Question : Remote VPN to Cisco ASA 5520 not encrypting traffic

Hi,

I have setup a VPN on our Cisco ASA 5520 but seem to be having an issue.

When I connect from the client it goes through Phase 1 and Phase 2 fine, no problems.

It accepts my username and password fine. I show on the ASA as being connected.

The issue is though that I cant ping through the tunnel or actaully send any data through the VPN, it looks that data isnt being encrypted or making it through.

When I check status on the VPN client it shows

Bytes received= 0
Bytes Sent = 8454

Packets Encrypted = 99
Packets Decrypted = 0

etc

While on the ASA side

Bytes Tx = 960

 #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 111, #pkts decrypt: 111, #pkts verify: 111

It's as if traffic isnt being picking up by the cryptomap.

If anybody has any high level ideas id appreciate them or if anybody can help il gladly post some sanitized configs.

Thanks

Answer : Remote VPN to Cisco ASA 5520 not encrypting traffic

I have some questions though. How do I know which ACL defines interesting traffic for my VPN?

the acls of interest for your issue are the following
split-tunnel-network-list value RDGVPN_splitTunnelAcl, which is:
access-list RDGVPN_splitTunnelAcl standard permit xx.yy.zz.0 255.255.255.0
access-list RDGVPN_splitTunnelAcl standard permit 10.HH.GG.SS 255.255.255.0
access-list RDGVPN_splitTunnelAcl standard permit xx.yy.zz.0 255.255.255.0
access-list RDGVPN_splitTunnelAcl standard permit 10.AA.JJ.XX 255.255.255.0

and the identity nat:
nat (inside) 0 access-list inside_nat0_outbound_V4, which is:
access-list inside_nat0_outbound_V4 extended permit ip xx.yy.zz.192 255.255.255.248 host 172.FF.GG.13
access-list inside_nat0_outbound_V4 extended permit ip any 10.RR.dd.EE 255.255.255.128
access-list inside_nat0_outbound_V4 extended permit ip xx.yy.zz.0 255.255.255.0 10.RR.dd.EE 255.255.255.128
access-list inside_nat0_outbound_V4 extended permit ip 10.HH.GG.SS 255.255.255.0 10.RR.dd.EE 255.255.255.128

for this to work you have to have something in the identity nat that says traffic from the networks in the split tunnel are allowed to go to the range 10.0.14.0/24
like:
access-list inside_nat0_outbound_V4 extended permit ip  xx.yy.zz.0 255.255.255.0 10.0.14.0 255.255.255.0

this makes it so that traffic is not translated on the outside interface and is routed over the tunnel.

How do the nat (inside) statements get processed?
this has no bearing on the vpn because the hosts are considered an extension of the network.

hope this helps,

-t
Random Solutions  
 
programming4us programming4us