<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту]]></title><description><![CDATA[<p dir="auto">Я настроил ASAv в AWS<br />
и сконфигурировал IKEv2 IPSEC VPN между ним и моим локальным Juniper SRX.<br />
Я также настроил шлюз AnyConnect VPN, используя тот же внешний интерфейс, что и шлюз VPN. Аутентификация пользователей VPN должна проходить через туннель IPSEC, чтобы достичь сервера Radius.<br />
Мой туннель IPSEC работает,<br />
но когда я тестирую трафик от внутреннего интерфейса к серверу Radius, он отбрасывается ASAv.<br />
У меня нет настроенного ACL, который бы блокировал этот трафик.<br />
Вот полная конфигурация ASAv: ciscoasa# sh run<br />
: Saved :<br />
: Serial Number: xxxxxxxxxxxx<br />
: Hardware: ASAv, 7680 MB RAM, CPU Xeon 4100/6100/8100 series 3000 MHz, 1 CPU (4 cores)<br />
:<br />
ASA Version 9.23(1)22<br />
!<br />
hostname ciscoasa<br />
enable password ***** pbkdf2<br />
service-module 0 keepalive-timeout 4<br />
service-module 0 keepalive-counter 6<br />
names<br />
name 129.6.15.28 <a href="http://time-a.nist.gov" rel="nofollow ugc">time-a.nist.gov</a><br />
name 129.6.15.29 <a href="http://time-b.nist.gov" rel="nofollow ugc">time-b.nist.gov</a><br />
name 129.6.15.30 <a href="http://time-c.nist.gov" rel="nofollow ugc">time-c.nist.gov</a><br />
no mac-address auto<br />
ip local pool SSL-RAVPN-Pool 10.251.14.160-10.251.14.190 mask 255.255.255.224 !<br />
interface Management0/0 management-only nameif management security-level 100 ip address dhcp setroute<br />
!<br />
interface TenGigabitEthernet0/0 nameif INSIDE security-level 100 ip address 192.168.1.234 255.255.255.0<br />
!<br />
interface TenGigabitEthernet0/1 nameif OUTSIDE security-level 0 ip address 192.168.2.164 255.255.255.0<br />
!<br />
interface Tunnel1 nameif VPN-SCDC ip address 169.254.250.1 255.255.255.252 tunnel source interface OUTSIDE tunnel destination 123.123.45.66 tunnel mode ipsec ipv4 tunnel protection ipsec profile SCDC-VPN-PROFILE<br />
!<br />
tcpproxy tx-q-limit 2000<br />
tcpproxy rtx-q-limit 2000<br />
ftp mode passive<br />
dns domain-lookup OUTSIDE<br />
dns server-group DefaultDNS name-server 8.8.8.8 OUTSIDE<br />
same-security-traffic permit inter-interface<br />
same-security-traffic permit intra-interface<br />
no object-group-search access-control<br />
object network ASA_OUTSIDE_PRIVATE host 192.168.2.164<br />
object network ASA_OUTSIDE_PUBLIC host 54.46.36.83<br />
object network NET_INSIDE subnet 192.168.1.0 255.255.255.0<br />
object network NET_SCDC subnet 172.25.0.0 255.255.0.0<br />
access-group INSIDE-IN in interface INSIDE<br />
access-group allow-all out interface INSIDE<br />
access-group allow-all global<br />
access-list allow-all extended permit ip any4 any4<br />
access-list allow-all extended permit ip any6 any6<br />
access-list OUTSIDE_IN extended permit icmp any any<br />
access-list OUTSIDE_IN extended permit udp host 192.168.1.234 host 10.251.100.241 eq 1812<br />
access-list OUTSIDE_IN extended permit udp host 192.168.1.234 host 10.251.100.242 eq 1812<br />
access-list OUTSIDE_IN extended permit udp host 192.168.1.234 host 10.251.100.241 eq 1813<br />
access-list OUTSIDE_IN extended permit udp host 192.168.1.234 host 10.251.100.242 eq 1813<br />
access-list ICMP_MGMT extended permit icmp any any<br />
access-list ACL-IKEV2 extended permit ip 192.168.1.0 255.255.255.0 172.25.0.0 255.255.0.0<br />
access-list VPN-SCDC-IN extended permit ip any any<br />
access-list newyork-filter extended permit udp any4 host 10.251.22.15 eq domain<br />
access-list newyork-filter extended permit udp any4 host 10.251.22.18 eq domain<br />
access-list newyork-filter extended deny ip any4 object-group GPSF-Internal<br />
access-list newyork-filter extended permit ip any4 any4<br />
access-list newyork-filter extended permit udp any4 host 172.25.116.27 eq domain<br />
access-list newyork-filter extended permit udp any4 host 172.25.116.28 eq domain<br />
