Question : ASA 5505 Can VPN but cannot ping/connect to server or firewall.

Hello,

I am using ASA 5505 and i can connect to VPN through IPSec fine, but i cannot connect to the server or ping the firewall or any of the other computers.

I am using Windows 2008 SBS i dont know if this makes a difference or not.

Here is my configuration. Thank you in advance for looking at my problem.



1:
2:
3:
4:
5:
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
18:
19:
20:
21:
22:
23:
24:
25:
26:
27:
28:
29:
30:
31:
32:
33:
34:
35:
36:
37:
38:
39:
40:
41:
42:
43:
44:
45:
46:
47:
48:
49:
50:
51:
52:
53:
54:
55:
56:
57:
58:
59:
60:
61:
62:
63:
64:
65:
66:
67:
68:
69:
70:
71:
72:
73:
74:
75:
76:
77:
78:
79:
80:
81:
82:
83:
84:
85:
86:
87:
88:
89:
90:
91:
92:
93:
94:
95:
96:
97:
98:
99:
100:
101:
102:
103:
104:
105:
106:
107:
108:
109:
110:
111:
112:
113:
114:
115:
116:
117:
118:
119:
120:
121:
122:
123:
124:
125:
126:
127:
128:
129:
130:
131:
132:
133:
!
ASA Version 7.2(4)
!
hostname l73mwbf
domain-name mwbf.local
enable password u9NYGVIlIWNwt5W1 encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
!
interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.73.1 255.255.255.0
!
interface Vlan2
 nameif outside
 security-level 0
 ip address xx.xx.xx.xx 255.255.255.248
!
interface Ethernet0/0
 switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
dns server-group DefaultDNS
 domain-name mwbf.local
access-list smtp extended permit ip any any
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq 3389
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq smtp
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq www
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq https
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq pop3
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq 993
access-list acl_outside extended permit tcp any host xx.xx.xx.xx eq imap4
access-list acl_outside extended permit icmp any any
access-list acl_outside extended permit gre any any
access-list inside_nat0_outbound extended permit ip 192.168.73.0 255.255.255.0 172.16.15.0 255.255.255.192
access-list inside_nat0_outbound extended permit ip host 172.16.15.0 172.16.15.0 255.255.255.192
access-list acl_out extended permit tcp any host 69.38.195.86 eq 993
access-list L73MWBFVPN_splitTunnelAcl standard permit 192.168.73.0 255.255.255.0
access-list L73MWBFVPN_splitTunnelAcl standard permit host 172.16.15.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool ippool 172.16.15.25-172.16.15.75 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-524.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 1 192.168.73.0 255.255.255.0
nat (inside) 0 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 3389 192.168.73.10 3389 netmask 255.255.255.255
static (inside,outside) tcp interface www 192.168.73.10 www netmask 255.255.255.255
static (inside,outside) tcp interface smtp 192.168.73.10 smtp netmask 255.255.255.255
static (inside,outside) tcp interface https 192.168.73.10 https netmask 255.255.255.255
access-group smtp in interface inside
access-group acl_outside in interface outside
route outside 0.0.0.0 0.0.0.0 xx.xx.xx.xx 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
aaa-server topix protocol radius
aaa-server topix (inside) host 192.168.73.10
 key it!roczM
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1
crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
crypto isakmp nat-traversal  20
telnet 192.168.73.0 255.255.255.0 inside
telnet timeout 5
ssh timeout 5
console timeout 0

group-policy L73MWBFVPN internal
group-policy L73MWBFVPN attributes
 dns-server value 192.168.73.10
 vpn-tunnel-protocol IPSec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value L73MWBFVPN_splitTunnelAcl
 default-domain value mwbf.local
tunnel-group L73MWBFVPN type ipsec-ra
tunnel-group L73MWBFVPN general-attributes
 address-pool ippool
 authentication-server-group topix
 default-group-policy L73MWBFVPN
tunnel-group L73MWBFVPN ipsec-attributes
 pre-shared-key *
 isakmp keepalive threshold infinite
!
!
prompt hostname context
Cryptochecksum:f59bae6832831aaa686b1e5e461401ec
l73mwbf#

Answer : ASA 5505 Can VPN but cannot ping/connect to server or firewall.

Random Solutions  
 
programming4us programming4us