perfectly. Traffic to certain subnets or hosts brings me into trouble, there is no traffic flowing through the tunnel at all!
 
When using the command "show crypto ipsec sa | i caps|ident|spi” I can see all of the tunneled subnets. The subnets that works perfecly gives me the correct "local and remote ident" output. The subnets with problems gives me wrong values ​​in the "remote ident". The remote ident should be the IP address of the inside LAN (of the remote NEM) and not the IP address of the ouside interface (of the remote NEM). How is this posible?
 
Here's is the crypto ipsec sa output:
 
Result of the command: "show crypto ipsec sa | i caps|ident|spi"
 
local ident (addr/mask/prot/port): (10.200.60.0/255.255.255.0/0/0) <-- this is the good subnet of the inside interface (NEM)
remote ident (addr/mask/prot/port): (10.100.2.2/255.255.255.255/0/0) <-- this is the good subnet (HQ)
#pkts encaps: 54712, #pkts encrypt: 54712, #pkts digest: 54712
#pkts decaps: 31893, #pkts decrypt: 31893, #pkts verify: 31893
#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
current outbound spi: A4FA947A

[code]....

View 1 Replies


ADVERTISEMENT

Cisco VPN :: 5510 VPN Filter And Service From Remote Clients

Mar 21, 2012

We have remote VPN setup with Cisco ASA 5510. By using VPN filter, I can follow the guide and make client to use all necessary server services. (dns, ssh etc). However, is there any way that allow inside server access remote VPN client's services, ex. let inside server ssh to remote VPN client? Consider remote access VPN filter ACL's syntax, I have to always let source be the "remote VPN client PC", the dest is "inside firewall server", how can I let the other way traffice going?

View 1 Replies View Related

Cisco VPN :: ASA 5510 - Clients Cannot Access Remote Site

Dec 12, 2011

I have 2 sites :

site A :
ASA 5510
VPN gateway for remote users
LAN 192.168.192.0/22
 site B :
ASA 5505
LAN 192.168.208.0/22
 
Both sites are connected through a site to site VPN.Remote clients (AnyConnect/VPN client) can connect to Site A LAN  and see machines on LAN A but cannot see Site B LAN.

Here is a part of my configuration :
 
On Site A (ASA 5510)
--------------------------------
name 192.168.192.0 SiteA_Internal_Network
name 192.168.208.0 SiteB_Internal_Network
name 192.168.133.0 VPNPool_AnyConnect
name 192.168.133.32 VPNPool_VpnClient

[code]....

View 9 Replies View Related

Cisco VPN :: ASA 5510 - Remote Clients To Site To Site Tunnel

Feb 20, 2013

I have a situation where I need to have remote users vpn into my ASA 5510 and then turn around and hit a site to site tunnel.  Now when I am in our office I can hit the site to site vpn fine.  When I am at home and vpn to the asa I can not get to the site to site resources. Do you see where my config is incorrect? result of the command: "show run"
 
ASA Version 9.1(1)
!
hostname xxxxx
domain-name xxxx
enable password xxxxx
xlate per-session deny tcp any4 any4
xlate per-session deny tcp any4 any6
[ code]....

View 3 Replies View Related

Cisco VPN :: 5520 / 5510 - Can VPN Clients Communicate With Other Dynamic Clients

Nov 5, 2012

We currently have an ASA 5520 communicating with 10 ASA 5510's, all on static outside addresses.  I was asked to add 5 additional 5510's on dynamic address.  All worked well in testing until it was decided that some of the dynamic clients needed to talk to each other.

My testing shows packets just dying in the 5520.

View 1 Replies View Related

Cisco VPN :: All Remote Wireless IPSec Remote Clients Fail Connecting To ASA 5500

Sep 12, 2012

We have two ASA 5500 series Firewalls running 8.4(1).  One in New York, another in Atlanta.They are configured identically for simple IPSecV1 remote access for clients.  Authentication is performed by an Radius server local to each site.
 
There are multiple IPSec Site-to-Site tunnels on these ASA's as well but those are not affected by the issues we're having.First, let me start with the famous last words, NOTHING WAS CHANGED.
 
All of a sudden, we were getting reports of remote users to the Atlanta ASA timing out when trying to bring up the tunnel.  They would get prompted for their ID/Password, then nothing until it times out.Sames users going to the NY ASA are fine.After extensive troubleshooting, here is what I've discovered. Remote clients will authenticate fine to the Atlanta Firewall ONLY IF THEY ARE USING A WIRED CONNECTION.
 
