![]() ![]() Tunnel-group MY_TUNNEL general-attributes Tunnel-group MY_TUNNEL type remote-access Cisco asa 5505 default ip password#Username andrew.burger password hPmaC1bXkbJlXpLy encrypted privilege 15 Split-tunnel-network-list value SPLIT_TUNNEL Vpn-tunnel-protocol ssl-client ssl-clientless Group-policy ANYCONNECT_POLICY attributes No threat-detection statistics tcp-interceptĪnyconnect image disk0:/anyconnect-win-k9.pkg 1 Snmp-server enable traps snmp authentication linkup linkdown coldstart warmstartĬrypto ipsec security-association pmtu-aging infinite Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absoluteĭynamic-access-policy-record DfltAccessPolicy Nat (inside,outside) source dynamic any interface Icmp unreachable rate-limit 1 burst-size 1 ![]() Below is my ASA Config: ASA Version 9.0(4)Įnable password 8Ry2YjIyt7RRXU24 encrypted I would like to be able to access my end devices via the VPN. My topology is a ASA 5505 - 1841 Router - 2960 switch - end devices I will try what timjim88 recommended using a laptop.So I have a ASA I can connect via SSL perfectly fine receiving internet.My issue is that I cannot ping any device on the network especially the inside network on my router. I have made the changes you recommended with the followingĪSA(config-pmap)# class inspection_defaultĪSA2(config)#service-policy global_policy globalĬryptochecksum:4174c801ae1f267493f6a0ce05e2e820ĭoes this look correct as far as adding HTTP to default inspection traffic? If this is correct then it is still not working. No i can not get out to the internet from 192.168.2.xxx. The real kicker is i am able to plug in a simple Linksys router and it works.Īny help solving this will be appreciated. Policy-map type inspect dns preset_dns_map No threat-detection statistics tcp-intercept Snmp-server enable traps snmp authentication linkup linkdown coldstart warmstartĬrypto ipsec security-association pmtu-aging infiniteĬrypto ca trustpoint _SmartCallHome_ServerCAĬrypto ca certificate chain _SmartCallHome_ServerCAĬertificate ca 6ecc7aa5a7032009b8cebcf4e952d491ĭhcpd address 192.168.2.2-192.168.2.80 inside ![]() Nat (PHONE_VLAN_4,inside) static 192.168.4.0Īccess-group outbound in interface insideĪccess-group vlan4_outbound in interface PHONE_VLAN_4 Nat (PHONE_VLAN_4,outside) dynamic interface Same-security-traffic permit intra-interfaceĪccess-list vlan4_outbound extended permit ip 192.168.4.0 255.255.255.0 anyĪccess-list outbound extended permit ip 192.168.2.0 255.255.255.0 any Same-security-traffic permit inter-interface Below is the sh run from the ASA.Įnable password Iac1OnNVgu8lYsJl encrypted I have tried different suggestion from the web, but none seem to do the trick. I have been trying to setup my ASA to route back to the ASA gateway. I am a newbie, lets just get that out of the way. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |