Link to home
Start Free TrialLog in
Avatar of giorgosy78
giorgosy78Flag for Afghanistan

asked on

CISCO ASA 5505 VPN CLIENT CONNECTION

Hello

The question is pretty simple. I can successfully connect to my ASA 5505  firewall via cisco vpn client 64 bit , i can ping any ip address on the LAN behind ASA but none of the LAN computers can see or ping the IP Address which is assigned to my vpn client from the ASA VPN Pool.

The LAN behind ASA is 192.168.0.0 and the VPN Pool for the cisco vpn client is 192.168.30.0

I would appreciate some help pls :)

asa1.txt

Regards
George
Avatar of Nico Eisma
Nico Eisma
Flag of Philippines image

is there a permissive ACL rule in place for the following?

source: 192.168.0.0
destination: VPN pool
interface: inside

also, is there a NAT exempt in place for the same traffic?
Avatar of giorgosy78

ASKER

i have attached the configuration with my post i don't know if you have seen it. In any case i have this rule:

access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 VPN_POOL2 255.255.255.0
nat (inside) 0 access-list inside_nat0_outbound

However still it doesnt work..i dont know if i m missing something else..
ASKER CERTIFIED SOLUTION
Avatar of Robert Sutton Jr
Robert Sutton Jr
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial