Dears,

I wanted to launch a simple WEBVPN from browser and i have following setup

R1 -------(outside) ASA (inside)------- Client-machine-desktop

All routes seem to be correct but i cannot kick off the portal page of ASA
from inside interface.

ASA inside ip: 1.1.1.1/24 , ASA outside ip: 2.2.2.2/24

following is the config of ASA:
==============================
hostname SSLVPN
enable password 8Ry2YjIyt7RRXU24 encrypted
names
name 2.2.2.1 R1
!
interface Ethernet0/0
nameif outside
security-level 0
ip address 2.2.2.2 255.255.255.0
!
interface Ethernet0/1
nameif inside
security-level 100
ip address 1.1.1.1 255.255.255.0
!

passwd 2KFQnbNIdI.2KYOU encrypted
banner motd * WELCOME , TESTING... *
ftp mode passive
access-list outside extended permit icmp any any
pager lines 24
logging enable
logging console errors
mtu inside 1500
mtu outside 1500
no failover
icmp unreachable rate-limit 1 burst-size 1
icmp permit any echo inside
icmp permit any echo-reply inside
icmp permit any echo-reply outside
icmp permit any echo outside
no asdm history enable
arp timeout 14400
access-group outside in interface outside

dynamic-access-policy-record DfltAccessPolicy
http server enable 4443
http 1.1.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
%ASA-3-219002: i2c_read_byte_w_suspend() error, slot = 0x4, device = 0xb0,
address = 0x0, byte count = 1. Reason: I2C_SMBUS_UNSUPPORT
no crypto isakmp nat-traversal
telnet timeout 5
ssh timeout 5
console timeout 0
threat-detection basic-threat
threat-detection statistics access-list

!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect icmp
!
service-policy global_policy global
ssl certificate-authentication interface inside port 443
webvpn
enable inside
group-policy DefaultGroup internal
group-policy DefaultGroup attributes
vpn-tunnel-protocol webvpn
password-storage enable
username kamran password mk2g0NZxPq/cd0UW encrypted
tunnel-group DefaultGroup type remote-access
tunnel-group DefaultGroup general-attributes
default-group-policy DefaultGroup
tunnel-group DefaultGroup webvpn-attributes
customization CUSTOMIZE
prompt hostname context

Cryptochecksum:d921ca534948cd3387c34c15114574ee
: end
*
"note : i can ping 2.2.2.1 and ping 1.1.1.1 from my desktopPC ! "
*

Plz help me find my mistake !

K.
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to