Link to home
Start Free TrialLog in
Avatar of cegeland
cegelandFlag for Norway

asked on

WEB VPN, Error contacting host when trying to browse server

Hi!
I'm having some issues when I try to browse a file server (or any other pc) from the WEB VPN portal on a Cisco ASA5505.

Sometimes I am prompted for login, and after logging in I am able to list the shared folders, but when I try to enter the folder I get a message saying "Error contacting host". Other times I am not even able to list the shared folders - I get the "Error contacting host" immediately.

File server running Windows 2003 Std Server R2 (AD/DC) , clients use Vista with IE8. When I establish SSL VPN connection using Cisco AnyConnect I have no problems accessing files or folders on the same server.

It would be nice to be able to browse files/folders without installing anything on the client computer, therefore the need for the directory browsing via web.

Attached is my running config.
Result of the command: "show run"
 
: Saved
:
ASA Version 8.0(2) 
!
hostname CiscoGate
domain-name domain.local
enable password xxxxxxxxxxxxxx  encrypted
multicast-routing
names
name 192.168.20.10 Mediaserver01 description Windows media server
name 192.168.20.21 DRAC description DRAC access for server
name 192.168.20.1 CiscoGate description Cisco gate
name 192.168.20.0 Inside-domain
name xxx.xxx.xxx.xxx external IP
!
interface Vlan1
 description Office Vlan
 nameif inside
 security-level 100
 ip address CiscoGate 255.255.255.0 
 ospf cost 10
!
interface Vlan2
 nameif outside
 security-level 0
 ip address xxx.xxx.xxx.xxx 255.255.255.248 
 ospf cost 10
!
interface Vlan22
 description Intermediate mgt interface
 shutdown
 nameif MgtAdmin
 security-level 100
 ip address 192.168.21.1 255.255.255.0 
 ospf cost 10
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
 switchport access vlan 2
!
interface Ethernet0/7
 switchport access vlan 22
!
passwd XXXXXXXXXXXXXXXXXX encrypted
banner login Logging into $(hostname).$(domain) the gate to eOperations
boot system disk0:/asa802-k8.bin
ftp mode passive
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
dns domain-lookup inside
dns domain-lookup outside
dns server-group DefaultDNS
 name-server Mediaserver
 name-server 212.33.135.184
 name-server 212.33.133.33
 name-server 212.33.131.67
 name-server 192.168.10.17
 domain-name domain.local
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object-group protocol TCPUDP
 protocol-object udp
 protocol-object tcp
object-group service DM_INLINE_SERVICE_1
 service-object tcp-udp eq www 
 service-object tcp eq https 
object-group icmp-type DM_INLINE_ICMP_1
 icmp-object echo
 icmp-object echo-reply
 icmp-object router-advertisement
object-group service DM_INLINE_TCP_1 tcp
 port-object eq 5061
 port-object eq 5062
 port-object eq 5063
 port-object eq 5064
access-list MgtAdmin_access_in extended permit ip any any inactive 
access-list outside_access_in extended permit object-group DM_INLINE_SERVICE_1 any 77.241.105.96 255.255.255.248 
access-list outside_access_in extended permit ip Inside-domain 255.255.255.0 any 
access-list outside_access_in extended permit ip 192.168.10.0 255.255.255.0 Inside-domain 255.255.255.0 inactive 
access-list outside_access_in extended permit ip 192.168.11.0 255.255.255.0 Inside-domain 255.255.255.0 inactive 
