AnyConnect SSL VPN 已连接,但无法 ping 通我的内部 LAN

AnyConnect SSL VPN 已连接,但无法 ping 通我的内部 LAN

我正在尝试配置 Anyconnect SSL VPN,但它让我很头疼,我能够在笔记本电脑上连接到 VPN,能够从 ASA 下载 anyconnect 客户端,我也可以使用 Cisco anyconnect 应用程序连接到 VPN,但是...

我无法 ping 通 ASA 内部的任何 IP。在发布此信息之前,我花了很多时间在论坛上和观看有关 anyconnect SSL VPN 创建的视频,并且我完全按照说明操作,但仍然无法 ping 通。任何帮助都将不胜感激。

Inside      10.17.1.254/24
Outside     192.168.1.254/24
VPN Pool    10.99.1.1-50/24

Inside LAN  10.17.1.0/24

    ASA Version 8.4(2)
    !
    hostname ciscoasa
    enable password ft5r/Vn.VedHFe0u encrypted
    passwd 2KFQnbNIdI.2KYOU encrypted
    names
    !
    interface Ethernet0/0
     switchport access vlan 2
    !
    interface Ethernet0/1
    !
    interface Ethernet0/2
    !
    interface Ethernet0/3
    !
    interface Ethernet0/4
    !
    interface Ethernet0/5
    !
    interface Ethernet0/6
    !
    interface Ethernet0/7
    !
    interface Vlan1
     nameif inside
     security-level 100
     ip address 10.17.1.254 255.255.255.0
    !
    interface Vlan2
     nameif outside
     security-level 0
     ip address 192.168.1.253 255.255.255.0
    !
    ftp mode passive
    object network obj_any
     subnet 0.0.0.0 0.0.0.0
    object network NETWORK_OBJ_10.99.1.0_26
     subnet 10.99.1.0 255.255.255.192
    pager lines 24
    logging asdm informational
    mtu inside 1500
    mtu outside 1500
    ip local pool ACPool 10.99.1.1-10.99.1.50 mask 255.255.255.0
    icmp unreachable rate-limit 1 burst-size 1
    no asdm history enable
    arp timeout 14400
    nat (inside,outside) source static any any destination static NETWORK_OBJ_10.99.1.0_26 NETWORK_OBJ_10.99.1.0_26 no-proxy-arp route-lookup
    !
    object network obj_any
     nat (inside,outside) dynamic interface
    timeout xlate 3:00:00
    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    timeout floating-conn 0:00:00
    dynamic-access-policy-record DfltAccessPolicy
    user-identity default-domain LOCAL
    http server enable
    http 10.17.1.0 255.255.255.0 inside
    no snmp-server location
    no snmp-server contact
    snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart
    telnet timeout 5
    ssh timeout 5
    console timeout 0

    dhcp-client client-id interface outside
    dhcpd auto_config outside
    !
    threat-detection basic-threat
    threat-detection statistics access-list
    no threat-detection statistics tcp-intercept
    webvpn
     enable outside
     anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1
     anyconnect enable
     tunnel-group-list enable
    group-policy GroupPolicy_ACSSLVPN internal
    group-policy GroupPolicy_ACSSLVPN attributes
     wins-server none
     dns-server value 10.17.1.1
     vpn-tunnel-protocol ssl-client
     default-domain none
    username Earth password YwTxEzMBQFaeRlOE encrypted
    tunnel-group ACSSLVPN type remote-access
    tunnel-group ACSSLVPN general-attributes
     address-pool ACPool
     default-group-policy GroupPolicy_ACSSLVPN
    tunnel-group ACSSLVPN webvpn-attributes
     group-alias ACSSLVPN enable
    !
    class-map inspection_default
     match default-inspection-traffic
    !
    !
    policy-map type inspect dns preset_dns_map
     parameters
      message-length maximum client auto
      message-length maximum 512
    policy-map global_policy
     class inspection_default
      inspect dns preset_dns_map
      inspect ftp
      inspect h323 h225
      inspect h323 ras
      inspect rsh
      inspect rtsp
      inspect esmtp
      inspect sqlnet
      inspect skinny
      inspect sunrpc
      inspect xdmcp
      inspect sip
      inspect netbios
      inspect tftp
      inspect ip-options
    !
    service-policy global_policy global
    prompt hostname context
    call-home reporting anonymous prompt 2
    Cryptochecksum:48f9a08dc4ac36ac9bf227fb0df7080f
    : end
    ciscoasa#

答案1

您必须定义分割隧道访问列表。首先创建一个访问列表:

access-list SPLIT_TUNNEL permit ip 10.17.1.0 255.255.255.0 any

然后进入组策略:

group-policy GroupPolicy_ACSSLVPN attributes
  acl SPLIT_TUNNEL

相关内容