• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1067
  • Last Modified:

CISCO ASA 5505 VPN CLIENT CONNECTION

Hello

The question is pretty simple. I can successfully connect to my ASA 5505  firewall via cisco vpn client 64 bit , i can ping any ip address on the LAN behind ASA but none of the LAN computers can see or ping the IP Address which is assigned to my vpn client from the ASA VPN Pool.

The LAN behind ASA is 192.168.0.0 and the VPN Pool for the cisco vpn client is 192.168.30.0

I would appreciate some help pls :)

asa1.txt

Regards
George
0
giorgosy78
Asked:
giorgosy78
1 Solution
 
ffleismaSenior Network EngineerCommented:
is there a permissive ACL rule in place for the following?

source: 192.168.0.0
destination: VPN pool
interface: inside

also, is there a NAT exempt in place for the same traffic?
0
 
giorgosy78Author Commented:
i have attached the configuration with my post i don't know if you have seen it. In any case i have this rule:

access-list inside_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 VPN_POOL2 255.255.255.0
nat (inside) 0 access-list inside_nat0_outbound

However still it doesnt work..i dont know if i m missing something else..
0
 
Robert Sutton JrSenior Network ManagerCommented:
I don't see that entry in your access group.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

What Kind of Coding Program is Right for You?

There are many ways to learn to code these days. From coding bootcamps like Flatiron School to online courses to totally free beginner resources. The best way to learn to code depends on many factors, but the most important one is you. See what course is best for you.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now