access-list outside_access_in extended permit ip Inside-PXO 255.255.255.0 Inside-domain 255.255.255.0 
access-list outside_access_in extended permit icmp 192.168.11.0 255.255.255.0 Inside-domain 255.255.255.0 object-group DM_INLINE_ICMP_1 
access-list outside_access_in extended permit tcp any host project.domain.com eq https 
access-list outside_access_in extended permit tcp any host sip.domain.com object-group DM_INLINE_TCP_1 
access-list outside_access_in extended permit tcp host sip.domain.com host AV-Matrix eq 3389 inactive 
access-list outside_access_in extended permit tcp any host project.domain.com eq www 
access-list outside_access_in extended permit tcp any host project.domain.com eq 1755 
access-list outside_access_in extended permit udp any host project.domain.com eq 1755 
access-list inside_authentication extended permit tcp any any inactive 
access-list inside_access_in extended permit ip Inside-domain 255.255.255.0 Inside-domain 255.255.255.0 
access-list inside_nat0_outbound extended permit ip Inside-domain 255.255.255.0 192.168.11.0 255.255.255.0 
access-list inside_nat0_outbound extended permit ip Inside-domain 255.255.255.0 192.168.10.0 255.255.255.0 
access-list inside_nat0_outbound extended permit ip Inside-domain 255.255.255.0 Inside-domain 255.255.255.0 
access-list inside_nat0_outbound extended permit ip host mediaserver Inside-domain 255.255.255.128 
access-list inside_nat0_outbound extended permit ip host mediaserver 192.168.20.64 255.255.255.224 
access-list inside_nat0_outbound extended permit ip host 192.168.20.31 host sip.domain.com
access-list inside_access_in_1 extended permit ip 192.168.11.0 255.255.255.0 Inside-domain 255.255.255.0 inactive 
access-list inside_access_in_1 extended permit ip any any 
access-list inside_access_in_1 extended permit icmp Inside-domain 255.255.255.0 192.168.11.0 255.255.255.0 
access-list inside_access_in_1 extended permit ip Inside-domain 255.255.255.0 host project.domain.com 
access-list VPNs_splitTunnelAcl standard permit Inside-domain 255.255.255.0 
access-list MgtAdmin_nat0_outbound extended permit ip any 192.168.20.64 255.255.255.224 
access-list MgtAdmin_nat0_outbound extended permit ip any Inside-domain 255.255.255.128 
access-list outside_3_cryptomap extended permit ip Inside-domain 255.255.255.0 192.168.10.0 255.255.255.0 inactive 
access-list VPN_splitTunnelAcl standard permit host Mediaserver 
access-list VPNtest_splitTunnelAcl standard permit host Mediaserver
access-list DefaultRAGroup_splitTunnelAcl standard permit any 
pager lines 24
logging enable
logging buffered debugging
logging asdm informational
mtu inside 1500
mtu outside 1500
mtu MgtAdmin 1500
ip local pool OutsideVPNs 192.168.20.50-192.168.20.70 mask 255.255.255.0
ip local pool VPNInside 192.168.20.71-192.168.20.90 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any inside
asdm image disk0:/asdm-602.bin
asdm history enable
arp timeout 14400
global (outside) 2 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 2 Inside-domain 255.255.255.0 dns
nat (MgtAdmin) 0 access-list MgtAdmin_nat0_outbound
static (inside,outside) tcp project.domain.com 3389 Mediaserver 3389 netmask 255.255.255.255 
static (inside,outside) tcp project.domain.com https Mediaserver https netmask 255.255.255.255 
