Anyconnect Static Ip

Posted on  by 



Home • Регистрация • FAQ • Поиск • Вход
Сообщения без ответов | Активные темы Текущее время: 23 апр 2021, 04:13

Anyconnect доступ в несколько сетей

Модератор: Fedia



Страница 1 из 1
[ Сообщений: 3 ]
Версия для печатиПред. тема | След. тема
АвторСообщение

Зарегистрирован: 20 май 2012, 20:30
Сообщения: 16
Есть Cisco ASA 5505 на ней поднят Anyconnect так чтобы клиент видел внутренние ресурсы и выходил через неё в интернет.
Клиент подключается к ней и видит сеть 10.1.0.0/24 и спокойно ходит в интернет, но не может подключится к хостам в 10.1.3.0/24 и не имеет доступа к самой ASA.
Как сделать так чтобы клиент подключившейся с помощью anyconnect видел все сети и мог подключится к ASA по ssh?
Вот конфигурация c ASA:
home-gw-1(config)# sh run
: Saved
:
ASA Version 8.4(4)
!
hostname home-gw-1
domain-name home.local
enable password 2KFQnbNIdI.2KYOU encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
names
name 10.1.0.1 gw
!
interface Ethernet0/0
description isp
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
description home-sw-core
switchport trunk allowed vlan 2,10,13
switchport mode trunk
!
interface Vlan1
no nameif
no security-level
no ip address
!
interface Vlan2
description ISP-ONLIME
nameif outside
security-level 0
ip address dhcp setroute
!
interface Vlan10
description LAN
nameif inside
security-level 100
ip address gw 255.255.255.0
!
interface Vlan13
description management
nameif mgt
security-level 100
ip address 10.1.3.1 255.255.255.0
!
boot system disk0:/asa844-k8.bin
boot config disk0:/startup-config
ftp mode passive
clock timezone MSK 4
dns domain-lookup inside
dns server-group DefaultDNS
name-server 77.37.255.30
name-server 77.37.251.33
domain-name home.local
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
object network C1
host 10.1.0.99
object network OBJ-ANYCONNECT-POOL
subnet 10.1.1.0 255.255.255.0
object network OBJ-USERS
subnet 10.1.0.0 255.255.255.0
object network OBJ-MGT
subnet 10.1.3.0 255.255.255.0
access-list INSIDE-ACL-IN extended permit ip object OBJ-USERS any
access-list INSIDE-ACL-OUT extended permit ip any object OBJ-USERS
access-list MGT-ACL-IN extended permit ip object OBJ-MGT any
access-list MGT-ACL-OUT extended permit ip any object OBJ-MGT
access-list OUTSIDE-ACL-IN extended permit ip any any
access-list OUTSIDE-ACL-OUT extended permit ip any any
pager lines 24
logging enable
logging asdm informational
mtu outside 1500
mtu inside 1500
mtu mgt 1500
ip local pool vpn-pool 10.1.1.10-10.1.1.35 mask 255.255.255.0
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-649.bin
no asdm history enable
arp timeout 14400
nat (mgt,outside) source static OBJ-MGT OBJ-MGT destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp
nat (inside,outside) source static OBJ-USERS OBJ-USERS destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp
!
object network C1
nat (inside,outside) static interface service tcp 22000 22000
object network OBJ-ANYCONNECT-POOL
nat (outside,outside) dynamic interface
object network OBJ-USERS
nat (inside,outside) dynamic interface
object network OBJ-MGT
nat (mgt,outside) dynamic interface
access-group OUTSIDE-ACL-IN in interface outside
access-group OUTSIDE-ACL-OUT out interface outside
access-group INSIDE-ACL-IN in interface inside
access-group INSIDE-ACL-OUT out interface inside
access-group MGT-ACL-IN in interface mgt
access-group MGT-ACL-OUT out interface mgt
route inside 10.1.4.0 255.255.255.0 10.1.0.2 1
route inside 10.10.0.0 255.255.0.0 10.1.0.70 1
timeout xlate 3:00:00
timeout pat-xlate 0:00:30
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
timeout floating-conn 0:00:00
dynamic-access-policy-record DfltAccessPolicy
user-identity default-domain LOCAL
aaa authentication ssh console LOCAL
http server enable
http 10.1.0.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
telnet timeout 5
ssh 10.1.1.0 255.255.255.0 outside
ssh 10.1.0.0 255.255.255.0 inside
ssh 10.1.3.0 255.255.255.0 mgt
ssh timeout 60
ssh version 2
ssh key-exchange group dh-group1-sha1
console timeout 0
management-access inside
dhcpd lease 86400
dhcpd auto_config outside
!
dhcpd address 10.1.0.100-10.1.0.200 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 62.117.76.141
ntp server 62.117.76.142
ntp server 195.2.64.5
webvpn
enable outside
anyconnect-essentials
anyconnect image disk0:/anyconnect-win-2.3.2016-k9.pkg 1
anyconnect enable
tunnel-group-list enable
group-policy GroupPolicy_anyconnect internal
group-policy GroupPolicy_anyconnect attributes
wins-server none
dns-server value 8.8.8.8
vpn-tunnel-protocol ssl-client
default-domain value home.local
username XXXX password XXXXXXXXXXXXXX encrypted privilege 15
tunnel-group anyconnect type remote-access
tunnel-group anyconnect general-attributes
address-pool vpn-pool
default-group-policy GroupPolicy_anyconnect
nat-assigned-to-public-ip inside
tunnel-group anyconnect webvpn-attributes
group-alias anyconnect enable
!
class-map inspection_default
!
!
policy-map global_policy
class inspection_default
inspect icmp
inspect ctiqbe
inspect dcerpc
inspect dns
inspect esmtp
inspect ftp
inspect h323 h225
inspect h323 ras
inspect http
inspect icmp error
inspect ils
inspect ip-options
inspect mgcp
inspect netbios
inspect pptp
inspect rsh
inspect rtsp
inspect sip
inspect skinny
inspect snmp
inspect sqlnet
inspect sunrpc
inspect waas
inspect xdmcp
inspect tftp
!
service-policy global_policy global
prompt hostname context
no call-home reporting anonymous
call-home
profile CiscoTAC-1
no active
destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
destination address email callhome@cisco.com
destination transport-method http
subscribe-to-alert-group diagnostic
subscribe-to-alert-group environment
subscribe-to-alert-group inventory periodic monthly
subscribe-to-alert-group configuration periodic monthly
subscribe-to-alert-group telemetry periodic daily
Cryptochecksum:0df26896e70c035e13c19bec3b3180e5
: end

Топология:
packet-tracer:
home-gw-1(config)# packet-tracer input outside tcp 10.1.1.11 ssh 10.1.0.2 ssh
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (inside,outside) source static OBJ-USERS OBJ-USERS destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp
Additional Information:
NAT divert to egress interface inside
Untranslate 10.1.0.2/22 to 10.1.0.2/22
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group OUTSIDE-ACL-IN in interface outside
access-list OUTSIDE-ACL-IN extended permit ip any any
Additional Information:
Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 4
Type: CP-PUNT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: WEBVPN-SVC
Subtype: in
Result: DROP
Config:
Additional Information:
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

home-gw-1(config)# packet-tracer input outside tcp 10.1.1.11 ssh 10.1.3.2 ssh
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (mgt,outside) source static OBJ-MGT OBJ-MGT destination static OBJ-ANYCONNECT-POOL OBJ-ANYCONNECT-POOL no-proxy-arp
Additional Information:
NAT divert to egress interface mgt
Untranslate 10.1.3.2/22 to 10.1.3.2/22
Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group OUTSIDE-ACL-IN in interface outside
access-list OUTSIDE-ACL-IN extended permit ip any any
Additional Information:
Phase: 3
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 4
Type: CP-PUNT
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 5
Type: WEBVPN-SVC
Subtype: in
Result: DROP
Config:
Additional Information:
Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: mgt
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

ping с home-sw-core:
home-sw-core#ping 10.1.3.1 source vlan 13
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.3.1, timeout is 2 seconds:
Packet sent with a source address of 10.1.3.2
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/6 ms
home-sw-core#ping 10.1.0.1 source vlan 10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 10.1.0.1, timeout is 2 seconds:
Packet sent with a source address of 10.1.0.2
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms


06 май 2014, 15:30

Зарегистрирован: 10 окт 2012, 09:51
Сообщения: 2678
а вы уверены что в инет ходит через вас?
Я что-то не увидел у вас в конфиге, какие маршруты вы передаете клиенту. Вот не помню, передается по-умолчанию default или нет.


06 май 2014, 17:45
2 crash
Маршрут передаётся. В интернет клиент ходит через асу.


06 май 2014, 21:46
Страница 1 из 1
[ Сообщений: 3 ]

Кто сейчас на конференции

Сейчас этот форум просматривают: Google [Bot] и гости: 55


Вы не можете начинать темы
Вы не можете отвечать на сообщения
Вы не можете редактировать свои сообщения
Вы не можете удалять свои сообщения
Вы не можете добавлять вложения

Создано на основе phpBB® Forum Software © phpBB Group
Designed by ST Software for PTF.
Русская поддержка phpBB
Cisco anyconnect static ip ldap

For example, 192.168.1.10 - 192.168.1.253, leaving 192.168.1.1 to 192.168.1.9 in my static IP addresses under Dial-up Tab in the Windows AD??? What I want to happen is the Cisco ASA will still assign random IP addresses to AnyConnect VPN users but for certain LDAP users, they should have specific.

Overview

When using a Cisco ASA with the AnyConnect VPN Client software in some instances it is useful to assign the same static IP address to a client whenever they connect to the VPN. Within Active Directory you can configure per user a static IP address and use this IP address whenever the user connects to the VPN. The RADIUS Server (in this instance Cisco ISE 2.0) can be configured to query the attribute in AD which is the” msRADIUSFramedIPAddress” value and assign to the client whenever they connect.

This post only describes configuring a static IP address on a Cisco AnyConnect Remote Access VPN. Refer to the following posts for more detail instructions on how to configure ASA Remote Access VPN and integrated with Cisco ISE for authentication:
ASA AnyConnect SSL-VPN
ASA AnyConnect IKEv2/IPSec VPN

Software/Hardware Used:

Hi, So I have Anyconnect VPN configured on my ASA and users are being authenticated via ACS. My requirement is to provide static IP for all users. I have configured pool on ASA and after that I configured Framed IP on ACS. When connecting for first time, the user gets the same IP but after disconnection, the user gets a different pool IP. Over a static route: use the IP address of the MX/Z on the subnet shared with the next hop Over VPN: use the IP address of the MX/Z on the highest-numbered VLAN in VPN Create and enter a RADIUS Shared Secret (make note of this secret, you will need to add this to the dashboard). To exclude a range of IP addresses from the static address pool, type the starting IP address of the range that you want to exclude in the From box, type the ending IP address of the range that you want to exclude in the To box, and then select Add. Select OK, select OK, and then select Continue. Select the Protocols tab, select TCP/IP Protocol Properties.

Mac best latex editor. Windows 7 SP1 (Client)
Windows 2008 R2 (Active Directory Domain Controller)
Cisco ISE 2.0 (RADIUS Server)
Cisco ASAv v9.6(1)
Cisco AnyConnect Client 4.2.01022

Cisco ASA Configuration

  • Modify the existing IP Address Pool to decrease the number of IP addresses, leaving space at the end of the range (or beginning) to be used for statically assigned IP addresses.

AD Account Modification

  • Select a test account within AD
  • Modify the properties of the test account; select the “Dial-in” tab
  • Tick the “Assign Static IP Address” box
  • Click the “Static IP Address” button
  • Tick “Assign a static IPv4 address” box and enter and IP address from within the IP address range defined on the Cisco ASA appliances
  • Click “OK” to complete the configuration

Cisco ISE Configuration

Add AD Attribute

  • Modify the configuration of the existing Active Directory External Identity Source and select Edit
  • Click “Attributes” tab
  • Click “Add” > “Select Attributes from Directory”
  • Enter the name of the test user previously modified to add the Static IP address and select “Retrieve Attributes”
  • Ensure you tick the box “msRADIUSFramedIPAddress” and click “Ok”

American pie reunion hd free download. IMPORTANT – If you do not previously assign as static IP address to the user account you are using to query AD for the list of attributes the “msRADIUSFramedIPAddress” will not be in the list to select.

  • Edit the attribute “msRADIUSFramedIPAddress” and change the “Type” value from STRING to IPv4
  • Click “Save”

Anyconnect Static Ip Server

Create Authorization Profile

  • Create a new “Authorization Profile” called “Static-VPN-IP-Address” – Policy > Policy Elements > Results > Authorization > Authorization Profiles
  • In the Advanced Attributes Settings add a new value for “Radius:Framed-IP-Address” and equals the “msRADIUSFramedIPAddress” value previously added


NOTE – “LAB_AD” will equal the name of YOUR Active Directory

Modify Policy Set

Cached
  • Modify the existing Policy and the “Static-VPN-IP-Address” Authorization Profile

Test AnyConnect VPN Client

  • Log in to the VPN using the test client, once successfully authenticated you can check to see if the client has been assigned the correct IP address
  • Within the RADIUS authentication logs double check to confirm the Framed-IP-Address value was used

How To Configure AnyConnect SSL VPN On Cisco ASA 5500

Repeating the test for a user that does NOT have a static IP address assigned with in AD continues to work and an IP address is assigned from configured IP Address Pool on the ASA.





Coments are closed