Can't access shared drive when connecting over VPN
- by evolvd
I can ping all network devices but it doesn't seem that DNS is resolving their hostnames.
ipconfig/ all is showing that I am pointing to the correct dns server.
I can "ping "dnsname"" and it will resolve but it wont resolve any other names.
Split tunnel is set up so outside DNS is resolving fine
So one issue might be DNS but I have the IP address of the server share so I figure I could just get to it that way. example: \10.0.0.1\ well I can't get to it that way either and I get "the specified network name is no longer available" I can ping it but I can't open the share.
Below is the ASA config :
ASA Version 8.2(1)
!
hostname KG-ASA
domain-name example.com
names
!
interface Vlan1
nameif inside
security-level 100
ip address 10.0.0.253 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address dhcp setroute
!
interface Ethernet0/0
switchport access vlan 2
!
interface Ethernet0/1
!
interface Ethernet0/2
!
interface Ethernet0/3
!
interface Ethernet0/4
!
interface Ethernet0/5
!
interface Ethernet0/6
!
interface Ethernet0/7
!
ftp mode passive
clock timezone EST -5
clock summer-time EDT recurring
dns domain-lookup outside
dns server-group DefaultDNS
name-server 10.0.0.101
domain-name blah.com
access-list OUTSIDE_IN extended permit tcp any host 10.0.0.253 eq 10000
access-list OUTSIDE_IN extended permit tcp any host 10.0.0.253 eq 8333
access-list OUTSIDE_IN extended permit tcp any host 10.0.0.253 eq 902
access-list SPLIT-TUNNEL-VPN standard permit 10.0.0.0 255.0.0.0
access-list NONAT extended permit ip 10.0.0.0 255.255.255.0 10.0.1.0 255.255.255.0
pager lines 24
logging asdm informational
mtu inside 1500
mtu outside 1500
ip local pool IPSECVPN-POOL 10.0.1.2-10.0.1.50 mask 255.255.255.0
icmp unreachable rate-limit 1 burst-size 1
asdm image disk0:/asdm-621.bin
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list NONAT
nat (inside) 1 0.0.0.0 0.0.0.0
static (inside,outside) tcp interface 10000 10.0.0.101 10000 netmask 255.255.255.255
static (inside,outside) tcp interface 8333 10.0.0.101 8333 netmask 255.255.255.255
static (inside,outside) tcp interface 902 10.0.0.101 902 netmask 255.255.255.255
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
timeout tcp-proxy-reassembly 0:01:00
dynamic-access-policy-record DfltAccessPolicy
aaa authentication enable console LOCAL
aaa authentication http console LOCAL
aaa authentication serial console LOCAL
aaa authentication ssh console LOCAL
aaa authentication telnet console LOCAL
http server enable
http 10.0.0.0 255.255.0.0 inside
http 0.0.0.0 0.0.0.0 outside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set myset esp-aes esp-sha-hmac
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto dynamic-map dynmap 1 set transform-set myset
crypto dynamic-map dynmap 1 set reverse-route
crypto map IPSEC-MAP 65535 ipsec-isakmp dynamic dynmap
crypto map IPSEC-MAP interface outside
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
crypto isakmp policy 65535
authentication pre-share
encryption aes
hash sha
group 2
lifetime 86400
telnet 0.0.0.0 0.0.0.0 inside
telnet timeout 5
ssh 0.0.0.0 0.0.0.0 inside
ssh 70.60.228.0 255.255.255.0 outside
ssh 74.102.150.0 255.255.254.0 outside
ssh 74.122.164.0 255.255.252.0 outside
ssh timeout 5
console timeout 0
dhcpd dns 10.0.0.101
dhcpd lease 7200
dhcpd domain blah.com
!
dhcpd address 10.0.0.110-10.0.0.170 inside
dhcpd enable inside
!
threat-detection basic-threat
threat-detection statistics access-list
no threat-detection statistics tcp-intercept
ntp server 63.111.165.21
webvpn
enable outside
svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1
svc enable
group-policy EASYVPN internal
group-policy EASYVPN attributes
dns-server value 10.0.0.101
vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn
split-tunnel-policy tunnelspecified
split-tunnel-network-list value SPLIT-TUNNEL-VPN
!
tunnel-group client type remote-access
tunnel-group client general-attributes
address-pool (inside) IPSECVPN-POOL
address-pool IPSECVPN-POOL
default-group-policy EASYVPN
dhcp-server 10.0.0.253
tunnel-group client ipsec-attributes
pre-shared-key *
tunnel-group CLIENTVPN type ipsec-l2l
tunnel-group CLIENTVPN ipsec-attributes
pre-shared-key *
!
class-map inspection_default
match default-inspection-traffic
!
!
policy-map global_policy
class inspection_default
inspect icmp
!
service-policy global_policy global
prompt hostname context
I'm not sure where I should go next with troubleshooting
nslookup result:
Default Server: blahname.blah.lan
Address: 10.0.0.101