• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 3133
  • Last Modified:

Unable to ping across VPN tunnel

I have a site to site vpn between an ASA 5505 (remote site) and PIX 515 (corporate headquarters) using the easy vpn feature. When the tunnel is up I'm able to access all the resources at corporate from behind the ASA, but I'm unable to ping anything. Also from corporate I'm unable to ping the inside interface of the ASA. On the ASA I have the easy vpn configuration completed. Below is the config of the PIX at my corporate office that pertains to the vpn tunnel to the ASA.

access-list nonat-vpn extended permit ip 10.1.0.0 255.255.0.0 10.30.1.0 255.255.255.0
access-list nonat-vpn extended permit ip 10.30.1.0 255.255.255.0 10.1.0.0 255.255.0.0

access-list ezvpn1 extended permit ip 10.1.0.0 255.255.0.0 10.30.1.0 255.255.255.0
access-list ezvpn1 extended permit ip 10.30.1.0 255.255.255.0 10.1.0.0 255.255.0.0

global (outside) 1 interface
nat (inside) 0 access-list nonat-vpn
nat (inside) 1 0.0.0.0 0.0.0.0


group-policy ASA internal
group-policy ASA attributes
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value ezvpn1
 nem enable

tunnel-group ASAtest type ipsec-ra
tunnel-group ASAtest general-attributes
 default-group-policy ASA
tunnel-group ASAtest ipsec-attributes
 pre-shared-key *

What I'm trying to accomplish is to be able to ping the ASA's inside interface and hosts behind the ASA from the corporate office. Likewise I would also like to be able to ping from behind the ASA to hosts on my corporate office network.
0
dtadmin
Asked:
dtadmin
  • 7
  • 5
  • 4
  • +1
1 Solution
 
billwhartonCommented:
pinging to pix and asa interfaces is sometimes tricky and is disallowed at times. However, you should be able to ping hosts across the other network just fine. Did you enable icmp inspection on both the pix and asa? what code are you running? v6 or v7?
0
 
dtadminAuthor Commented:
i enabled icmp inspection on the ASA.

the PIX is running 7.2(2)
the ASA is running 7.2(4)
0
 
billwhartonCommented:
enable it on the pix too
0
Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

 
dtadminAuthor Commented:
just did. I will test in the morning and update this posting.
0
 
billwhartonCommented:
ok...
0
 
PugglewuggleCommented:
The reason you are having this trouble is because of the fundamental way Easy VPN works - it is not a bi-directional tunnel.
Easy VPN is meant to be a quick and easy way for big companies to roll out remote offices with minimal configuration. Easy VPN allows the VPN client to access corporate resources on the main network, but DOES NOT ALLOW ANY COMMUNICATION AT ALL back to the remote-site VPN hardware client.
To have bi-directional communication you need to setup a true site-to-site tunnel.
Easy VPN will not do the job. I suggest you review the requirements of the job and start over. If you've got SmartNET, get TAC to help you.
I've attached a Cisco document that explains what the different Site-to--site VPN types are used for.
Cheers! I hope this helps! :-)

Cisco-Site-to-Site-VPN-Technolog.pdf
0
 
dtadminAuthor Commented:
any good links to documentation for a true site to site vpn between a pix515 and ASA5505?
0
 
dtadminAuthor Commented:
well, i got the ping issue from the ASA to work. I can now ping from behind the ASA to hosts on the corporate network behind the PIX. My last question is this. Is it possible to remotely control a PC behind the ASA from the Corporate office? I understand that easy vpn is not bi-directional, but is it possible to initiate a support session from corporate to a host behind the ASA?
0
 
billwhartonCommented:
sure it is. Use something like webex. You can also use listening vnc viewer
http://www.realvnc.com/pipermail/vnc-list/2005-June/051087.html

For vpn examples, i always use this page which lists tons of them
http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html

0
 
PugglewuggleCommented:
I do not believe it is via RDP. You'd have to have some remote support app like bill says.
Basically, if you want to do it in-house - UltraVNC will do the job. Just put a repeater (aka a server accessible on the web - not through the VPN) outside of the VPN and have all computers connect through that. It's very good and it's free.
http://www.uvnc.com/ 
0
 
PugglewuggleCommented:
We use UVNC to support some clients remotely for quick fixes. Remote file transfer and chat and other features are included - and it's free!
0
 
dtadminAuthor Commented:
I found alot of site to site vpn configuration examples, but I'm having trouble locating one that is an example of the ASA side using a dynamic address.
0
 
PugglewuggleCommented:
Hmmm... why not use a static address? If you are doing a one-off deployment then there is no need for dynamic addressing of S2S VPN nodes.
0
 
dtadminAuthor Commented:
I have 76 sites that are DHCP with Fortinet VPN appliances. We are going to be replacing those with Cisco ASA units.
0
 
PugglewuggleCommented:
Ooohh... you didn't mention that. I thought you just had 1.
Even with 76 sites, I still will recommend using static addressing so you can manage them remotely over the VPN tunnel and never have any confusion as to which device has which address.
On the remote-end ASA just enable the command management-access <insert interface name that has telnet or SSH (recommended) enabled.
This is what I've setup in the past. Plus, you can have up to 254 sites with this scheme and then just add more later with another subnet.
0
 
globalsageCommented:
Hi dtadmin,

How do you get corporate network to access the hosts behind the client site (ASA)? I am facing the same problem of yours...

Cheers
Alex
0
 
dtadminAuthor Commented:
you cannot do that with the EZ VPN feature. You need to setup up an actual remote access vpn between the remote office asa and corporate.
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

  • 7
  • 5
  • 4
  • +1
Tackle projects and never again get stuck behind a technical roadblock.
Join Now