How do I configure a Cisco ASA 5505 to allow for outbound VPN traffic?

Posted on 2014-09-01
Last Modified: 2014-10-11
I'll qualify this question with a statement that I am NOT a network guy. I subcontract all substantial configuration settings to our office Ciscos 5505 units to someone who knows what they're doing.

Three years ago, some our guests in Office A were having trouble connecting their respective VPN client programs to their respective VPN servers (Cisco, Netscreen, Sonicwall, Checkpoint ...). My Cisco subcontractor at the time made some configuration changes to our ASA 5505 and the connectivity issues largely went away. It's important to note that the configuration settings made by my subcontractor had nothing to do with the VPN server functionality of the Office A ASA 5505. That was working fine. Instead, the configuration settings were simply designed to make Office A "friendlier" to VPN clients within our office attempting to connect to other VPN servers.

Segue forward three years. Some our guests in Office B are running into the same issues. My old Cisco subcontractor is unreachable, my new Cisco subcontractor is asking me what the old subcontractor did, and I, candidly, am not sure. I suggested that he poke around on the Office A ASA to try to determine what the old subcontractor did, but I'm not sure where he should poke.
Question by:jdana
    LVL 1

    Accepted Solution

    This can be caused by a variety of factors, and there aren't the right kind of details to point a finger at one factor. Since you don't mention AnyConnect, I am assuming you are running older IPSec/IKEv1 clients.  Two things to look for though:

    1.  NAT-T traversal needs to be on.  You should be able to do a "show run | inc traversal".  If you see a result starting with a "no", then just type whatever comes after that "no" into your ASA's config.  It is likely to look like 'no crypto isakmp nat-traversal' (off the top of my head).  It might vary slightly in newer ASA software versions.

    2.  You have an ingress ACL on your "inside" or other LAN-security network to prevent certain kinds of Internet access for your users. You can do a "show run access-group" to see what ACLs are applied to which interfaces. If the rules are stringent enough, outbound IPSec/IKE session traffic will be blocked. Looking at the config on the ASA at your other site should guide you there.

    Author Closing Comment

    Perfect! Thanks much.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Free camera licenses with purchase of My Cloud NAS

    Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

    Suggested Solutions

    Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
    PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now