
Home • Регистрация • FAQ • Поиск • Вход  | 
| Сообщения без ответов | Активные темы |  Текущее время: 23 апр 2021, 04:13
  |  
 
 Anyconnect доступ в несколько сетейМодератор: Fedia 
 
  Страница 1 из 1
  |  [ Сообщений: 3 ]  |  
 | Версия для печати | Пред. тема | След. тема |  
 | Автор | Сообщение | 
|---|
  Зарегистрирован: 20 май 2012, 20:30 Сообщения: 16 
  | Есть Cisco ASA 5505 на ней поднят Anyconnect так чтобы клиент видел внутренние ресурсы и выходил через неё в интернет. Клиент подключается к ней и видит сеть 10.1.0.0/24 и спокойно ходит в интернет, но не может подключится к хостам в 10.1.3.0/24 и не имеет доступа к самой ASA. Как сделать так чтобы клиент подключившейся с помощью anyconnect видел все сети и мог подключится к ASA по ssh? Вот конфигурация c ASA: home-gw-1(config)# sh run : Saved : ASA Version 8.4(4) ! hostname home-gw-1 domain-name home.local enable password 2KFQnbNIdI.2KYOU encrypted passwd 2KFQnbNIdI.2KYOU encrypted names name 10.1.0.1 gw ! interface Ethernet0/0  description isp  switchport access vlan 2 ! interface Ethernet0/1 ! interface Ethernet0/2 ! interface Ethernet0/3 ! interface Ethernet0/4 ! interface Ethernet0/5 ! interface Ethernet0/6 ! interface Ethernet0/7  description home-sw-core  switchport trunk allowed vlan 2,10,13  switchport mode trunk ! interface Vlan1  no nameif  no security-level  no ip address ! interface Vlan2  description ISP-ONLIME  nameif outside  security-level 0  ip address dhcp setroute ! interface Vlan10  description LAN  nameif inside  security-level 100  ip address gw 255.255.255.0 ! interface Vlan13  description management  nameif mgt  security-level 100  ip address 10.1.3.1 255.255.255.0 ! boot system disk0:/asa844-k8.bin boot config disk0:/startup-config ftp mode passive clock timezone MSK 4 dns domain-lookup inside dns server-group DefaultDNS  name-server 77.37.255.30  name-server 77.37.251.33  domain-name home.local same-security-traffic permit inter-interface same-security-traffic permit intra-interface object network C1  host 10.1.0.99 object network OBJ-ANYCONNECT-POOL  subnet 10.1.1.0 255.255.255.0 object network OBJ-USERS  subnet 10.1.0.0 255.255.255.0 object network OBJ-MGT  subnet 10.1.3.0 255.255.255.0 access-list INSIDE-ACL-IN extended permit ip object OBJ-USERS any access-list INSIDE-ACL-OUT extended permit ip any object OBJ-USERS access-list MGT-ACL-IN extended permit ip object OBJ-MGT any access-list MGT-ACL-OUT extended permit ip any object OBJ-MGT access-list OUTSIDE-ACL-IN extended permit ip any any access-list OUTSIDE-ACL-OUT extended permit ip any any pager lines 24 logging enable logging asdm informational mtu outside 1500 mtu inside 1500 mtu mgt 1500 ip local pool vpn-pool 10.1.1.10-10.1.1.35 mask 255.255.255.0 no failover icmp unreachable rate-limit 1 burst-size 1 asdm image disk0:/asdm-649.bin no asdm history enable arp timeout 14400 nat (mgt,outside) source static OBJ-MGT OBJ-MGT destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp nat (inside,outside) source static OBJ-USERS OBJ-USERS destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp ! object network C1  nat (inside,outside) static interface service tcp 22000 22000 object network OBJ-ANYCONNECT-POOL  nat (outside,outside) dynamic interface object network OBJ-USERS  nat (inside,outside) dynamic interface object network OBJ-MGT  nat (mgt,outside) dynamic interface access-group OUTSIDE-ACL-IN in interface outside access-group OUTSIDE-ACL-OUT out interface outside access-group INSIDE-ACL-IN in interface inside access-group INSIDE-ACL-OUT out interface inside access-group MGT-ACL-IN in interface mgt access-group MGT-ACL-OUT out interface mgt route inside 10.1.4.0 255.255.255.0 10.1.0.2 1 route inside 10.10.0.0 255.255.0.0 10.1.0.70 1 timeout xlate 3:00:00 timeout pat-xlate 0:00:30 timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00 timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute timeout tcp-proxy-reassembly 0:01:00 timeout floating-conn 0:00:00 dynamic-access-policy-record DfltAccessPolicy user-identity default-domain LOCAL aaa authentication ssh console LOCAL http server enable http 10.1.0.0 255.255.255.0 inside no snmp-server location no snmp-server contact telnet timeout 5 ssh 10.1.1.0 255.255.255.0 outside ssh 10.1.0.0 255.255.255.0 inside ssh 10.1.3.0 255.255.255.0 mgt ssh timeout 60 ssh version 2 ssh key-exchange group dh-group1-sha1 console timeout 