IT IS FIXED n RESOLVED !!!! seems to be GNS3 issue,
it works in real ASA 5520 :) On Sat, Feb 12, 2011 at 10:50 AM, kamran shakil <[email protected]>wrote: > Dears, > > I wanted to launch a simple WEBVPN from browser and i have following setup > > R1 -------(outside) ASA (inside)------- Client-machine-desktop > > All routes seem to be correct but i cannot kick off the portal page of ASA > from inside interface. > > ASA inside ip: 1.1.1.1/24 , ASA outside ip: 2.2.2.2/24 > > following is the config of ASA: > ============================== > hostname SSLVPN > enable password 8Ry2YjIyt7RRXU24 encrypted > names > name 2.2.2.1 R1 > ! > interface Ethernet0/0 > nameif outside > security-level 0 > ip address 2.2.2.2 255.255.255.0 > ! > interface Ethernet0/1 > nameif inside > security-level 100 > ip address 1.1.1.1 255.255.255.0 > ! > > passwd 2KFQnbNIdI.2KYOU encrypted > banner motd * WELCOME , TESTING... * > ftp mode passive > access-list outside extended permit icmp any any > pager lines 24 > logging enable > logging console errors > mtu inside 1500 > mtu outside 1500 > no failover > icmp unreachable rate-limit 1 burst-size 1 > icmp permit any echo inside > icmp permit any echo-reply inside > icmp permit any echo-reply outside > icmp permit any echo outside > no asdm history enable > arp timeout 14400 > access-group outside in interface outside > > dynamic-access-policy-record DfltAccessPolicy > http server enable 4443 > http 1.1.1.0 255.255.255.0 inside > no snmp-server location > no snmp-server contact > snmp-server enable traps snmp authentication linkup linkdown coldstart > %ASA-3-219002: i2c_read_byte_w_suspend() error, slot = 0x4, device = 0xb0, > address = 0x0, byte count = 1. Reason: I2C_SMBUS_UNSUPPORT > no crypto isakmp nat-traversal > telnet timeout 5 > ssh timeout 5 > console timeout 0 > threat-detection basic-threat > threat-detection statistics access-list > > ! > class-map inspection_default > match default-inspection-traffic > ! > ! > policy-map global_policy > class inspection_default > inspect icmp > ! > service-policy global_policy global > ssl certificate-authentication interface inside port 443 > webvpn > enable inside > group-policy DefaultGroup internal > group-policy DefaultGroup attributes > vpn-tunnel-protocol webvpn > password-storage enable > username kamran password mk2g0NZxPq/cd0UW encrypted > tunnel-group DefaultGroup type remote-access > tunnel-group DefaultGroup general-attributes > default-group-policy DefaultGroup > tunnel-group DefaultGroup webvpn-attributes > customization CUSTOMIZE > prompt hostname context > > Cryptochecksum:d921ca534948cd3387c34c15114574ee > : end > * > "note : i can ping 2.2.2.1 and ping 1.1.1.1 from my desktopPC ! " > * > > Plz help me find my mistake ! > > K. >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