If they are using the wireless adapter for their client machine, they will get stuck trying to login to Atlanta.These same clients will get into the New York ASA with no problems using wired or wireless connections.Windows 7 clients use the Shrewsoft VPN client and Mac clients use the Cisco VPN client.  They BOTH BEHAVE the same way and fail to connect to the Atlanta ASA if they use their wireless adapter to initiate the connection.
 
Using myself as an example.
 
1. On my home Win 7 laptop using wireless, I can connect to the NY ASA with no issues. 
 
2. The same creditials USED to work for Atlanta as well but have now stopped working.  I get stuck until it times out.
 
3. I run a wire from my laptop to the FiOS router, then try again using the same credentials to Atlanta and I get RIGHT IN.
 
This makes absolutely no sense to me.  Why would the far end of the cloud care if I have a wired or wireless network adapter?  I should just be an IP address right?  Again, this is beyond my scope of knowledge.We've rebuilt and moved the Radius server to another host in Atlanta in our attempts to troubleshoot to no avail.  We've also rebooted the Atlanta Firewall and nothing changed.
 
We've tried all sorts of remote client combinations.  Wireless Internet access points from different carriers (Clear, Verizon, Sprint) all exhibit the same behavior.  Once I plug the laptops into a wired connection, BAM, they work connecting to Atlanta.  The New York ASA is fine for wired and wireless connections.  Same with some other remote office locations that we have.
 
Below I've detailed the syslog sequence on the Atlanta ASA for both a working wired remote connection and a failed wireless connection.  At first we thought the AAA/Radius server was rejecting us but is shows the same reject message for the working connection.  Again, both MAC and Windows clients show the same sequence.Where the connection fails is the "IKE Phase 1" process.

-------------------------------------------------------------------------------------------------------------------------
WORKING CONNECTION
-------------------------------------------------------------------------------------------------------------------------
 %ASA-6-713172: Automatic NAT Detection Status: Remote end is|is not behind a NAT device This end is|is not behind a NAT device
NAT-Traversal auto-detected NAT.
 %ASA-6-113004: AAA user aaa_type Successful: server = server_IP_address, User = user
 %ASA-6-113005: AAA user authentication Rejected: reason = string: server = server_IP_address, User = user

[code]...

View 1 Replies View Related

Cisco VPN :: 891 - Clients Cannot Access Remote Site

Dec 12, 2012

I have 2 site here:
 
site A
 
Cisco 891
external IP: 195.xxx.yyy.zzz
VPN Gateway for Remote users

[Code]....

View 1 Replies View Related

Cisco VPN :: 2911 - Static Ip Remote Clients

Aug 9, 2011

I am using Cisco 2911 router , i configured remote client in that . i need to provide the static ip to the remote users instead of providing from the dhcp pool. is it possible? if it is how we can do that.

View 5 Replies View Related

Cisco VPN :: ASA 5520 8.2(3) - Allow Remote Clients To Access Other Networks

Oct 24, 2012

I have an ASA 5520 8.2(3) and allowing my remote client-to-site-vpn clients to access resources directly connected to my ASA on separate lower security interfaces (not the outside) besides just clients on my internal networks.  Someone mentioned to me configuring 'VPN on a stick' however from what I've read this seems to be only applicable when it comes to split-tunneling back out the outside interface (could be off on that).  Is this possible on other lower security interfaces as well, and if so what would a mock config that accomplishes that look like (acl's, nat, etc)?  Also, if I want internal users to be able to connect to these remote clients once they are active, are there any nat statements necessary (such as nonatting them) or are the vpn clients just seen as internal clients from the rest of the internal network's standpoint by default?

View 5 Replies View Related

How To Remote Control A Clients Computer Through Internet

Nov 16, 2011

I am trying to understand how to remote control a clients computer through the internet.

I have Symatec PCanywhere installed on both When i'm on the same connection (wireless internet).I can get it to work no problem.However when I try to remote in using a different internet connection it does not go through.

I've done some research and found out that instead of using the IP address it gives me (dynamically) [192.168.2.5] i need to aquire the WAN IP address from a website or through the router. As well as configuring virtual server through the router, and enable port forwarding in some way or another for specific ports.

View 4 Replies View Related

Cisco VPN :: ASA5515X - Remote Access VPN Clients / Multiple DNS Suffixes?