0 management-access inside dhcpd lease 86400 dhcpd auto_config outside ! dhcpd address 10.1.0.100-10.1.0.200 inside dhcpd enable inside ! threat-detection basic-threat threat-detection statistics access-list no threat-detection statistics tcp-intercept ntp server 62.117.76.141 ntp server 62.117.76.142 ntp server 195.2.64.5 webvpn  enable outside  anyconnect-essentials  anyconnect image disk0:/anyconnect-win-2.3.2016-k9.pkg 1  anyconnect enable  tunnel-group-list enable group-policy GroupPolicy_anyconnect internal group-policy GroupPolicy_anyconnect attributes  wins-server none  dns-server value 8.8.8.8  vpn-tunnel-protocol ssl-client  default-domain value home.local username XXXX password XXXXXXXXXXXXXX encrypted privilege 15 tunnel-group anyconnect type remote-access tunnel-group anyconnect general-attributes  address-pool vpn-pool  default-group-policy GroupPolicy_anyconnect  nat-assigned-to-public-ip inside tunnel-group anyconnect webvpn-attributes  group-alias anyconnect enable ! class-map inspection_default ! ! policy-map global_policy  class inspection_default  inspect icmp  inspect ctiqbe  inspect dcerpc  inspect dns  inspect esmtp  inspect ftp  inspect h323 h225  inspect h323 ras  inspect http  inspect icmp error  inspect ils  inspect ip-options  inspect mgcp  inspect netbios  inspect pptp  inspect rsh  inspect rtsp  inspect sip  inspect skinny  inspect snmp  inspect sqlnet  inspect sunrpc  inspect waas  inspect xdmcp  inspect tftp ! service-policy global_policy global prompt hostname context no call-home reporting anonymous call-home  profile CiscoTAC-1  no active  destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService  destination address email callhome@cisco.com  destination transport-method http  subscribe-to-alert-group diagnostic  subscribe-to-alert-group environment  subscribe-to-alert-group inventory periodic monthly  subscribe-to-alert-group configuration periodic monthly  subscribe-to-alert-group telemetry periodic daily Cryptochecksum:0df26896e70c035e13c19bec3b3180e5 : end Топология: packet-tracer: home-gw-1(config)# packet-tracer input outside tcp 10.1.1.11 ssh 10.1.0.2 ssh Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (inside,outside) source static OBJ-USERS OBJ-USERS destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp Additional Information: NAT divert to egress interface inside Untranslate 10.1.0.2/22 to 10.1.0.2/22 Phase: 2 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group OUTSIDE-ACL-IN in interface outside access-list OUTSIDE-ACL-IN extended permit ip any any Additional Information: Phase: 3 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 4 Type: CP-PUNT Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: WEBVPN-SVC Subtype: in Result: DROP Config: Additional Information: Result: input-interface: outside input-status: up input-line-status: up output-interface: inside output-status: up output-line-status: up Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule
  home-gw-1(config)# packet-tracer input outside tcp 10.1.1.11 ssh 10.1.3.2 ssh Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (mgt,outside) source static OBJ-MGT OBJ-MGT destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp Additional Information: NAT divert to egress interface mgt Untranslate 10.1.3.2/22 to 10.1.3.2/22 Phase: 2 Type: ACCESS-LIST Subtype: log Result: ALLOW Config: access-group OUTSIDE-ACL-IN in interface outside access-list OUTSIDE-ACL-IN extended permit ip any any Additional Information: Phase: 3 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 4 Type: CP-PUNT Subtype: Result: ALLOW Config: Additional Information: Phase: 5 Type: WEBVPN-SVC Subtype: in Result: DROP Config: Additional Information: Result: input-interface: outside input-status: up input-line-status: up output-interface: mgt output-status: up output-line-status: up Action: drop Drop-reason: (acl-drop) Flow is denied by configured rule
  ping с home-sw-core: home-sw-core#ping 10.1.3.1 source vlan 13 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.3.1, timeout is 2 seconds: Packet sent with a source address of 10.1.3.2 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/6 ms home-sw-core#ping 10.1.0.1 source vlan 10 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.0.1, timeout is 2 seconds: Packet sent with a source address of 10.1.0.2 !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms
  
 
  |  | 06 май 2014, 15:30 |   Зарегистрирован: 10 окт 2012, 09:51 Сообщения: 2678 
  | а вы уверены что в инет ходит через вас? Я что-то не увидел у вас в конфиге, какие маршруты вы передаете клиенту. Вот не помню, передается по-умолчанию default или нет. 
 
  |  | 06 май 2014, 17:45 |  2 crash Маршрут передаётся. В интернет клиент ходит через асу. 
 
  |  | 06 май 2014, 21:46 |  
  Страница 1 из 1
  |  [ Сообщений: 3 ]  |  
 
 Кто сейчас на конференции |  Сейчас этот форум просматривают: Google [Bot] и гости: 55  |  
 
 Вы не можете начинать темы Вы не можете отвечать на сообщения Вы не можете редактировать свои сообщения Вы не можете удалять свои сообщения Вы не можете добавлять вложения
  |  
 
 Создано на основе phpBB® Forum Software © phpBB Group  Designed by ST Software for PTF.  Русская поддержка phpBB  | 

For example, 192.168.1.10 - 192.168.1.253, leaving 192.168.1.1 to 192.168.1.9 in my static IP addresses under Dial-up Tab in the Windows AD??? What I want to happen is the Cisco ASA will still assign random IP addresses to AnyConnect VPN users but for certain LDAP users, they should have specific.
Overview
When using a Cisco ASA with the AnyConnect VPN Client software in some instances it is useful to assign the same static IP address to a client whenever they connect to the VPN. Within Active Directory you can configure per user a static IP address and use this IP address whenever the user connects to the VPN. The RADIUS Server (in this instance Cisco ISE 2.0) can be configured to query the attribute in AD which is the” msRADIUSFramedIPAddress” value and assign to the client whenever they connect. 
This post only describes configuring a static IP address on a Cisco AnyConnect Remote Access VPN. Refer to the following posts for more detail instructions on how to configure ASA Remote Access VPN and integrated with Cisco ISE for authentication:
ASA AnyConnect SSL-VPN
ASA AnyConnect IKEv2/IPSec VPN
Software/Hardware Used: 
Hi, So I have Anyconnect VPN configured on my ASA and users are being authenticated via ACS. My requirement is to provide static IP for all users. I have configured pool on ASA and after that I configured Framed IP on ACS. When connecting for first time, the user gets the same IP but after disconnection, the user gets a different pool IP. Over a static route: use the IP address of the MX/Z on the subnet shared with the next hop Over VPN: use the IP address of the MX/Z on the highest-numbered VLAN in VPN Create and enter a RADIUS Shared Secret (make note of this secret, you will need to add this to the dashboard). To exclude a range of IP addresses from the static address pool, type the starting IP address of the range that you want to exclude in the From box, type the ending IP address of the range that you want to exclude in the To box, and then select Add. Select OK, select OK, and then select Continue. Select the Protocols tab, select TCP/IP Protocol  Properties.
Mac best latex editor. Windows 7 SP1 (Client)
 Windows 2008 R2 (Active Directory Domain Controller)
 Cisco ISE 2.0 (RADIUS Server)
 Cisco ASAv v9.6(1)
 Cisco AnyConnect Client 4.2.01022 
Cisco ASA Configuration
- Modify the existing IP Address Pool to decrease the number of IP addresses, leaving space at the end of the range (or beginning) to be used for statically assigned IP addresses. 
 
AD Account Modification
- Select a test account within AD 
 - Modify the properties of the test account; select the “Dial-in” tab 
 
- Tick the “Assign Static IP Address” box 
 - Click the “Static IP Address” button 
 - Tick “Assign a static IPv4 address” box and enter and IP address from within the IP address range defined on the Cisco ASA appliances 
 
- Click “OK” to complete the configuration 
 
Cisco ISE Configuration
Add AD Attribute
- Modify the configuration of the existing Active Directory External Identity Source and select Edit 
 
- Click “Attributes” tab 
 - Click “Add” > “Select Attributes from Directory” 
 - Enter the name of the test user previously modified to add the Static IP address and select “Retrieve Attributes” 
 
- Ensure you tick the box “msRADIUSFramedIPAddress” and click “Ok” 
 
 American pie reunion hd free download. IMPORTANT – If you do not previously assign as static IP address to the user account you are using to query AD for the list of attributes the “msRADIUSFramedIPAddress” will not be in the list to select. 
- Edit the attribute “msRADIUSFramedIPAddress” and change the “Type” value from STRING to IPv4 
 
Anyconnect Static Ip Server
Create Authorization Profile
- Create a new “Authorization Profile” called “Static-VPN-IP-Address” – Policy > Policy Elements > Results > Authorization > Authorization Profiles 
 - In the Advanced Attributes Settings add a new value for “Radius:Framed-IP-Address” and equals the “msRADIUSFramedIPAddress” value previously added
 
NOTE – “LAB_AD” will equal the name of YOUR Active Directory 
Modify Policy Set

- Modify the existing Policy and the “Static-VPN-IP-Address” Authorization Profile
 
Test AnyConnect VPN Client
- Log in to the VPN using the test client, once successfully authenticated you can check to see if the client has been assigned the correct IP address
 
- Within the RADIUS authentication logs double check to confirm the Framed-IP-Address value was used 
 
How To Configure AnyConnect SSL VPN On Cisco ASA 5500
Repeating the test for a user that does NOT have a static IP address assigned with in AD continues to work and an IP address is assigned from configured IP Address Pool on the ASA.