I have a Cisco ASA5510 and am trying to set up a VPN. I connect fine but am unable to ping hosts on another interface. The VPN is coming in on the wireless interface and I am trying to contact a host on the patron interface. Here is the config. I cannot find what is blocking the traffic. Any help is appreciated.
ASA Version 7.2(3)!hostname ciscoasadomain-name default.domain.invalidenable password xxxxxxxxxx encryptednames!interface Ethernet0/0 nameif outside security-level 0 ip address dhcp setroute!interface Ethernet0/1 nameif patrons security-level 50 ip address 192.168.99.1 255.255.255.0!interface Ethernet0/2 nameif wireless security-level 50 ip address 192.168.197.1 255.255.255.0!interface Ethernet0/3 nameif citynetwork security-level 100 ip address 10.1.7.5 255.255.255.0!interface Management0/0 nameif management security-level 100 ip address 192.168.1.1 255.255.255.0 management-only!passwd xxxxxxxxxx encryptedftp mode passiveclock timezone CST -6clock summer-time CDT recurringdns server-group DefaultDNS domain-name default.domain.invalidobject-group service EnvisionWaareUDP udp port-object range 1969 1969object-group service EnvisionWareTCP tcp description test port-object range 11958 11958 port-object range 11960 11960 port-object range 1969 1970 port-object range 1978 1978 port-object range 21326 21326 port-object range 30044 30044 port-object range 6987 6987 port-object range 7383 7384access-list wireless_mpc extended permit ip any anyaccess-list outside_access_in extended permit icmp any anyaccess-list inside_nat0_outbound extended permit ip any 192.168.198.0 255.255.255.0access-list patrons_access_in extended permit tcp any host 192.168.99.250 object-group EnvisionWareTCPaccess-list patrons_access_in extended permit udp any host 192.168.99.250 object-group EnvisionWaareUDPaccess-list patrons_access_in extended deny ip 192.168.99.0 255.255.255.0 10.0.0.0 255.0.0.0access-list patrons_access_in extended permit ip any anyaccess-list wireless_cryptomap_65535.20 extended permit ip any anypager lines 24logging asdm informationalmtu outside 1500mtu patrons 1500mtu wireless 1500mtu citynetwork 1500mtu management 1500ip local pool Gobi7 192.168.198.100-192.168.198.150 mask 255.255.255.0ip verify reverse-path interface outsideip verify reverse-path interface patronsip verify reverse-path interface wirelessicmp unreachable rate-limit 1 burst-size 1asdm image disk0:/asdm-523.binno asdm history enablearp timeout 14400global (outside) 1 interfacenat (patrons) 0 access-list inside_nat0_outboundnat (patrons) 1 0.0.0.0 0.0.0.0nat (wireless) 1 0.0.0.0 0.0.0.0static (citynetwork,patrons) 192.168.99.250 10.1.7.212 netmask 255.255.255.255access-group outside_access_in in interface outsideaccess-group patrons_access_in in interface patronsroute citynetwork 10.1.0.0 255.255.0.0 10.1.7.1 1timeout xlate 3:00:00timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00timeout uauth 0:05:00 absolutehttp server enablehttp 10.1.0.0 255.255.0.0 citynetworkhttp 192.168.99.0 255.255.255.0 patronshttp 192.168.1.0 255.255.255.0 managementno snmp-server locationno snmp-server contactsnmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmaccrypto dynamic-map wireless_dyn_map 20 match address wireless_cryptomap_65535.20crypto dynamic-map wireless_dyn_map 20 set pfscrypto dynamic-map wireless_dyn_map 20 set transform-set ESP-3DES-MD5crypto map wireless_map 65535 ipsec-isakmp dynamic wireless_dyn_mapcrypto map wireless_map interface wirelesscrypto isakmp enable wirelesscrypto isakmp policy 10 authentication pre-share encryption 3des hash md5 group 2 lifetime 86400telnet 192.168.99.0 255.255.255.0 patronstelnet 10.1.0.0 255.255.0.0 citynetworktelnet 192.168.1.0 255.255.255.0 managementtelnet timeout 5ssh timeout 5console timeout 0dhcp-client client-id interface outsidedhcpd address 192.168.99.50-192.168.99.225 patronsdhcpd dns 12.207.234.29 12.207.235.32 interface patronsdhcpd enable patrons!dhcpd address 192.168.197.100-192.168.197.200 wirelessdhcpd dns 12.207.234.29 12.207.235.32 interface wirelessdhcpd lease 21600 interface wirelessdhcpd enable wireless!dhcpd address 192.168.1.2-192.168.1.254 managementdhcpd enable management!!class-map wireless-class match access-list wireless_mpcclass-map inspection_default match default-inspection-traffic!!policy-map type inspect dns preset_dns_map parameters message-length maximum 512policy-map global_policy class inspection_default inspect dns preset_dns_map inspect ftp inspect h323 h225 inspect h323 ras inspect rsh inspect rtsp inspect esmtp inspect sqlnet inspect skinny inspect sunrpc inspect xdmcp inspect sip inspect netbios inspect tftp inspect pptppolicy-map wireless-policy class wireless-class police output 3000000 1500!service-policy global_policy globalservice-policy wireless-policy interface wirelessgroup-policy cvpl internalgroup-policy cvpl attributes vpn-tunnel-protocol IPSecusername cvpl password xxxxxxxxxxxxxxxx encrypted privilege 0username cvpl attributes vpn-group-policy cvpltunnel-group cvpl type ipsec-ratunnel-group cvpl general-attributes address-pool Gobi7 default-group-policy cvpltunnel-group cvpl ipsec-attributes pre-shared-key xxxxxxxxxxxxxxxprompt hostname context: endciscoasa#
Thanks for the fast reply. This makes sense as I have never set a VPN up on same security level interfaces. I left that customer office and will go back tomorrow to try. I will post back then.
dsrumer
ASKER
Oddly enough, the command did not work however, by changing the security level of the wireless network to 25, the traffic started flowing. Thanks for the lead JFrederick29!