Salve a tutti, stò provando a configuare per la prima volta una vpn ssl con il 
client anyconnect.



Una volta autenticato con il client vpn riesco ad accedere alle risorse lato 
“lan” .

Quello che non sono riuscito a configurare è consentire client in vpn di 
accedere alle risorse internet passando per l’ASA.

Sostanzialmente non mi escono i paccheti destinati all’esterno.

Sapreste dirmi dove sbaglio?



Vi ringrazio anticipatamente per la risposta.







Network inside:1.1.1.0

Network outside:192.168.8.0



Network Ssl:192.168.100.0







show run

: Saved

:

ASA Version 8.0(5) 

!

hostname firewall1

enable password 3mRbHJAqJg9oobVP encrypted

passwd 3mRbHJAqJg9oobVP encrypted

names

!

interface Vlan1

nameif inside

security-level 100

ip address 1.1.1.1 255.255.255.0 

!

interface Vlan2

nameif outside

security-level 0

ip address 192.168.8.100 255.255.255.0 

!

interface Ethernet0/0

switchport access vlan 2

!

interface Ethernet0/1

!

interface Ethernet0/2



              

!

interface Ethernet0/3

!

interface Ethernet0/4

!

interface Ethernet0/5

!

interface Ethernet0/6

!

interface Ethernet0/7

!

boot system disk0:/asa805-k8.bin

ftp mode passive

access-list outside_in extended permit tcp any any eq 3389 

access-list outside_in extended permit icmp any any 

access-list outside_in extended permit tcp any any eq domain 

access-list lantolan extended permit ip 1.1.1.0 255.255.255.0 2.2.2.0 
255.255.255.0 

access-list lantolan extended permit ip 1.1.1.0 255.255.255.0 192.168.100.0 
255.255.255.0 

pager lines 24

logging console debugging

logging asdm informational

mtu inside 1500

mtu outside 1500

ip local pool SSLClientPool 192.168.100.1-192.168.100.50 mask 255.255.255.0



              

icmp unreachable rate-limit 1 burst-size 1

asdm image disk0:/asdm-524.bin

no asdm history enable

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list lantolan

nat (inside) 1 0.0.0.0 0.0.0.0

static (inside,outside) tcp interface 3389 1.1.1.2 3389 netmask 255.255.255.255 

access-group outside_in in interface outside

route outside 0.0.0.0 0.0.0.0 192.168.8.254 1

timeout xlate 3:00:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

timeout tcp-proxy-reassembly 0:01:00

dynamic-access-policy-record DfltAccessPolicy

no snmp-server location

no snmp-server contact

snmp-server enable traps snmp authentication linkup linkdown coldstart

crypto ipsec transform-set VPNbartolini esp-aes esp-sha-hmac 

crypto ipsec security-association lifetime seconds 28800

crypto ipsec security-association lifetime kilobytes 4608000

crypto map VPNbartolini 1 match address lantolan



crypto map VPNbartolini 1 set peer 192.168.8.101 

crypto map VPNbartolini 1 set transform-set VPNbartolini

crypto map VPNbartolini interface outside

crypto isakmp enable outside

crypto isakmp policy 1

authentication pre-share

encryption aes

hash sha

group 2

lifetime 43200

no crypto isakmp nat-traversal

telnet timeout 5

ssh 0.0.0.0 0.0.0.0 inside

ssh timeout 30

ssh version 2

console timeout 0

dhcpd dns 8.8.8.8

dhcpd auto_config outside

!

dhcpd address 1.1.1.2-1.1.1.33 inside

dhcpd enable inside

!



threat-detection basic-threat



              

threat-detection statistics access-list

no threat-detection statistics tcp-intercept

webvpn

enable outside

svc image disk0:/anyconnect-win-2.5.2001-k9.pkg 1

svc enable

tunnel-group-list enable

group-policy SSLCLientPolicy internal

group-policy SSLCLientPolicy attributes

dns-server value 1.1.1.254

vpn-tunnel-protocol svc 

address-pools value SSLClientPool

username vpnuser password c1WDeHfy/dJ/crx2 encrypted

username vpnuser attributes

service-type remote-access

tunnel-group 192.168.8.101 type ipsec-l2l

tunnel-group 192.168.8.101 ipsec-attributes

pre-shared-key *

tunnel-group SSLClientProfile type remote-access

tunnel-group SSLClientProfile general-attributes

default-group-policy SSLCLientPolicy

tunnel-group SSLClientProfile webvpn-attributes

group-alias SSLVPNClient enable

!



              

!

prompt hostname context 



firewall1# 


_______________________________________________
http://www.areanetworking.it
http://www.areanetworking.it/blog
[email protected]
http://ml.areanetworking.it/mailman/listinfo/cug

Reply via email to