static (inside,outside) tcp project.domain.com 1755 Mediaserver 1755 netmask 255.255.255.255 
static (inside,outside) udp project.domain.com  1755 Mediaserver 1755 netmask 255.255.255.255 
static (inside,outside) tcp domain.com www Mediaserver 81 netmask 255.255.255.255  dns 
static (inside,outside) tcp project.domain.com www Mediaserver 100 netmask 255.255.255.255 
static (inside,outside) udp project.domain.com 554 Mediaserver 554 netmask 255.255.255.255 
static (inside,outside) sip.domain.com 192.168.20.31 netmask 255.255.255.255 
access-group inside_access_in_1 in interface inside
access-group outside_access_in in interface outside
access-group MgtAdmin_access_in in interface MgtAdmin
!
router rip
 passive-interface MgtAdmin
 version 1
!
route outside 0.0.0.0 0.0.0.0 77.241.105.97 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
dynamic-access-policy-record DfltAccessPolicy
 network-acl inside_authentication
 network-acl outside_access_in
 webvpn
  url-list value OfficeIntra
aaa-server Mediaserver protocol radius
 max-failed-attempts 5
aaa-server Mediaserver host Mediaserver
 key XXXX
 radius-common-pw XXXX
aaa authentication enable console LOCAL 
aaa authentication match inside_authentication inside LOCAL
aaa authentication http console LOCAL 
aaa authorization command LOCAL 
aaa local authentication attempts max-fail 6
http server enable
http 192.168.11.0 255.255.255.0 inside
http 192.168.10.0 255.255.255.0 inside
http Inside-domain 255.255.255.0 inside
http 192.168.21.0 255.255.255.0 MgtAdmin
snmp-server location Mediaserver
snmp-server contact XXXX
snmp-server community XXXX
snmp-server enable traps snmp authentication linkup linkdown coldstart
snmp-server enable traps ipsec start
sysopt noproxyarp MgtAdmin
auth-prompt prompt User known 
auth-prompt accept Known user ok 
auth-prompt reject Not ok 
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac 
crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport
crypto ipsec fragmentation after-encryption MgtAdmin
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs 
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5 TRANS_ESP_3DES_SHA
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map inside_map interface inside
crypto ca trustpoint ASDM_TrustPoint0
 enrollment self
 fqdn CiscoGate
 subject-name CN=CiscoGate
 ip-address xxx.xxx.xxx.xxx
 no client-types
 proxy-ldc-issuer
 crl configure
crypto ca trustpoint LOCAL-CA-SERVER
 keypair LOCAL-CA-SERVER
 crl configure
crypto ca trustpoint ASDM_TrustPoint2
 enrollment terminal
 fqdn CiscoGate
 subject-name CN=CiscoGate
 ip-address xxx.xxx.xxx.xxx
 keypair LOCAL-CA-SERVER
 no client-types
 crl configure
crypto ca trustpoint ASDM_TrustPoint1
 enrollment terminal
 fqdn CiscoGate.domain.local
 subject-name CN=CiscoGate.domain.local
 serial-number
 ip-address xxx.xxx.xxx.xxx
 keypair LOCAL-CA-SERVER
 no client-types
 crl configure
crypto ca trustpoint ASDM_TrustPoint3
 enrollment terminal
 crl configure
crypto ca trustpoint ASDM_TrustPoint4
 enrollment terminal
 crl configure
crypto ca trustpoint ASDM_TrustPoint5
 enrollment terminal
 crl configure
crypto ca server 
 shutdown
crypto ca certificate map DefaultCertificateMap 10
crypto ca certificate chain ASDM_TrustPoint0
 certificate 31
    30820265 308201ce a0030201 02020131 300d0609 2a864886 f70d0101 04050030 
    46311030 0e060355 04031307 50584f47 61746531 32301406 092a8648 86f70d01 
    09021607 50584f47 61746530 1a06092a 864886f7 0d010908 130d3737 2e323431 
    2e313035 2e393830 1e170d30 38303630 32313130 3934365a 170d3138 30353331 
    31313039 34365a30 46311030 0e060355 04031307 50584f47 61746531 32301406 
    092a8648 86f70d01 09021607 50584f47 61746530 1a06092a 864886f7 0d010908 
    130d3737 2e323431 2e313035 2e393830 819f300d 06092a86 4886f70d 01010105 
    0003818d 00308189 02818100 c4430f2a 4eb6f309 a6eca89b f48d4ab4 e90497a9 
    2c28220f a0f83b98 cd1c6469 1c93252d db1cc74b 07e0e517 c2b146f8 0dbc6c8d 
    c5ba33b2 41357cf7 e220b1f2 c6613484 c81dae2c 0e4864d8 400c055c 0cc688fd 
    5190b6ef 553e88f6 d3624078 0cd32f45 bbb7f1f3 8e7bc613 0a793583 3128f8bc 
    946be939 7bf57623 38075249 02030100 01a36330 61300f06 03551d13 0101ff04 
    05300301 01ff300e 0603551d 0f0101ff 04040302 0186301f 0603551d 23041830 
    16801422 29c1c341 fba881ba 2800db67 1e69c849 d6c5dc30 1d060355 1d0e0416 
    04142229 c1c341fb a881ba28 00db671e 69c849d6 c5dc300d 06092a86 4886f70d 
    01010405 00038181 00bce40e 762b40f6 d6d9d30d 827a348f 86630fab e233e054 
  quit
crypto ca certificate chain LOCAL-CA-SERVER
 certificate ca 01
    30820211 3082017a a0030201 02020101 300d0609 2a864886 f70d0101 04050030 
    1c311a30 18060355 04031311 50584f47 6174652e 50584f2e 6c6f6361 6c301e17 
    0d303830 36303231 31343330 385a170d 31313036 30323131 34333038 5a301c31 
    1a301806 03550403 13115058 4f476174 652e5058 4f2e6c6f 63616c30 819f300d 
    c22bff5d dc0b1d2f e25d57f2 87dac210 6e327da4 716a517f 75222dee 347ba4d8 
    bee57e6e 5c15dabf f704bb0d b56b55c6 5fa754d0 03aefc48 64011f18 05f3a3ec 
    d5eb3436 8684ed3a f7bb501a 4a02105c ee654e10 cbd80cb5 02030100 01a36330 
    61300f06 03551d13 0101ff04 05300301 01ff300e 0603551d 0f0101ff 04040302 
    0186301f 0603551d 23041830 1680140c c1f83836 a2b8731c bb3390d0 46bfd253 
    66cdc030 1d060355 1d0e0416 04140cc1 f83836a2 b8731cbb 3390d046 bfd25366 
    e482015a 2a8ca854 f6f9b89c 776ab0ef e9a17121 0efaeaed 8db818c4 d39e0154 
    0e5aea78 045b6ebb 771810af f34f0c0a 753885c3 9df995fb fb2bde72 c8cbd8af 
    d7048178 0e5ea08b b9734dbd dee1a0b9 2bdeb7bb fb
  quit
crypto isakmp identity address 
crypto isakmp enable inside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp policy 30
 authentication pre-share
 encryption des
 hash md5
 group 1
 lifetime 86400
crypto isakmp policy 50
 authentication pre-share
 encryption 3des
 hash md5
 group 1
 lifetime 86400
crypto isakmp policy 70
 authentication pre-share
 encryption 3des
 hash md5
 group 2
 lifetime 86400
no crypto isakmp nat-traversal
telnet Inside-domain 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0
management-access inside
dhcpd dns Mediaserver 212.33.135.184
dhcpd auto_config outside vpnclient-wins-override
dhcpd option 4 ip 129.240.64.3
!
dhcpd address 192.168.20.100-192.168.20.200 inside
dhcpd dns Mediaserver 212.33.133.33 interface inside
dhcpd wins Mediaserver interface inside
dhcpd lease 39600 interface inside
dhcpd domain domain.local interface inside
dhcpd enable inside
!
dhcpd dns Mediaserver interface outside
dhcpd domain domain.com interface outside
dhcpd update dns both interface outside
dhcpd option 6 ip Mediaserver interface outside
!
 
threat-detection basic-threat
threat-detection statistics
!
class-map inspection_default
 match default-inspection-traffic
!
!
policy-map type inspect dns preset_dns_map
 parameters
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map 
  inspect ftp 
  inspect h323 h225 
  inspect h323 ras 
  inspect rsh 
  inspect rtsp 
  inspect esmtp 
  inspect sqlnet 
  inspect skinny  
  inspect sunrpc 
  inspect xdmcp 
  inspect sip  
  inspect netbios 
  inspect tftp 
!
service-policy global_policy global
ntp server 129.240.64.3 source outside
ssl trust-point ASDM_TrustPoint0 outside
ssl trust-point ASDM_TrustPoint0 inside
webvpn
 enable inside
 enable outside
 svc image disk0:/anyconnect-win-2.2.0140-k9.pkg 1
 svc image disk0:/anyconnect-macosx-i386-2.2.0140-k9.pkg 2
 svc image disk0:/anyconnect-macosx-powerpc-2.2.0140-k9.pkg 3
 svc profiles OfficeVPN disk0:/OfficeVPN.xml
 svc profiles SBL disk0:/AnyConnectProfile.xml
 svc enable
 tunnel-group-list enable
 certificate-group-map DefaultCertificateMap 10 OFFICE-SSLVPN
group-policy SSLClientGrpPolicy internal
group-policy SSLClientGrpPolicy attributes
 wins-server value 192.168.20.10
 dns-server value 192.168.20.10 212.33.131.67
 vpn-tunnel-protocol IPSec svc webvpn
 split-tunnel-policy tunnelall
 split-tunnel-network-list value VPNs_splitTunnelAcl
 webvpn
  url-list value OfficeIntra
  svc modules value vpngina
  svc profiles value SBL
  svc ask enable default webvpn
group-policy DefaultRAGroup_2 internal
group-policy DefaultRAGroup_2 attributes
 wins-server value 192.168.20.10
 dns-server value 192.168.20.10
 vpn-tunnel-protocol l2tp-ipsec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl
 default-domain value domain.local
group-policy DefaultRAGroup internal
group-policy DefaultRAGroup attributes
 vpn-tunnel-protocol IPSec l2tp-ipsec 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value VPNs_splitTunnelAcl
 default-domain value domain.local
 split-dns value 192.168.20.10 
 msie-proxy method no-modify
 address-pools value OutsideVPNs
 client-firewall none
group-policy DefaultRAGroup_1 internal
group-policy DefaultRAGroup_1 attributes
 dns-server value 192.168.20.10
 vpn-tunnel-protocol IPSec l2tp-ipsec 
 default-domain value domain.local
 vlan none
 address-pools value VPNInside
 client-firewall none
group-policy DfltGrpPolicy attributes
 wins-server value 192.168.20.10
 dns-server value 192.168.20.10 212.33.131.67
 vpn-tunnel-protocol IPSec svc 
 split-tunnel-network-list value VPNs_splitTunnelAcl
 webvpn
  url-list value OFFICEIntra
group-policy OfficeVPNs internal
group-policy OfficeVPNs attributes
 wins-server value 192.168.20.10
 dns-server value 192.168.20.10 212.33.131.67
 vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value VPNs_splitTunnelAcl
 default-domain value domain.local
 msie-proxy local-bypass enable
 vlan none
 webvpn
  url-list value OfficeIntra
  svc keep-installer installed
  svc profiles value OfficeVPN
  customization value Office
  hidden-shares none
  file-entry enable
  file-browsing enable
  url-entry enable
group-policy SBL internal
group-policy SBL attributes
 webvpn
  svc modules value vpngina
  svc profiles value SBL
group-policy VPN internal
group-policy VPN attributes
 wins-server value 192.168.20.10
 dns-server value 192.168.20.10
 vpn-tunnel-protocol IPSec l2tp-ipsec svc 
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value VPN_splitTunnelAcl
 default-domain value domain.local
 webvpn
  svc ask enable default webvpn
username vpn-toin password XXXXXXXXXXXXXXXXX== nt-encrypted
username vpn-toin attributes
 service-type remote-access
username Admin password XXXXXXXXXXXXXXX encrypted privilege 15
username user password XXXXXXXXXXXXXXX encrypted privilege 15
tunnel-group DefaultRAGroup general-attributes
 address-pool VPNInside
 address-pool OutsideVPNs
 authentication-server-group Mediaserver 
 authentication-server-group (inside) LOCAL
 authorization-server-group LOCAL
 authorization-server-group (inside) LOCAL
 default-group-policy DefaultRAGroup_2
 strip-realm
 strip-group
 authorization-dn-attributes CN
tunnel-group DefaultRAGroup webvpn-attributes
 group-alias sSSL disable
tunnel-group DefaultRAGroup ipsec-attributes
 pre-shared-key *
 peer-id-validate nocheck
 isakmp keepalive disable
tunnel-group DefaultRAGroup ppp-attributes
 authentication ms-chap-v2
tunnel-group DefaultWEBVPNGroup webvpn-attributes
 customization Office
tunnel-group DefaultWEBVPNGroup ipsec-attributes
 pre-shared-key *
tunnel-group TunnelGroup1 type remote-access
