Cisco VPN config Issue?

nitrobass24

[H]ard|DCer of the Month - December 2009
Joined
Apr 7, 2006
Messages
10,466
I have a 5505 at home that i am using. Just got VPN configured for IPSEC so i can connect in, using my iphone.

What i would like to do is use Remote Potato over VPN.
I have it setup and working, when i am on the wireless internally; however, when i go to 3G and VPN i can connect to the server, browse files, but it will not start playing. Would i need to open any ports even though i have connected via VPN?

EDIT: Problem 2, I need to Tunnel-All, so how can i configure NAT for my VPN ip pool to redirect web traffic back out the outside interface?

I have attached my current config.

Code:
: Saved
:
ASA Version 8.4(1) 
!
hostname ciscoasa
domain-name davis.local
enable password 8Ry2YjIyt7RRXU24 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address dhcp setroute 
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
dns server-group DefaultDNS
 domain-name davis.local
object network obj_any 
 subnet 0.0.0.0 0.0.0.0
object network NETWORK_OBJ_192.168.2.0_24 
 subnet 192.168.2.0 255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool iphone 192.168.2.1-192.168.2.255 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
no asdm history enable
arp timeout 14400
nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24
!
object network obj_any
 nat (inside,outside) dynamic interface
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto ca server 
 cdp-url http://ciscoasa.davis.com/+CSCOCA+/asa_ca.crl
 publish-crl inside 80
crypto ikev1 enable outside
crypto ikev1 policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
telnet timeout 5
ssh timeout 5
console timeout 0
vpn-addr-assign local reuse-delay 5

dhcpd auto_config outside
!
dhcpd address 192.168.1.5-192.168.1.36 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
webvpn
group-policy iphone internal
group-policy iphone attributes
 dns-server value 192.168.1.5
 vpn-tunnel-protocol ikev1 
 default-domain value davis.local
username stephen nopassword privilege 0
username stephen attributes
 vpn-group-policy iphone
tunnel-group iphone type remote-access
tunnel-group iphone general-attributes
 address-pool iphone
 default-group-policy iphone
tunnel-group iphone ipsec-attributes
 ikev1 pre-shared-key *****
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum client auto
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
  inspect ip-options 
!
service-policy global_policy global
prompt hostname context 
Cryptochecksum:e09ada06bd5c0cc37a0773d6ab040d5a
: end
 
Last edited:
shouldn't need to, being on the VPN should treat everything as if you were local. does it work if you are on the same network?

Also since you posted the entire conf file. not sure how easy it is to decrypt the newer passwords, but you might want to change them now that you posted them online for everyone to see.
 
After briefly looking at your config, my first guess would be that your vpn ip range exists inside of your inside ip range. This may present some issues, you may want to look into using a different range for your vpns, possibly 192.168.2.0/28.
 
After briefly looking at your config, my first guess would be that your vpn ip range exists inside of your inside ip range. This may present some issues, you may want to look into using a different range for your vpns, possibly 192.168.2.0/28.

Ahhh yes it is.

Alright, went back reset everything, reran the VPN ipsec wizard using a new pool and it works just like it should.

Thank you.
 
Last edited:
Hmm looked up haripinning to try to address my internet issue.

Tried adding

same-security-traffic permit intra-interface

but no dice.
 
OK had to do two things.

same-security-traffic permit intra-interface
nat (outside,outside) source dynamic NET-VPNPOOL interface
 
Back
Top