Dec 13, 2012

I am setting up a new remote access VPN using the traditional IPSec client via ASA 5515-X runnning OS 8.6.1(5). We require to provide each client multiple DNS suffixes, but are only to provide a single DNS suffix in the group policy.I have tested using an external DHCP server, but using our Windows Server 2008 infrastructure and Option 119 the list is not provided to clients, and I have read that Windows 7 clients may ignore this option anyway.

View 0 Replies View Related

Cisco Routers :: RV180 PPTP Clients - Using Remote Gateway

Jul 31, 2012

Is there a way to configure RV180 to allow PPTP clients to route Internet traffic via its own internet connection?
 
I.e. supporting these client options: "Send all traffic" (Mac/iOS), "Use default gateway on remote network" (Windows).

View 1 Replies View Related

Cisco Routers :: RV082 Remote Clients Not Able To Access Server

Jul 25, 2011

I have a RV082 and several of my remote laptops cannot access my server using its domain name. It can be accessed using its internal ip address. The issue is that you can log onto the server using remote access and the ip however you cannot use any shortcuts using the domain name. You can see the server with the domin name however no access path is available. This is only on a few remote user laptops. Others work perfectly.

View 1 Replies View Related

Cisco Firewall :: 5505 Remote VPN Clients Cannot Access Inside LAN

Apr 15, 2012

I have been asked to set up remote access VPN on an ASA 5505 that I previously had no invlovement with.  I have set it up the VPN using the wizard, they way I normally do, but the clients have no access to anything in the inside subnet, not even the inside interface IP address of the ASA.  Thay can ping each other.  The remote access policy below that I am working on is labeled VPNPHONE, address pool 172.16.20.1-10.  I do not need split tunneling to be enabled.  The active WAN interface is the one labeled outside_cable. [code]

View 1 Replies View Related

Cisco VPN :: 1800 - IPSec Remote VPN Clients Unable To Communicate Each Other

Jan 28, 2013

We are configured the Remote IPSec VPN on cisco  1800 series router.The Clients are able to login to VPN and access the local corporate network Servers . But VPN Clients are not able to communicate with  other VPN clients using their VPN Adapter IP.

Components used :
 CISCO VPN Client 5.7
Router 1800 Series

View 9 Replies View Related

Cisco VPN :: 2951 Unable To Lease DHCP Address To Remote Clients

Feb 12, 2013

Im facing with some DHCP lease issue and its like this,Our Cisco 2951 edge router is configured with local dhcp pool for a set of remote users when they connect through Cisco VPN which was working fine until we planned to change it to a Windows box that is configured for DHCP.The basic idea now is to relay the DHCP requests that are coming from the remote clients through Cisco VPN to the DHCP Windows server. So we added the scope on the server and changed the client config on the router as follows (highlighted is the dhcp relay config). [code]

View 1 Replies View Related

Cisco VPN :: 1941 - How To Make Remote Clients To Access Third Party IP Address

May 23, 2013

I've got a Cisco 1941 setup working fine for Cisco Anyconnect. Clients can connect to local resources fine. The issue I have is I need the remote clients to access a third party IP address but to do so they must do it through the VPN. At the moment only local resources are accessed across the vpn and if they need internet they use their own internet connection they are connecting with.I've added the below to make sure traffic going to the IP is going across the VPN.

View 4 Replies View Related

Cisco Wireless :: 2504 - Clients Unable To Connect To Wi-Fi At Remote Location

May 29, 2013

While trying to connect to WiFi at remote sites APs, the connection is getting time out.User are getting error as 'Unable to connect to <WiFi-SSID>' The APs at corporate office are functioning properly and user are able to connect to the APs.
 
Wifi Controller: 2504 Software ver: 7.3.101.0
 
Authentication 802.1x

View 7 Replies View Related

Cisco Switching/Routing :: ASA 5505 - Exchange Remote Clients Cannot Access

Sep 6, 2012

Just installed ASA -5505 replaced cisco 851
 
My exchange server hosts remote outlook clients and remote web access
 
no one on the remote side can access my exchange server
 
internal mail flows in bound and out bound.
 
My iphone can not access the exchange server either.
 
When the Cisco 851 was online all the above worked great. Nothing changed on the remote client side just put the ASA 5505 in service.
 