tunnel-group TunnelGroup1 general-attributes
 address-pool OutsideVPNs
 dhcp-server CiscoGate
tunnel-group TunnelGroup1 webvpn-attributes
 group-alias PKAsTunnel disable
tunnel-group TunnelGroup1 ipsec-attributes
 pre-shared-key *
tunnel-group OFFICEWEB type remote-access
tunnel-group OFFICEWEB general-attributes
 address-pool OutsideVPNs
 authentication-server-group Mediaserver 
 default-group-policy VPN
 dhcp-server CiscoGate
tunnel-group OFFICEWEB webvpn-attributes
 hic-fail-group-policy SSLClientGrpPolicy
 customization OFFICE
 group-alias Public disable
tunnel-group OFFICEWEB ipsec-attributes
 pre-shared-key *
tunnel-group OFFICEWEB ppp-attributes
 authentication pap
 authentication ms-chap-v2
 authentication eap-proxy
tunnel-group OFFICE-SSLVPN type remote-access
tunnel-group OFFICE-SSLVPN general-attributes
 address-pool VPNInside
 authentication-server-group Mediaserver LOCAL
 default-group-policy OFFICEVPNs
 dhcp-server CiscoGate
 authorization-required
tunnel-group OFFICE-SSLVPN webvpn-attributes
 customization OFFICE
 group-alias OFFICE enable
tunnel-group OFFICE-SSLVPN ipsec-attributes
 pre-shared-key *
 trust-point ASDM_TrustPoint0
tunnel-group OFFICE-SSLVPN ppp-attributes
 authentication pap
 authentication ms-chap-v2
tunnel-group OFFICE-SSLVPN2 type remote-access
tunnel-group OFFICE-SSLVPN2 general-attributes
 address-pool VPNInside
 default-group-policy OFFICEVPNs
 dhcp-server CiscoGate
tunnel-group OFFICE-SSLVPN2 webvpn-attributes
 group-alias OFFICEBackup enable
privilege cmd level 3 mode exec command perfmon
privilege cmd level 3 mode exec command ping
privilege cmd level 3 mode exec command who
privilege cmd level 3 mode exec command logging
privilege cmd level 3 mode exec command failover
privilege show level 5 mode exec command import
privilege show level 5 mode exec command running-config
privilege show level 3 mode exec command reload
privilege show level 3 mode exec command mode
privilege show level 3 mode exec command firewall
privilege show level 3 mode exec command interface
privilege show level 3 mode exec command clock
privilege show level 3 mode exec command dns-hosts
privilege show level 3 mode exec command access-list
privilege show level 3 mode exec command logging
privilege show level 3 mode exec command ip
privilege show level 3 mode exec command failover
privilege show level 3 mode exec command asdm
privilege show level 3 mode exec command arp
privilege show level 3 mode exec command route
privilege show level 3 mode exec command ospf
privilege show level 3 mode exec command aaa-server
privilege show level 3 mode exec command aaa
privilege show level 3 mode exec command eigrp
privilege show level 3 mode exec command crypto
privilege show level 3 mode exec command vpn-sessiondb
privilege show level 3 mode exec command ssh
privilege show level 3 mode exec command dhcpd
privilege show level 3 mode exec command vpnclient
privilege show level 3 mode exec command vpn
privilege show level 3 mode exec command blocks
privilege show level 3 mode exec command wccp
privilege show level 3 mode exec command webvpn
privilege show level 3 mode exec command uauth
privilege show level 3 mode exec command compression
privilege show level 3 mode configure command interface
privilege show level 3 mode configure command clock
privilege show level 3 mode configure command access-list
privilege show level 3 mode configure command logging
privilege show level 3 mode configure command ip
privilege show level 3 mode configure command failover
privilege show level 5 mode configure command asdm
privilege show level 3 mode configure command arp
privilege show level 3 mode configure command route
privilege show level 3 mode configure command aaa-server
privilege show level 3 mode configure command aaa
privilege show level 3 mode configure command crypto
privilege show level 3 mode configure command ssh
privilege show level 3 mode configure command dhcpd
privilege show level 5 mode configure command privilege
privilege clear level 3 mode exec command dns-hosts
privilege clear level 3 mode exec command logging
privilege clear level 3 mode exec command arp
privilege clear level 3 mode exec command aaa-server
privilege clear level 3 mode exec command crypto
privilege cmd level 3 mode configure command failover
privilege clear level 3 mode configure command logging
privilege clear level 3 mode configure command arp
privilege clear level 3 mode configure command crypto
privilege clear level 3 mode configure command aaa-server
prompt hostname context 
Cryptochecksum:
: end