access-list RSA-newyork extended permit ip any any<br />
access-list INSIDE-IN extended permit udp 192.168.1.0 255.255.255.0 host 10.251.100.241 eq 1812<br />
access-list INSIDE-IN extended permit udp 192.168.1.0 255.255.255.0 host 10.251.100.242 eq 1812<br />
access-list INSIDE-IN extended permit udp 192.168.1.0 255.255.255.0 host 10.251.100.241 eq 1813<br />
access-list INSIDE-IN extended permit udp 192.168.1.0 255.255.255.0 host 10.251.100.242 eq 1813<br />
access-list INSIDE-IN extended permit ip any any<br />
pager lines 23<br />
mtu management 1500<br />
mtu INSIDE 1500<br />
mtu OUTSIDE 1500<br />
no failover<br />
no failover wait-disable<br />
no monitor-interface service-module<br />
icmp unreachable rate-limit 1 burst-size 1<br />
icmp permit any echo INSIDE<br />
no asdm history enable<br />
arp timeout 14400<br />
no arp permit-nonconnected<br />
arp rate-limit 16384<br />
logging enable<br />
logging asdm informational<br />
nat (OUTSIDE,INSIDE) source dynamic any interface<br />
nat (INSIDE,OUTSIDE) source static NET_INSIDE NET_INSIDE destination static NET_SCDC NET_SCDC no-proxy-arp route-lookup<br />
!<br />
object network ASA_OUTSIDE_PRIVATE nat (OUTSIDE,OUTSIDE) static ASA_OUTSIDE_PUBLIC<br />
route OUTSIDE 0.0.0.0 0.0.0.0 192.168.2.1 1<br />
route VPN-SCDC 10.251.100.241 255.255.255.255 169.254.250.2 1<br />
route VPN-SCDC 10.251.100.242 255.255.255.255 169.254.250.2 1<br />
route VPN-SCDC 172.25.0.0 255.255.0.0 169.254.250.2 1<br />
timeout xlate 3:00:00<br />
timeout pat-xlate 0:00:30<br />
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02<br />
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00<br />
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00<br />
timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute<br />
timeout tcp-proxy-reassembly 0:01:00<br />
timeout floating-conn 0:00:00<br />
timeout conn-holddown 0:00:15<br />
timeout igp stale-route 0:01:10<br />
aaa-server rsa-newyork protocol radius<br />
aaa-server rsa-newyork (INSIDE) host 10.251.100.241 retry-interval 5 timeout 30 key ***** authentication-port 1812 accounting-port 1813<br />
aaa-server rsa-newyork (INSIDE) host 10.251.100.242 retry-interval 5 timeout 30 key ***** authentication-port 1812 accounting-port 1813<br />
user-identity default-domain LOCAL<br />
aaa authentication ssh console LOCAL<br />
aaa authentication http console LOCAL<br />
aaa authentication match RSA-newyork OUTSIDE rsa-newyork<br />
aaa accounting match RSA-newyork OUTSIDE rsa-newyork<br />
aaa authentication login-history<br />
http server enable<br />
http 0.0.0.0 0.0.0.0 management<br />
http 0.0.0.0 0.0.0.0 INSIDE<br />
no snmp-server location<br />
no snmp-server contact<br />
crypto ipsec ikev2 ipsec-proposal SCDC-IKEv2-PROPOSAL protocol esp encryption aes-256 protocol esp integrity sha-256<br />
crypto ipsec profile SCDC-VPN-PROFILE set ikev2 ipsec-proposal SCDC-IKEv2-PROPOSAL set pfs group14 set security-association lifetime seconds 3600<br />
crypto ipsec security-association pmtu-aging infinite<br />
crypto ca trustpoint _SmartCallHome_ServerCA no validation-usage crl configure<br />
crypto ca trustpoint _SmartCallHome_ServerCA2 no validation-usage crl configure<br />
crypto ca trustpoint ASDM_TrustPoint0 enrollment terminal crl configure<br />
crypto ca trustpoint ASDM_TrustPoint1 keypair ASDM_TrustPoint1 crl configure<br />
crypto ca trustpoint ASDM_TrustPoint1-1 crl configure<br />
crypto ca trustpool policy auto-import<br />
crypto ca certificate chain _SmartCallHome_ServerCA crypto ikev2 policy 10 encryption aes-256 integrity sha256 group 14 prf sha256 lifetime seconds 28800<br />
crypto ikev2 enable OUTSIDE<br />
telnet timeout 10<br />
ssh scopy enable<br />
ssh stricthostkeycheck<br />
ssh timeout 60<br />
ssh key-exchange group dh-group14-sha256<br />
ssh 0.0.0.0 0.0.0.0 management<br />
ssh ::/0 management<br />
console timeout 0<br />
threat-detection basic-threat<br />
threat-detection statistics access-list<br />
no threat-detection statistics tcp-intercept<br />
ntp server <a href="http://time-c.nist.gov" rel="nofollow ugc">time-c.nist.gov</a><br />
ntp server <a href="http://time-b.nist.gov" rel="nofollow ugc">time-b.nist.gov</a><br />
ntp server <a href="http://time-a.nist.gov" rel="nofollow ugc">time-a.nist.gov</a><br />
ssl trust-point ASDM_TrustPoint1 OUTSIDE<br />
webvpn enable OUTSIDE http-headers hsts-server enable max-age 31536000 include-sub-domains no preload hsts-client enable x-content-type-options x-xss-protection content-security-policy anyconnect profiles PermitRDP disk0:/PermitRDP.xml anyconnect enable cache disable error-recovery disable<br />
group-policy RSA-newyork internal<br />
group-policy RSA-newyork attributes dns-server value 10.251.22.15 10.251.22.18 vpn-simultaneous-logins 1 vpn-idle-timeout 60 vpn-session-timeout 720 vpn-tunnel-protocol ssl-client split-tunnel-policy tunnelall webvpn anyconnect mtu 1300 anyconnect ask none default anyconnect<br />
dynamic-access-policy-record DfltAccessPolicy<br />
username admin_asdm password ***** pbkdf2 privilege 15<br />
username admin password ***** pbkdf2 privilege 15<br />
username admin attributes service-type admin ssh authentication publickey bb:55:51:3d:36:bc:b1:e1:d6:ed:27:c8:ac:57:e3:50:cb:57:29:63:0e:f2:15:f6:0e:c3:dc:cb:ed<img src="https://sla247.ru/forum/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4bf.png?v=bf4cb1bda7d" class="not-responsive emoji emoji-android emoji--cd" style="height:23px;width:auto;vertical-align:middle" title=":cd:" alt="💿" />b0:48 hashed<br />
username netadmin password ***** pbkdf2 privilege 15<br />
username netadmin attributes service-type admin<br />
tunnel-group RSA-newyork type remote-access<br />
tunnel-group RSA-newyork general-attributes authentication-server-group rsa-newyork default-group-policy RSA-newyork<br />
tunnel-group RSA-newyork webvpn-attributes group-alias RSA-newyork enable group-url <a href="https://svpn-sh.arcgames.com/rsa-newyork" rel="nofollow ugc">https://svpn-sh.arcgames.com/rsa-newyork</a> enable<br />
tunnel-group 123.123.45.66 type ipsec-l2l<br />
tunnel-group 123.123.45.66 ipsec-attributes peer-id-validate nocheck ikev2 remote-authentication pre-shared-key ***** ikev2 local-authentication pre-shared-key *****<br />
!<br />
class-map inspection_default match default-inspection-traffic<br />
!<br />
!<br />
policy-map type inspect dns migrated_dns_map_1 parameters message-length maximum client auto message-length maximum 512 no tcp-inspection<br />
policy-map global_policy class inspection_default inspect dns migrated_dns_map_1 inspect ftp inspect h323 h225 inspect h323 ras inspect ip-options inspect netbios inspect rsh inspect rtsp inspect skinny inspect esmtp inspect sqlnet inspect sunrpc inspect tftp inspect sip inspect icmp<br />
policy-map type inspect dns migrated_dns_map_2 parameters message-length maximum client auto message-length maximum 512 no tcp-inspection<br />
!<br />
service-policy global_policy global<br />
prompt hostname context<br />
no call-home reporting anonymous<br />
call-home profile License destination address http <a href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow ugc">https://tools.cisco.com/its/service/oddce/services/DDCEService</a> destination transport-method http profile CiscoTAC-1 no active destination address http <a href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow ugc">https://tools.cisco.com/its/service/oddce/services/DDCEService</a> destination address email <a href="mailto:callhome@cisco.com" rel="nofollow ugc">callhome@cisco.com</a> destination transport-method http subscribe-to-alert-group diagnostic subscribe-to-alert-group environment subscribe-to-alert-group inventory periodic monthly subscribe-to-alert-group configuration periodic monthly subscribe-to-alert-group telemetry periodic daily<br />
Cryptochecksum:78d801f541af0d2e8db87ffe51eadf35<br />
: end Вот вывод packet-tracer: ciscoasa# packet-tracer input insiDE tcp 192.168.1.234 12345 10.251.100.242 1812 det Phase: 1<br />
Type: ACCESS-LIST<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 5456 ns<br />
Config:<br />
Implicit Rule<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe1a7d8c0, priority=1, domain=permit, deny=false hits=6, user_data=0x0000000000000000, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=INSIDE, output_ifc=any Phase: 2<br />
Type: INPUT-ROUTE-LOOKUP<br />
Subtype: Resolve Egress Interface<br />
Result: ALLOW<br />
Elapsed time: 11253 ns<br />
Config:<br />
Additional Information:<br />
Found next-hop 169.254.250.2 using egress ifc VPN-SCDC Phase: 3<br />
Type: ACCESS-LIST<br />
Subtype:<br />
Result: DROP<br />
Elapsed time: 5342 ns<br />
Config:<br />
Implicit Rule<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe1a900e0, priority=501, domain=permit, deny=true hits=6, user_data=0x0000000000000007, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=192.168.1.234, mask=255.255.255.255, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dscp=0x0, input_ifc=INSIDE, output_ifc=any Result:<br />
input-interface: INSIDE<br />
input-status: up<br />
input-line-status: up<br />
output-interface: VPN-SCDC<br />
output-status: up<br />
output-line-status: up<br />
Action: drop<br />
Time Taken: 22051 ns<br />
Drop-reason: (acl-drop) Flow is denied by configured rule, Drop-location: frame snp_classify_table_lookup:6051 flow (NA)/NA Кто-нибудь знает, почему это происходит?</p>
]]></description><link>https://sla247.ru/forum/topic/2368/asav-в-облаке-aws-трафик-vpnuser-заблокирован-от-vpn-к-локальному-сайту</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 16:49:13 GMT</lastBuildDate><atom:link href="https://sla247.ru/forum/topic/2368.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 02 Mar 2026 12:41:31 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:37 GMT]]></title><description><![CDATA[<p dir="auto">Привет, <a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/bigwantheory" aria-label="Profile: BigWANTheory">@<bdi>BigWANTheory</bdi></a><br />
Только со стороны ASAv. Спасибо, Кристиан.</p>
]]></description><link>https://sla247.ru/forum/post/16681</link><guid isPermaLink="true">https://sla247.ru/forum/post/16681</guid><dc:creator><![CDATA[Cristian Matei]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:37 GMT</pubDate></item><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:36 GMT]]></title><description><![CDATA[<p dir="auto">@Роб Ингрэм<br />
написал:<br />
<a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/bigwantheory" aria-label="Profile: BigWANTheory">@<bdi>BigWANTheory</bdi></a><br />
вы настраиваете обратную связь на ASAv ciscoasa# ping 192.168.5.100<br />
Type escape sequence to abort.<br />
Sending 5, 100-byte ICMP Echos to 192.168.5.100, timeout is 2 seconds:<br />
!!!!!<br />
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms<br />
ciscoasa# packet-tracer input insiDE tcp 192.168.5.100 12345 10.251.100.242 18$ Phase: 1<br />
Type: ACCESS-LIST<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 7843 ns<br />
Config:<br />
Implicit Rule<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe1a7d8c0, priority=1, domain=permit, deny=false hits=7, user_data=0x0000000000000000, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=INSIDE, output_ifc=any Phase: 2<br />
Type: INPUT-ROUTE-LOOKUP<br />
Subtype: Resolve Egress Interface<br />
Result: ALLOW<br />
Elapsed time: 13299 ns<br />
Config:<br />
Additional Information:<br />
Found next-hop 169.254.250.2 using egress ifc VPN-SCDC Phase: 3<br />
Type: ACCESS-LIST<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 4887 ns<br />
Config:<br />
access-group INSIDE-IN in interface INSIDE<br />
access-list INSIDE-IN extended permit ip any any<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febec028ad0, priority=13, domain=permit, deny=false hits=0, user_data=0x0000000000000000, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, input_ifc=INSIDE, output_ifc=any Phase: 4<br />
Type: NAT<br />
Subtype: per-session<br />
Result: ALLOW<br />
Elapsed time: 4887 ns<br />
Config:<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe15df930, priority=0, domain=nat-per-session, deny=false hits=1291604, user_data=0x0000000000000000, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, input_ifc=any, output_ifc=any Phase: 5<br />
Type: IP-OPTIONS<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 4887 ns<br />
Config:<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe1a87970, priority=0, domain=inspect-ip-options, deny=true hits=0, user_data=0x0000000000000000, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dscp=0x0, input_ifc=INSIDE, output_ifc=any Phase: 6<br />
Type: QOS<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 26939 ns<br />
Config:<br />
Additional Information: Forward Flow based lookup yields rule: in id=0x7febe4017600, priority=70, domain=qos-per-class, deny=false hits=43849, user_data=0x00007febe4017290, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, input_ifc=any, output_ifc=any Phase: 7<br />
Type: VPN<br />
Subtype: encrypt<br />
Result: ALLOW<br />
Elapsed time: 3751 ns<br />
Config:<br />
Additional Information: Forward Flow based lookup yields rule: out id=0x7febe4124030, priority=70, domain=encrypt, deny=false hits=1, user_data=0x000000000000155c, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dscp=0x0, input_ifc=any, output_ifc=VPN-SCDC Phase: 8<br />
Type: QOS<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 19096 ns<br />
Config:<br />
Additional Information: Reverse Flow based lookup yields rule: in id=0x7febe4017600, priority=70, domain=qos-per-class, deny=false hits=43850, user_data=0x00007febe4017290, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, input_ifc=any, output_ifc=any Phase: 9<br />
Type: VPN<br />
Subtype: ipsec-tunnel-flow<br />
Result: ALLOW<br />
Elapsed time: 341 ns<br />
Config:<br />
Additional Information: Reverse Flow based lookup yields rule: in id=0x7febe428e710, priority=69, domain=ipsec-tunnel-flow, deny=false hits=1, user_data=0x000000000000275c, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dscp=0x0, input_ifc=VPN-SCDC, output_ifc=any Phase: 10<br />
Type: NAT<br />
Subtype: per-session<br />
Result: ALLOW<br />
Elapsed time: 1023 ns<br />
Config:<br />
Additional Information: Reverse Flow based lookup yields rule: in id=0x7febe15df930, priority=0, domain=nat-per-session, deny=false hits=1291606, user_data=0x0000000000000000, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, input_ifc=any, output_ifc=any Phase: 11<br />
Type: IP-OPTIONS<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 341 ns<br />
Config:<br />
Additional Information: Reverse Flow based lookup yields rule: in id=0x7febe1b4a6a0, priority=0, domain=inspect-ip-options, deny=true hits=1, user_data=0x0000000000000000, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dscp=0x0, input_ifc=VPN-SCDC, output_ifc=any Phase: 12<br />
Type: FLOW-CREATION<br />
Subtype:<br />
Result: ALLOW<br />
Elapsed time: 19096 ns<br />
Config:<br />
Additional Information:<br />
New flow created with id 1273875, packet dispatched to next module<br />
Module information for forward flow ...<br />
snp_fp_inspect_ip_options<br />
snp_fp_tcp_normalizer<br />
snp_fp_tls_watcher<br />
snp_fp_translate<br />
snp_fp_adjacency<br />
snp_fp_encrypt<br />
snp_fp_fragment<br />
snp_fp_tracer_drop<br />
snp_ifc_stat Module information for reverse flow ...<br />
snp_fp_inspect_ip_options<br />
snp_fp_ipsec_tunnel_flow<br />
snp_fp_translate<br />
snp_fp_tcp_normalizer<br />
snp_fp_tls_watcher<br />
snp_fp_adjacency<br />
snp_fp_fragment<br />
snp_fp_tracer_drop<br />
snp_ifc_stat Result:<br />
input-interface: INSIDE<br />
input-status: up<br />
input-line-status: up<br />
output-interface: VPN-SCDC<br />
output-status: up<br />
output-line-status: up<br />
Action: allow<br />
Time Taken: 106390 ns</p>
]]></description><link>https://sla247.ru/forum/post/16680</link><guid isPermaLink="true">https://sla247.ru/forum/post/16680</guid><dc:creator><![CDATA[BigWANTheory]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:36 GMT</pubDate></item><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:35 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/bigwantheory" aria-label="Profile: BigWANTheory">@<bdi>BigWANTheory</bdi></a><br />
вы настраиваете обратную связь на ASAv</p>
]]></description><link>https://sla247.ru/forum/post/16679</link><guid isPermaLink="true">https://sla247.ru/forum/post/16679</guid><dc:creator><![CDATA[Rob Ingram]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:35 GMT</pubDate></item><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:34 GMT]]></title><description><![CDATA[<p dir="auto">Спасибо, это значит<br />
, что мне также нужно будет настроить интерфейс обратной связи на стороне AWS?</p>
]]></description><link>https://sla247.ru/forum/post/16678</link><guid isPermaLink="true">https://sla247.ru/forum/post/16678</guid><dc:creator><![CDATA[BigWANTheory]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:34 GMT</pubDate></item><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:33 GMT]]></title><description><![CDATA[<p dir="auto"><a class="plugin-mentions-user plugin-mentions-a" href="/forum/user/bigwantheory" aria-label="Profile: BigWANTheory">@<bdi>BigWANTheory</bdi></a><br />
используйте интерфейс обратной связи в качестве исходного интерфейса для AAA и убедитесь, что удаленная сторона имеет маршрут к этому интерфейсу обратной связи.</p>
]]></description><link>https://sla247.ru/forum/post/16677</link><guid isPermaLink="true">https://sla247.ru/forum/post/16677</guid><dc:creator><![CDATA[Rob Ingram]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:33 GMT</pubDate></item><item><title><![CDATA[Reply to ASAv в облаке AWS, трафик vpnUser заблокирован от VPN к локальному сайту on Mon, 02 Mar 2026 12:41:32 GMT]]></title><description><![CDATA[<p dir="auto">Здравствуйте, В ASA существует архитектурное ограничение, означающее, что трафик, исходящий из устройства или направляющийся в устройство, не может проходить через него: например, если вы хотите выполнить ping хосту, доступному с точки зрения маршрутизации на внешнем интерфейсе ASA, вы не можете использовать никакой другой интерфейс источника, кроме внешнего интерфейса, поскольку использование внутреннего интерфейса означает, что трафик будет проходить через устройство, изнутри наружу, что не допускается. Это ограничение существовало с самого начала ASA/PIX, оно по-прежнему существует по соображениям безопасности и не может быть отключено. Судя по вашей конфигурации, вы подпадаете под это ограничение, поскольку ваш сервер RADIUS настроен с интерфейсом INSIDE (который будет работать только в том случае, если сервер RADIUS доступен с точки зрения маршрутизации через интерфейс INSIDE), однако вывод вашего пакетного трассировщика показывает, что сервер RADIUS доступен с точки зрения маршрутизации через интерфейс VPN-туннеля. Решение заключается в том, чтобы настроить интерфейс Loopback, назначить ему подсеть IPv4 /32, дать ему имя, например LOOPBACK, убедиться, что эта подсеть /32 маршрутизируется через VPN-туннель в обоих направлениях, и перенастроить ваш сервер RADIUS на использование Loopback nameif вместо INSIDE. Спасибо, Кристиан.</p>
]]></description><link>https://sla247.ru/forum/post/16676</link><guid isPermaLink="true">https://sla247.ru/forum/post/16676</guid><dc:creator><![CDATA[Cristian Matei]]></dc:creator><pubDate>Mon, 02 Mar 2026 12:41:32 GMT</pubDate></item></channel></rss>