IT IS FIXED n RESOLVED !!!!

seems to be GNS3 issue,

it works in real ASA 5520 :)

On Sat, Feb 12, 2011 at 10:50 AM, kamran shakil <[email protected]>wrote:

> Dears,
>
> I wanted to launch a simple WEBVPN from browser and i have following setup
>
> R1 -------(outside) ASA (inside)------- Client-machine-desktop
>
> All routes seem to be correct but i cannot kick off the portal page of ASA
> from inside interface.
>
> ASA inside ip: 1.1.1.1/24 , ASA outside ip: 2.2.2.2/24
>
> following is the config of ASA:
> ==============================
> hostname SSLVPN
> enable password 8Ry2YjIyt7RRXU24 encrypted
> names
> name 2.2.2.1 R1
> !
> interface Ethernet0/0
> nameif outside
> security-level 0
> ip address 2.2.2.2 255.255.255.0
> !
> interface Ethernet0/1
> nameif inside
> security-level 100
> ip address 1.1.1.1 255.255.255.0
> !
>
> passwd 2KFQnbNIdI.2KYOU encrypted
> banner motd * WELCOME , TESTING... *
> ftp mode passive
> access-list outside extended permit icmp any any
> pager lines 24
> logging enable
> logging console errors
> mtu inside 1500
> mtu outside 1500
> no failover
> icmp unreachable rate-limit 1 burst-size 1
> icmp permit any echo inside
> icmp permit any echo-reply inside
> icmp permit any echo-reply outside
> icmp permit any echo outside
> no asdm history enable
> arp timeout 14400
> access-group outside in interface outside
>
> dynamic-access-policy-record DfltAccessPolicy
> http server enable 4443
> http 1.1.1.0 255.255.255.0 inside
> no snmp-server location
> no snmp-server contact
> snmp-server enable traps snmp authentication linkup linkdown coldstart
> %ASA-3-219002: i2c_read_byte_w_suspend() error, slot = 0x4, device = 0xb0,
> address = 0x0, byte count = 1. Reason: I2C_SMBUS_UNSUPPORT
> no crypto isakmp nat-traversal
> telnet timeout 5
> ssh timeout 5
> console timeout 0
> threat-detection basic-threat
> threat-detection statistics access-list
>
> !
> class-map inspection_default
> match default-inspection-traffic
> !
> !
> policy-map global_policy
> class inspection_default
> inspect icmp
> !
> service-policy global_policy global
> ssl certificate-authentication interface inside port 443
> webvpn
> enable inside
> group-policy DefaultGroup internal
> group-policy DefaultGroup attributes
> vpn-tunnel-protocol webvpn
> password-storage enable
> username kamran password mk2g0NZxPq/cd0UW encrypted
> tunnel-group DefaultGroup type remote-access
> tunnel-group DefaultGroup general-attributes
> default-group-policy DefaultGroup
> tunnel-group DefaultGroup webvpn-attributes
> customization CUSTOMIZE
> prompt hostname context
>
> Cryptochecksum:d921ca534948cd3387c34c15114574ee
> : end
> *
> "note : i can ping 2.2.2.1 and ping 1.1.1.1 from my desktopPC ! "
> *
>
> Plz help me find my mistake !
>
> K.
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to