I'm having a problem getting my little 5505 to pass VPN traffic into my internal network. Currently I'm authenticating successfully with the ASA using a Win7 Cisco client (220.127.116.11.x) and the firewall rule shows permit for VPN-Clients in ADSM. My network is as follows:
- 69.x (Primary Internet)
- 65.x (Backup Internet T1)
- ASA - Both Internet Interfaces above and Internal 10.x network, which tosses to Our 3750 core switch (total of three active interfaces)
- Core 3750 switch routes all traffic out the ASA through a single connection 10.10.254.25x/30
So I'm connecting in through the primary internet connection using the 18.104.22.168.x client on Win7 x64 (I've even tried on an XP client before). The firewall rule is permitting me through the ASA, I'm getting an IP in the VPN Pool. I can't ping my router 10.10.20.1 (which should be the 3750 switch), but I figured ICMP may be disabled by default. I only have one nat rule in place and simple static routes on everything. I still can't reach anything, ssh, RDP, etc.
Where do I go from here? How do I get myself on the internal network for RDP purposes?