

- #CISCO ASA 5505 CISCO VPN CLIENT PASSWORD#
- #CISCO ASA 5505 CISCO VPN CLIENT PC#
- #CISCO ASA 5505 CISCO VPN CLIENT WINDOWS#
Updated ASA config including TAuthor AAA group: Regardless of which address the VPN client gets, I am still unable to ping to the internal network from the client. You can see in my config I have actually tried both since there is an access-list for each of these networks. One thing that keeps bugging me is whether to use a portion of the existing internal network's subnet addresses (in this case 10.0.0.0/24), or a completely different private IP scheme (172.16.0.0/28 as my config is currently using) for the VPN client address pool. In my case, I cannot ping ANY internal address, including the ASA inside interface. From other posts I have seen online with this similar problem, usually the VPN client can ping the inside interface of the ASA but nothing else. In regards to your question about whether any traffic gets from the VPN client to the internal network, that's a big no. I guess I missed changing the authorization AAA group name. I apologize, I slightly edited my actual ASA config for security reasons. Gracias! RE: Cannot ping internal network behind Cisco ASA 5505 using VPN client NetworkGhost (IS/IT-Management) 3 Oct 08 09:09 Tunnel-group T-Remotes general-attributesĬryptochecksum:02cb73b98d6c07d219e86bd9082ee56e Split-tunnel-network-list value T-Remotes Policy-map type inspect dns preset_dns_map Snmp-server enable traps snmp authentication linkup linkdown coldstartĬrypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmacĬrypto dynamic-map outside_dyn_map 20 set pfsĬrypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5Ĭrypto dynamic-map outside_dyn_map 40 set pfsĬrypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5Ĭrypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map Icmp unreachable rate-limit 1 burst-size 1

#CISCO ASA 5505 CISCO VPN CLIENT PASSWORD#
My ASA config is:Įnable password QrxI7T2E6JEytHJp encrypted The question is, do I need NAT-T if I'm not using the ASA as the Internet gateway? For that purpose I am using a PIX, with the 10.0.0.1 Cisco 2600 as the internal gateway.
#CISCO ASA 5505 CISCO VPN CLIENT PC#
VPN client PC cannot ping ANY internal network host on 10.0.0.0/16, not even ASA inside int at 10.0.0.2.

VPN client PC obtains address from ASA locally defined IP pool, on subnet 172.16.1.0/28.
#CISCO ASA 5505 CISCO VPN CLIENT WINDOWS#
Cisco VPN client connects to ASA outside interface (public IP) and authenticates via Kerberos/LDAP to an internal Windows AD server.