Open in new window

Avatar of Les Moore
Les Moore
Flag of United States of America image

It could be a problem with IE8. Have you tried using it in compatibiltiy mode?
WebVPN client (java download) doesn't work well with Vista at all, either. I have to keep a XP/IE7 virtual machine ready just for connecting to clients with WebVPN only. AnyConnect is vastly preferred. It is a quick, painless one-time install.
Avatar of cegeland

ASKER

I tried compatibility mode, no success. I had it working, but after modifying the VPN profile in use to accept Client SSL connections instead of IPSEC it stopped working.

Unfortunately I cannot remember which settings I changed, so I was hoping someone had experience with this type of problem.

AnyConnect is the primary way to connect, but sometimes users are out of office without their laptop and need to access files on the server. The users cannot install any applications due to GPO restrictions, and therefore WEB VPN is the only solution.

I can also add that when I try to browse the network i get a message saying: "Failed to retrieve domains"
CSCsl94183 Bug Details
 ASA- Clientless webvpn 'error contacting host' accessing CIFS shares  

Symptom:
Customer browsing CIFS links through clientless webvpn or clicking the link for 'browse the entire network' may get the following message:

'Error Contacting Host'

Conditions:
Workaround:
Re-loading the ASA resolves the issue.

Further Problem Description:

A capture on the interface between the ASA and the CIFS server being accessed will reveal no traffic is destined to that server from the ASA.

 
CSCsl94183 Bug Details
 ASA- Clientless webvpn 'error contacting host' accessing CIFS shares  

Symptom:

Customer browsing CIFS links through clientless webvpn or clicking the link for 'browse the entire network' may get the following message:

'Error Contacting Host'


Conditions:


Workaround:

Re-loading the ASA resolves the issue.

Further Problem Description:

A capture on the interface between the ASA and the CIFS server being accessed will reveal no traffic is destined to that server from the ASA.

 
Status
Fixed

Severity
3 - moderate

Last Modified
In Last Year

Product
Cisco ASA 5500 Series Adaptive Security Appliances

Technology


1st Found-In
8.0(2)
8.0(3)

Fixed-In
8.0(3.11)
8.1(1.2)
8.0(103.9)  

So, please upgrade the software and see if the problem has been solved !

A/
I've tried restarting the router (pulled power), no success - I guess I should try a software update - will I loose all my settings if I do?

I inherited this system and I haven't had the time to figure out all the settings, neither do I have sufficient "cisco knowledge" to reconfigure the router from scratch.
Hi,

Safe the configuratinon with the command: "write mem [enter]"

For sure, make copy the output of the command "show run" and paste it to notepad and save it.

A/
OK I've backed up my config, but when I run the upgrade wizard in the ASDM it looks like you need some sort of support contract to be able to get firmware updates. We bought the router 2 years ago - is there any other way to get hold of the upgrade?

All I'm looking for is a fix for this WEB VPN issue. Now when I pull the power on the router I am able to browse the server for a couple of hours, then the problem returns.

They only legal way to get the upgrades are through Cisco with a valid support contract.
I contacted Cisco and recovered my service contract. Upgradet to version 8.0(4). Still same error.

What could be causing this?
I am running version 8(0)4.16 code on ASA 5510 devices  and experiencing the same problem.
After upgrading the ASA it looks like the error still occurs after a couple of hours - browsing works fine for a couple of hours after reloading router.
Hi,

Please try with IE6 and FireFox Browser !

Also I want to know the svc version you'r using. (dir disk0: [enter]). If not the newest one please update/grade.

A/
Wow - it actually works with FireFox - seems to be an IE8 issue then? Below is the results of "dir disk0:" Which service version is running?