I am new to the ASSA 5505 family. Had a reseller configure the router but unable to get them at this hour. Called Cisco support but they are closed at this time also.

View 5 Replies View Related

Cisco Switching/Routing :: 3560 Extend VLANs Out To Remote Access Clients

Mar 31, 2013

I am not sure if what I am trying to accomplish is possible. On my internal network I have the following VLANs setup (102, 104, 106) and they map one to one to a subnet (ie: 102 = 192.168.102.0/23, 104 = 192.168.104.0/24, etc).All interVLAN routing is done on a 3560 via vlan SVI. Connected to the 3560 via a routed port is a ASA 5510. The routed port has IP 192.168.100.1 and the ASA interface on the other side of that routed port has IP 192.168.100.2. I use 802.1x on the wired network to assign users (based on their department) into a specific VLAN. I want to extend this concept to Remote VPN access. Therefore I setup multiple Group Policies (policy is applied based on an LDAP attribute) where each policy defines a different DHCP scope. This has successfully allowed me to login wtih different users who get assigned to different Group policies and they obtain the correct DHCP IP address from the internal DHCP server (ie: an engineering person logins remotely and gets an IP in 192.168.102.0 range). However the issue (and as I was planning this out I knew this would come up) is that traffic can be routed out from the VPN client to its destination but there is no return path.

View 3 Replies View Related

Cisco :: Setting Up DHCP For VPN Clients On ASA 5510?

Jun 30, 2011

I'm trying to understand my options for assigning addresses to VPN clients on an ASA 5510. Under the ASDM, I have a field for DHCP servers, radio buttons: none, dhcp link, dhcp subnet, and field: client address pools. Cisco's VPN examples demonstrate setting up a client address pool, which I did, but the VPN client isn't assigned a gateway in the process so it can't connect to anything; I really don't understand the point of this. I'd like to create a DHCP pool on the ASA for VPN clients as this seems to be the standard configuration. However, I don't know where in the ASDM to configure this and how it's applied. The only DHCP options I found involved creating a DHCP server on an interface, which I don't want to do since VPN users aren't on a physical interface, right?

View 6 Replies View Related

Cisco VPN :: Asa 5510 AnyConnect And VPN Clients Using Same Certificate

Dec 2, 2011

Can anyconnect clients and cisco vpn ikev1-2 clients use the same certificate on an ASA 5510 ?

View 4 Replies View Related

Cisco VPN :: 5510 VPN Clients Can't Access DMZ Network

Mar 22, 2012

The title says VPN clients cannot access DMZ network, but that is not exactly the problem, the situation is this, a group of users are using an actual 10.x network where they have their servers and pretty much everything. The users must be relocated into a new network, the 172.16.x.  In a point in time they will not have to use 10.x anymore, but meanwhile, they need access to that network.

I have an ASA 5510 as default gateway for the new network (172.16.x.x), one interface e0/0 connected to the outside (internet), interface e0/1 to the inside and other interface connected to the actual 10.x (which I call DMZ), so basically I am using the ASA as a bridge using NAT to grant access to the users in the network 172.16.x to the resources in the 10.x network while the migration is completed.

All the users must use the path to the internet thru the ASA using the NAT overload to the outside interface and I put in place a NAT policy to 10.x to allow access to the 10.x network only when the internal users 172.16.x try to reach that path and so far, everything is working just fine for the internal users.Now for some reason, when I do VPN, the VPN clients cannot reach the 10.x network, even when they are supposed to be in the internal network (because they are doing VPN right?) .

I have enabled split tunneling with NAT exempt the 172.16 network and I am not sure if that is causing the problem, because when I trace from my PC the 172.16.16.1 address using the VPN I get the proper route path, but when I try to reach 10.x, my PC is using its default gateway and not the VPN gateway which has a route to 10.x.

I’m not even sure if what I am trying to do is possible, I want VPN users to be able to access a 10.x network using NAT overload with the Interface of the ASA plugged to the 10.x network, just like the internal users are doing right now.

View 1 Replies View Related

Cisco VPN :: 5520 Configure Intra Interface Command To Enable Connectivity Between Remote Clients

Feb 3, 2013

I'm working with AnyConnect for the first time (my prior experience is with IPSec client) and I have multiple remote users who connect to a 5520 via AnyConnect client; they need to print to each others' shared printers but currently have no connectivity between each other.
 
Can I configure the 'intra-interface' command to enable connectivity between remote clients, or is there more that needs to be done to enable this, presuming that it can be done at all?

View 3 Replies View Related

Cisco VPN :: Asa 5510 Allow AnyConnect Clients Access To Only Few Servers

Jun 26, 2012

We have 30 remote workers which we have recently acquired which are being set up with the AnyConnect client to connect to our head end ASA 5510. For security purposes, we have to allow them access to only 3 of our local internal servers, all on our 10.10.X.X/16 subnet. The remotes are being issued a 10.10.50.X/24 address via DHCP on the ASA when connecting. I thought this would be as simple as creating an access list but have not had any luck doing so. In addition, we need to allow them full access to servers in a datacenter connected to our same head end ASA via a site-to-site VPN while they are connected to us using AnyConnect.

View 1 Replies View Related

Cisco VPN :: ASA 5510 - Allow AnyConnect Clients Access To Only Few Servers

Mar 19, 2012

We have 30 remote workers which we have recently acquired which are being set up with the AnyConnect client to connect to our head end ASA 5510. For security purposes, we have to allow them access to only 3 of our local internal servers, all on our 10.10.X.X/16 subnet. The remotes are being issued a 10.10.50.X/24 address via DHCP on the ASA when connecting. I thought this would be as simple as creating an access list but have not had any luck doing so. In addition, we need to allow them full access to servers in a datacenter connected to our same head end ASA via a site-to-site VPN while they are connected to us using AnyConnect.

View 4 Replies View Related

Cisco Firewall :: Is Multicast Supported On ASA 5510 For IPSec VPN Clients

Dec 6, 2011

Our customer is using multicast in their internal network for their IP video deployemnt. Internallt on the network everything is working great.
 
We have two folks in management who want to be able to view the live multicast video feeds of the cameras remotely. I have tried to accomplish this using the Cisco VPN client. Although VPN connectivity is good (we can ping the individual cameras) they are unable to view the live multicast feeds. I enabled multicast globally on the ASA and the inside interface and get the same results.
 
Is there a way for the ASA to support the remote IPSec VPN client to view the multicast strams?

View 1 Replies View Related

Cisco Firewall :: 5510 Block URLs Using Regular Expressions For Some Clients

Oct 20, 2012

i use ASA 5510 and i want to block some urls :

-192.168.2.70 to 79 allow every thing
-192.168.2.80  to 89 : block facebook , myspace, twiter,
-192.168.2.90  to 99 : block facebook , myspace, twiter,  youtube , dailymotion
-192.168.2.100 to 199 deny everting

View 1 Replies View Related

Cisco VPN :: Remote VPN In ASA 5510

Nov 5, 2011

We have an ASA 5510 in which remote access VPN os configured. The problem is that we are able to access all the internal resources and after an hour we get disconnected. The VPN is still up though. We have to reconnect VPN to get things going again.

View 0 Replies View Related

Cisco VPN :: ASA 5510 - Remote Access VPN And DNS?

May 25, 2011

I have a remove access vpn configured on my ASA 5510 which works fine, VPN pool easily allocates IP to all remote used , but they have few network drivers shared on their machines & most of them are linked using the computer name rather than the IP which normally doesnt work as VPN pool doesnt provides the DNS IP to the remote clients . Is it possible to allocate DNS IP with the VPN IP ?

View 1 Replies View Related

Cisco VPN :: ASA 5510 As EasyVPN Remote?

Aug 12, 2012

Can the Cisco ASA 5510 appliance be used as an EasyVPN Remote device, or only as an EasyVPN Server?

View 1 Replies View Related

Cisco VPN :: Remote Access VPN ASA 5510

Mar 24, 2013

 I have a problem with a Remote Access VPN on a ASA 5510 8.6.2 .I have created a IPSEC Remote Access VPN through the wizard this is pretty much a base install on the ASA without much configuration.
 
I can connect to the ASA via the Remote Access client and get TX just no RX therefore i cannot access any of the LAN resources. [code]

View 13 Replies View Related

Cisco VPN :: ASA 5510 Remote VPN And Smartphones

Jan 15, 2012

We are about to purchase an ASA 5510 Base K9 where I will have around 50 Remote Access IPSec Users connected . This will work fine however we have couple of non-PC devices which are IPAD OS 4 , BlackBerry Bold/Curv , HTC Android mobiles . I want to know if we can install Cisco Easy VPN Client on these devices

View 5 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved