Dears, I wanted to launch a simple WEBVPN from browser and i have following setup
R1 -------(outside) ASA (inside)------- Client-machine-desktop All routes seem to be correct but i cannot kick off the portal page of ASA from inside interface. ASA inside ip: 1.1.1.1/24 , ASA outside ip: 2.2.2.2/24 following is the config of ASA: ============================== hostname SSLVPN enable password 8Ry2YjIyt7RRXU24 encrypted names name 2.2.2.1 R1 ! interface Ethernet0/0 nameif outside security-level 0 ip address 2.2.2.2 255.255.255.0 ! interface Ethernet0/1 nameif inside security-level 100 ip address 1.1.1.1 255.255.255.0 ! passwd 2KFQnbNIdI.2KYOU encrypted banner motd * WELCOME , TESTING... * ftp mode passive access-list outside extended permit icmp any any pager lines 24 logging enable logging console errors mtu inside 1500 mtu outside 1500 no failover icmp unreachable rate-limit 1 burst-size 1 icmp permit any echo inside icmp permit any echo-reply inside icmp permit any echo-reply outside icmp permit any echo outside no asdm history enable arp timeout 14400 access-group outside in interface outside dynamic-access-policy-record DfltAccessPolicy http server enable 4443 http 1.1.1.0 255.255.255.0 inside no snmp-server location no snmp-server contact snmp-server enable traps snmp authentication linkup linkdown coldstart %ASA-3-219002: i2c_read_byte_w_suspend() error, slot = 0x4, device = 0xb0, address = 0x0, byte count = 1. Reason: I2C_SMBUS_UNSUPPORT no crypto isakmp nat-traversal telnet timeout 5 ssh timeout 5 console timeout 0 threat-detection basic-threat threat-detection statistics access-list ! class-map inspection_default match default-inspection-traffic ! ! policy-map global_policy class inspection_default inspect icmp ! service-policy global_policy global ssl certificate-authentication interface inside port 443 webvpn enable inside group-policy DefaultGroup internal group-policy DefaultGroup attributes vpn-tunnel-protocol webvpn password-storage enable username kamran password mk2g0NZxPq/cd0UW encrypted tunnel-group DefaultGroup type remote-access tunnel-group DefaultGroup general-attributes default-group-policy DefaultGroup tunnel-group DefaultGroup webvpn-attributes customization CUSTOMIZE prompt hostname context Cryptochecksum:d921ca534948cd3387c34c15114574ee : end * "note : i can ping 2.2.2.1 and ping 1.1.1.1 from my desktopPC ! " * Plz help me find my mistake ! K.
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