Result of the command: "dir disk0:"

Directory of disk0:/

156    -rwx  8386560     19:12:34 Mar 04 2008  asa723-k8.bin
157    -rwx  4181246     19:13:02 Mar 04 2008  securedesktop-asa-3.2.1.103-k9.pkg
158    -rwx  398305      19:13:16 Mar 04 2008  sslclient-win-1.1.0.154.pkg
159    -rwx  6287244     19:14:40 Mar 04 2008  asdm-523.bin
66     drwx  4096        11:48:16 Jan 25 2009  crypto_archive
161    -rwx  14524416    00:01:04 Apr 02 2008  asa802-k8.bin
162    -rwx  6889764     00:05:56 Apr 02 2008  asdm-602.bin
163    -rwx  3219872     00:06:48 Apr 02 2008  securedesktop-asa-3.2.0.136-k9.pkg
164    -rwx  2206062     00:07:52 Apr 02 2008  sslclient-win-1.1.4.176-anyconnect.pkg
62     drwx  4096        08:48:26 Apr 04 2008  log
165    -rwx  89          22:41:04 Aug 20 2009  dap.xml
166    drwx  4096        07:26:21 Sep 07 2009  LOCAL-CA-SERVER
167    -rwx  2154944     14:05:44 Apr 16 2009  anyconnect-win-2.2.0140-k9.pkg
168    -rwx  502         15:10:54 Mar 30 2009  AnyConnectProfile.xml
169    -rwx  14137344    15:11:30 Sep 03 2009  asa804-k8.bin
170    -rwx  3412522     14:08:00 Apr 16 2009  anyconnect-macosx-i386-2.2.0140-k9.pkg
171    -rwx  3446536     14:08:28 Apr 16 2009  anyconnect-macosx-powerpc-2.2.0140-k9.pkg

126849024 bytes total (56348672 bytes free)
Ooops - not quite. Seems like the WEB VPN access works periodically - now when I try firefox it throws the same error message; error contacting host. I've also tried IE 7 - same error.
Can you confirm that this is happening on all your servers. In otherwords, create a share on another server and check if you can replicate the "Error Contacting Host" message.

In addition, I would like to know if all of you are experiencing this problem accessing CIFS shares immediately behind the SSL VPN termination point, or if the CIFS shares are on machines connected via L2L tunnels  to the SSL VPN terminating firewall?

SSL-Enabled Browser --->SSL Terminating Device (ASA or Router) ------> CIFS share?
                                                  OR
SSL-Enabled Browser ----> SSL Terminating Device(ASAor Router) -----------L2L tunnel ------> CIFS Share?

In my case, I am noticing that newly-created shares and administrative shares are still accessible (i.e. prompt for credentials). I am focusing some attention on the CIFS server as well. Will try a reboot of the server.

Finally, we have some file synchronization software on this server, so I will consider that as well as I troubleshoot the issue.

G
Results

Restart of Server - no change
Disabling of File Sync Software - no change
Activating Standby NIC / Disabling Original NIC - now able to browse CIFS shares :)

Wondering if this is also going to be a temporary fix to the issue
FYI, I am now able to access CIFS shares in both scenarios:

SSL-Enabled Browser --->SSL Terminating Device (ASA or Router) ------> CIFS share?
                                                  OR
SSL-Enabled Browser ----> SSL Terminating Device(ASAor Router) -----------L2L tunnel ------> CIFS Share?
My setup is:
SSL-Enabled Browser --->SSL Terminating Device (ASA or Router) ------> CIFS share

I get the same error accessing 3 different CIFS shares (1 windows 2003 AD/DC, 2x Vista workstations). Sometimes I am prompted for username/passord. Other times I just get the error connecting to host.

As of right now it is working. 20 minutes ago it wasn't and I haven't done anything to any servers/workstations.

Tried restarting server - no change in stability.
Apparently there's a 8.2.1.ED version out there for ASA5505. Maybe an upgrade to this later version will solve the problem.
ASKER CERTIFIED SOLUTION
Avatar of cegeland
cegeland
Flag of Norway image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial