<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>安全讨论区中的主题 ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
    <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341571#M5136</link>
    <description>&lt;I&gt; 本帖最后由 arvinjing 于 2017-3-10 12:04 编辑 &lt;/I&gt;&lt;BR /&gt;先说anyconnect , 不能访问内部网络有2方面的原因，1.没有路由，需要检查分割列表。2.NAT问题，需要检查VPN的NONAT配置, 从内部网络去往vpn pool地址的流量不能NAT&lt;BR /&gt;第一、隧道分割列表建议更改为扩展列表，当然使用标准列表也没有问题access-list remote-vpn_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0&lt;BR /&gt;建议更改为：access-list remote-vpn_splitTunnelAcl extend permit ip object test192.168.255.0 any&lt;BR /&gt;第二、你的VPN pool地址和内网地址在同一个地址段内，我设计VPN的时候是分开的，建议分开，可能会影响其他NAT和ACL的配置，造成思路不清晰，   假如同一网段的话，那么你的NAT 写的也是错误的，原地址是需要访问的目标网段，destination 是vpn pool 地址，应该是这样的语句nat (inside,outside) source static test192.168.255.0 test192.168.255.0 destination static test192.168.255.0 test192.168.255.0&lt;BR /&gt;NAT 做对了，anyconnect VPN应该就正常了&lt;BR /&gt;</description>
    <pubDate>Fri, 10 Mar 2017 01:25:45 GMT</pubDate>
    <dc:creator>jingjian</dc:creator>
    <dc:date>2017-03-10T01:25:45Z</dc:date>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341567#M5132</link>
      <description>最近配置一个ASA5550防火墙，版本9。1 用ASDM配置完毕后，用anyconnect 连接能连上，地址也能拿到但无法访问到内部任何主机。&lt;BR /&gt;还有NAT配置完服务器端口映射后本地访问映射的端口没问题，其他端口都访问不到，去外部访问经过ASA的端口也无法连接，但所以的机器都能ping通，22端口始终不能访问。&lt;BR /&gt;请问问题出现在哪，配置有点多如下：&lt;BR /&gt;sirunASA# sh run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA&lt;BR /&gt;domain-name sirun.net&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpn-pool 192.168.255.100-192.168.255.251 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 111.x.x.x 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; security-level 0&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; nameif CallCenter&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.8.240 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.9&lt;BR /&gt; shutdown&lt;BR /&gt; vlan 9&lt;BR /&gt; nameif Development&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.9.240 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.10&lt;BR /&gt; shutdown&lt;BR /&gt; vlan 10&lt;BR /&gt; nameif office&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.240 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.11&lt;BR /&gt; shutdown&lt;BR /&gt; vlan 11&lt;BR /&gt; nameif Accounting&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 172.32.5.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.255&lt;BR /&gt; vlan 255&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.255.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3.998&lt;BR /&gt; shutdown&lt;BR /&gt; vlan 998&lt;BR /&gt; nameif hulian&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt; shutdown&lt;BR /&gt; nameif CCC   &lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 172.20.7.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.10.240&lt;BR /&gt; domain-name sirun.net&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network test192.168.255.0&lt;BR /&gt; subnet 192.168.255.0 255.255.255.0&lt;BR /&gt;object network Ali_RD_172.22.0.0&lt;BR /&gt; subnet 172.22.0.0 255.255.0.0&lt;BR /&gt;object network Ali_V1_172.20.10.0&lt;BR /&gt; subnet 172.20.10.0 255.255.255.0&lt;BR /&gt;object network Ali_V1_172.20.14.0&lt;BR /&gt; subnet 172.20.14.0 255.255.255.0&lt;BR /&gt;object network remote_vpn&lt;BR /&gt; subnet 192.168.200.0 255.255.255.0&lt;BR /&gt;object network office&lt;BR /&gt; subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network Develop&lt;BR /&gt; subnet 192.168.9.0 255.255.255.0&lt;BR /&gt;object network develop_gateway&lt;BR /&gt; host 192.168.9.1&lt;BR /&gt;object network Outside_ip&lt;BR /&gt; host 111.x.x.88&lt;BR /&gt;object network target_server&lt;BR /&gt; host 192.168.9.45&lt;BR /&gt;object service target&lt;BR /&gt; service tcp source eq 1235 destination eq 1235 &lt;BR /&gt;object network CallCenter&lt;BR /&gt; subnet 192.168.8.0 255.255.255.0&lt;BR /&gt;object network cesi&lt;BR /&gt; subnet 172.16.7.0 255.255.255.0&lt;BR /&gt;object network HZ&lt;BR /&gt; subnet 172.20.0.0 255.255.252.0&lt;BR /&gt;object network obj_192.168.9.67:8443&lt;BR /&gt; host 192.168.9.67&lt;BR /&gt;object network caiwu-linshi&lt;BR /&gt; subnet 172.32.5.0 255.255.255.0&lt;BR /&gt;object network obj_172.16.7.213:9080&lt;BR /&gt; host 172.16.7.213&lt;BR /&gt;object service P-83&lt;BR /&gt; service tcp source eq 83 destination eq 83 &lt;BR /&gt;object service P-9080&lt;BR /&gt; service tcp source eq 9080 destination eq 9080 &lt;BR /&gt;object network obj_172.16.7.213&lt;BR /&gt;object network obj_192.168.9.45:1235&lt;BR /&gt; host 192.168.9.45&lt;BR /&gt;object network obj_192.168.9.81:80&lt;BR /&gt; host 192.168.9.81&lt;BR /&gt;object network obj_192.168.9.81&lt;BR /&gt;object network obj_172.16.7.212:80&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.233:80&lt;BR /&gt; host 172.16.7.233&lt;BR /&gt;object network obj_172.16.7.210:22&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.211:22&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:22&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.213:22&lt;BR /&gt; host 172.16.7.213&lt;BR /&gt;object network obj_172.16.7.203:22&lt;BR /&gt; host 172.16.7.203&lt;BR /&gt;object network obj_192.168.9.67:443&lt;BR /&gt; host 192.168.9.67&lt;BR /&gt;object network obj_192.168.9.67:22&lt;BR /&gt; host 192.168.9.67&lt;BR /&gt;object network obj_172.16.7.206:3306&lt;BR /&gt; host 172.16.7.206&lt;BR /&gt;object network obj_172.16.7.208:3306&lt;BR /&gt; host 172.16.7.208&lt;BR /&gt;object network obj_172.16.7.211:3306&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:3306&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.233:6203&lt;BR /&gt; host 172.16.7.233&lt;BR /&gt;object network obj_172.16.7.211:443&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.211:6600&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:6600&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.211:6711&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:6711&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.211:6821&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.211:6822&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:6822&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.211:6933&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:6933&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.211:7040&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.211:7155&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.213:8080&lt;BR /&gt; host 172.16.7.213&lt;BR /&gt;object network obj_172.16.7.203:7079&lt;BR /&gt; host 172.16.7.203&lt;BR /&gt;object network obj_192.168.9.77:8080&lt;BR /&gt; host 192.168.9.77&lt;BR /&gt;object network obj_172.16.7.203:9081&lt;BR /&gt; host 172.16.7.203&lt;BR /&gt;object network obj_172.16.7.219:8090&lt;BR /&gt; host 172.16.7.219&lt;BR /&gt;object network obj_172.16.7.219:8080&lt;BR /&gt; host 172.16.7.219&lt;BR /&gt;object network obj_172.16.7.205:8080&lt;BR /&gt; host 172.16.7.205&lt;BR /&gt;object network obj_172.16.7.210:8080&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.211:7979&lt;BR /&gt; host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:8080&lt;BR /&gt; host 172.16.7.212&lt;BR /&gt;object network obj_192.168.9.67:8080&lt;BR /&gt; host 192.168.9.67&lt;BR /&gt;object network obj_172.16.7.203:8799&lt;BR /&gt; host 172.16.7.203&lt;BR /&gt;object network obj_172.16.7.213:8765&lt;BR /&gt; host 172.16.7.213&lt;BR /&gt;object network obj_172.16.7.214:8766&lt;BR /&gt; host 172.16.7.214&lt;BR /&gt;object network obj_172.16.7.217:8799&lt;BR /&gt; host 172.16.7.217&lt;BR /&gt;object network obj_172.16.7.214:8799&lt;BR /&gt; host 172.16.7.214&lt;BR /&gt;object network obj_172.16.7.202:8080&lt;BR /&gt; host 172.16.7.202&lt;BR /&gt;object network obj_172.16.7.204:7979&lt;BR /&gt; host 172.16.7.204&lt;BR /&gt;object network obj_192.168.9.20:9081&lt;BR /&gt; host 192.168.9.20&lt;BR /&gt;object network obj_172.16.7.210:9090&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9092&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9094&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9095&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9096&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9097&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9098&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.210:9099&lt;BR /&gt; host 172.16.7.210&lt;BR /&gt;object network obj_192.168.9.51:27017&lt;BR /&gt; host 192.168.9.51&lt;BR /&gt;object service P-8091&lt;BR /&gt; service tcp source eq 8091 destination eq 8091 &lt;BR /&gt;object service P-9081&lt;BR /&gt; service tcp source eq 9081 destination eq 9081 &lt;BR /&gt;object network obj_192.168.9.67:8400&lt;BR /&gt; host 192.168.9.67&lt;BR /&gt;object service 22&lt;BR /&gt; service tcp source eq ssh destination eq ssh &lt;BR /&gt;object network obj_172.20.3.40:22&lt;BR /&gt; host 172.20.3.40&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object object test192.168.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt; network-object object Ali_V1_172.20.10.0&lt;BR /&gt; network-object object Ali_V1_172.20.14.0&lt;BR /&gt; network-object object Ali_RD_172.22.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt; network-object object Ali_V1_172.20.10.0&lt;BR /&gt; network-object object Ali_V1_172.20.14.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object HZ&lt;BR /&gt; network-object object office&lt;BR /&gt;object-group network DM_INLINE_NETWORK_5&lt;BR /&gt; network-object 172.20.7.0 255.255.255.0&lt;BR /&gt; network-object 172.32.5.0 255.255.255.0&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt; network-object 192.168.9.0 255.255.255.0&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 192.168.255.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_6&lt;BR /&gt; network-object object HZ&lt;BR /&gt; network-object object office&lt;BR /&gt;object-group network DM_INLINE_NETWORK_8&lt;BR /&gt; network-object 192.168.255.0 255.255.255.0&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 172.20.7.0 255.255.255.0&lt;BR /&gt; network-object 192.168.9.0 255.255.255.0&lt;BR /&gt; network-object object HZ&lt;BR /&gt;object-group network DM_INLINE_NETWORK_9&lt;BR /&gt; network-object 192.168.9.0 255.255.255.0&lt;BR /&gt; network-object object office&lt;BR /&gt; network-object 10.1.1.0 255.255.255.0&lt;BR /&gt; network-object 172.20.7.0 255.255.255.0&lt;BR /&gt; network-object 192.168.8.0 255.255.255.0&lt;BR /&gt; network-object object HZ&lt;BR /&gt;object-group network DM_INLINE_NETWORK_10&lt;BR /&gt; network-object 172.20.10.0 255.255.255.0&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;BR /&gt; network-object 192.168.255.0 255.255.255.0&lt;BR /&gt; network-object object Ali_RD_172.22.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_15&lt;BR /&gt; network-object 192.168.9.0 255.255.255.0&lt;BR /&gt; network-object object office&lt;BR /&gt;object-group network DM_INLINE_NETWORK_21&lt;BR /&gt; network-object object Ali_V1_172.20.10.0&lt;BR /&gt; network-object object Ali_V1_172.20.14.0&lt;BR /&gt; network-object object Ali_RD_172.22.0.0&lt;BR /&gt;access-list VPN-TO-ALI extended permit ip 192.168.255.0 255.255.255.0 object-group DM_INLINE_NETWORK_4 &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.255.0 255.255.255.0 any &lt;BR /&gt;access-list remote-vpn_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0 &lt;BR /&gt;access-list remote-vpn_splitTunnelAcl standard permit 172.20.10.0 255.255.255.0 &lt;BR /&gt;access-list remote-vpn_splitTunnelAcl standard permit 172.22.0.0 255.255.0.0 &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object test192.168.255.0 object Ali_V1_172.20.10.0 &lt;BR /&gt;access-list ipsec-for-remote_splitTunnelAcl standard permit any4 &lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 172.20.10.0 255.255.255.0 &lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.255.0 255.255.255.0 object Ali_RD_172.22.0.0 &lt;BR /&gt;access-list inside.9_access_in extended permit ip 192.168.9.0 255.255.255.0 192.168.255.0 255.255.255.0 &lt;BR /&gt;access-list hulian_access_in extended permit tcp any any &lt;BR /&gt;access-list outside_access_in extended permit ip object-group DM_INLINE_NETWORK_5 any &lt;BR /&gt;access-list outside_access_in extended permit ip 192.168.9.0 255.255.255.0 any &lt;BR /&gt;access-list Development_access_in extended permit ip object-group DM_INLINE_NETWORK_15 object-group DM_INLINE_NETWORK_10 &lt;BR /&gt;access-list office_access_in extended permit ip object office any &lt;BR /&gt;access-list global_access extended permit ip object-group DM_INLINE_NETWORK_8 object-group DM_INLINE_NETWORK_9 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging monitor informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu CallCenter 1500&lt;BR /&gt;mtu Development 1500&lt;BR /&gt;mtu Accounting 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu CCC 1500&lt;BR /&gt;mtu office 1500&lt;BR /&gt;mtu hulian 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-713.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static test192.168.255.0 test192.168.255.0 destination static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3 no-proxy-arp description VPN to Aliyun&lt;BR /&gt;nat (inside,inside) source static test192.168.255.0 test192.168.255.0 destination static test192.168.255.0 test192.168.255.0 no-proxy-arp&lt;BR /&gt;nat (inside,office) source static test192.168.255.0 test192.168.255.0 destination static office office no-proxy-arp&lt;BR /&gt;nat (inside,hulian) source static test192.168.255.0 test192.168.255.0 destination static cesi cesi no-proxy-arp&lt;BR /&gt;nat (office,outside) source static office office destination static DM_INLINE_NETWORK_21 DM_INLINE_NETWORK_21 no-proxy-arp&lt;BR /&gt;nat (office,office) source static DM_INLINE_NETWORK_6 DM_INLINE_NETWORK_6 destination static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 no-proxy-arp&lt;BR /&gt;nat (office,Development) source static office office destination static Develop Develop no-proxy-arp&lt;BR /&gt;nat (office,CCC) source static office office destination static HZ HZ no-proxy-arp&lt;BR /&gt;nat (office,hulian) source static office office destination static cesi cesi no-proxy-arp&lt;BR /&gt;nat (Development,hulian) source static Develop Develop destination static cesi cesi no-proxy-arp&lt;BR /&gt;nat (Development,inside) source static Develop Develop destination static test192.168.255.0 test192.168.255.0 no-proxy-arp&lt;BR /&gt;nat (Development,office) source static Develop Develop destination static office office no-proxy-arp&lt;BR /&gt;nat (Development,Development) source static Develop Develop destination static Develop Develop no-proxy-arp&lt;BR /&gt;nat (hulian,Development) source static caiwu-linshi caiwu-linshi destination static Develop Develop no-proxy-arp&lt;BR /&gt;nat (any,outside) source dynamic CallCenter interface inactive description Internet&lt;BR /&gt;nat (any,outside) source dynamic test192.168.255.0 interface inactive description Internet&lt;BR /&gt;nat (any,outside) source dynamic Develop interface inactive description Internet&lt;BR /&gt;nat (any,outside) source dynamic office interface inactive description Internet&lt;BR /&gt;!&lt;BR /&gt;object network test192.168.255.0&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network office&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network Develop&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network CallCenter&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network cesi&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;object network obj_192.168.9.67:8443&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 8443 18443 &lt;BR /&gt;object network obj_172.16.7.213:9080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9080 83 &lt;BR /&gt;object network obj_192.168.9.45:1235&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 1235 1235 &lt;BR /&gt;object network obj_172.16.7.212:80&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp www 7077 &lt;BR /&gt;object network obj_172.16.7.233:80&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp www 180 &lt;BR /&gt;object network obj_172.16.7.210:22&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 245 245 &lt;BR /&gt;object network obj_172.16.7.211:22&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 246 246 &lt;BR /&gt;object network obj_172.16.7.212:22&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 247 247 &lt;BR /&gt;object network obj_172.16.7.213:22&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 248 248 &lt;BR /&gt;object network obj_172.16.7.203:22&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 1222 1222 &lt;BR /&gt;object network obj_192.168.9.67:443&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp https 1443 &lt;BR /&gt;object network obj_192.168.9.67:22&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 2222 2222 &lt;BR /&gt;object network obj_172.16.7.206:3306&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 3306 3336 &lt;BR /&gt;object network obj_172.16.7.208:3306&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 3306 3346 &lt;BR /&gt;object network obj_172.16.7.211:3306&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 3306 3356 &lt;BR /&gt;object network obj_172.16.7.212:3306&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 3306 3366 &lt;BR /&gt;object network obj_172.16.7.233:6203&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6203 6203 &lt;BR /&gt;object network obj_172.16.7.211:443&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp https 6443 &lt;BR /&gt;object network obj_172.16.7.211:6600&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6600 6600 &lt;BR /&gt;object network obj_172.16.7.212:6600&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6600 6610 &lt;BR /&gt;object network obj_172.16.7.211:6711&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6711 6711 &lt;BR /&gt;object network obj_172.16.7.212:6711&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6711 6721 &lt;BR /&gt;object network obj_172.16.7.211:6821&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6821 6821 &lt;BR /&gt;object network obj_172.16.7.211:6822&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6822 6822 &lt;BR /&gt;object network obj_172.16.7.212:6822&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6822 6832 &lt;BR /&gt;object network obj_172.16.7.211:6933&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6933 6933 &lt;BR /&gt;object network obj_172.16.7.212:6933&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 6943 6933 &lt;BR /&gt;object network obj_172.16.7.211:7040&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 7044 7044 &lt;BR /&gt;object network obj_172.16.7.211:7155&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 7155 7155 &lt;BR /&gt;object network obj_172.16.7.213:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 7878 &lt;BR /&gt;object network obj_172.16.7.203:7079&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 7079 7900 &lt;BR /&gt;object network obj_192.168.9.77:8080&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 8080 8088 &lt;BR /&gt;object network obj_172.16.7.203:9081&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9081 8091 &lt;BR /&gt;object network obj_172.16.7.219:8090&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8090 8092 &lt;BR /&gt;object network obj_172.16.7.219:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 8110 &lt;BR /&gt;object network obj_172.16.7.205:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 8180 &lt;BR /&gt;object network obj_172.16.7.210:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 8250 &lt;BR /&gt;object network obj_172.16.7.211:7979&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 7979 8260 &lt;BR /&gt;object network obj_172.16.7.212:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 8270 &lt;BR /&gt;object network obj_192.168.9.67:8080&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 8080 8442 &lt;BR /&gt;object network obj_172.16.7.203:8799&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8799 8699 &lt;BR /&gt;object network obj_172.16.7.213:8765&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8765 8765 &lt;BR /&gt;object network obj_172.16.7.214:8766&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8766 8766 &lt;BR /&gt;object network obj_172.16.7.217:8799&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8799 8780 &lt;BR /&gt;object network obj_172.16.7.214:8799&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8799 8799 &lt;BR /&gt;object network obj_172.16.7.202:8080&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 8080 8888 &lt;BR /&gt;object network obj_172.16.7.204:7979&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 7979 8900 &lt;BR /&gt;object network obj_192.168.9.20:9081&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 9081 9081 &lt;BR /&gt;object network obj_172.16.7.210:9090&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9090 9090 &lt;BR /&gt;object network obj_172.16.7.210:9092&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9092 9092 &lt;BR /&gt;object network obj_172.16.7.210:9094&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9094 9094 &lt;BR /&gt;object network obj_172.16.7.210:9095&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9095 9095 &lt;BR /&gt;object network obj_172.16.7.210:9096&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9096 9096 &lt;BR /&gt;object network obj_172.16.7.210:9097&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9097 9097 &lt;BR /&gt;object network obj_172.16.7.210:9098&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9098 9098 &lt;BR /&gt;object network obj_172.16.7.210:9099&lt;BR /&gt; nat (hulian,outside) static Outside_ip service tcp 9099 9099 &lt;BR /&gt;object network obj_192.168.9.51:27017&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 27017 27018 &lt;BR /&gt;object network obj_192.168.9.67:8400&lt;BR /&gt; nat (Development,outside) static Outside_ip service tcp 8443 8400 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group Development_access_in in interface Development&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group office_access_in in interface office&lt;BR /&gt;access-group hulian_access_in in interface hulian&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 111.204.193.94 1&lt;BR /&gt;route office 172.20.0.0 255.255.248.0 192.168.10.1 1&lt;BR /&gt;route hulian 172.32.5.0 255.255.255.0 192.168.9.253 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt; network-acl outside_cryptomap_1&lt;BR /&gt; network-acl inside_access_in&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;eou allow audit&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set vpn esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set tran01 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3desMD5&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs &lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set nat-t-disable&lt;BR /&gt;crypto map outside-map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside-map 1 set pfs &lt;BR /&gt;crypto map outside-map 1 set peer 120.x.x.x &lt;BR /&gt;crypto map outside-map 1 set ikev1 transform-set tran01&lt;BR /&gt;crypto map outside-map 1 set reverse-route&lt;BR /&gt;crypto map outside-map 10 match address VPN-TO-ALI&lt;BR /&gt;crypto map outside-map 10 set pfs &lt;BR /&gt;crypto map outside-map 10 set peer 121.x.x.x &lt;BR /&gt;crypto map outside-map 10 set ikev1 transform-set vpn&lt;BR /&gt;crypto map outside-map 10 set reverse-route&lt;BR /&gt;crypto map outside-map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside-map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0_anyconnect&lt;BR /&gt; enrollment self&lt;BR /&gt; email &lt;A href="mailto:&amp;quot;guoyuan.wang@sirun.net&amp;quot;"&gt;guoyuan.wang@sirun.net&lt;/A&gt;&lt;BR /&gt; subject-name CN=sirunASA_for_guoyuan&lt;BR /&gt; proxy-ldc-issuer&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn sslvpn.sirun.net&lt;BR /&gt; subject-name CN=sslvpn.sirun.net&lt;BR /&gt; keypair sslvpnkeypair&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt; certificate 9d6da958&lt;BR /&gt;    308201ef 30820158 a0030201 0202049d 6da95830 0d06092a 864886f7 0d010105 &lt;BR /&gt;    0500303c 31193017 06035504 03131073 736c7670 6e2e7369 72756e2e 6e657431 &lt;BR /&gt;    1f301d06 092a8648 86f70d01 09021610 73736c76 706e2e73 6972756e 2e6e6574 &lt;BR /&gt;    301e170d 31373032 32353038 35383131 5a170d32 37303232 33303835 3831315a &lt;BR /&gt;    303c3119 30170603 55040313 1073736c 76706e2e 73697275 6e2e6e65 74311f30 &lt;BR /&gt;    1d06092a 864886f7 0d010902 16107373 6c76706e 2e736972 756e2e6e 65743081 &lt;BR /&gt;    9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100d9 498f96c8 &lt;BR /&gt;    ba8e3e90 dd135747 65996664 a4e0ca2d 7a03bb8f a7a1630c d470bb7a 804749c2 &lt;BR /&gt;    cd06285a e1fb26a2 2e55c25e 9b3d27fc 3d169cd1 642c4e6a 9b425b4d 6b00d151 &lt;BR /&gt;    a044e3f3 8724a01b 362d7bba 1930c448 7c449df5 3f2a8d0e a4c18c23 78fc9660 &lt;BR /&gt;    a285b99d a5eb7324 3d74c0ca 511d033f 85e989b6 8ea7ce4e 02097302 03010001 &lt;BR /&gt;    300d0609 2a864886 f70d0101 05050003 81810073 0395301f a979e840 6cfcb4ce &lt;BR /&gt;    46465792 28feee0e ea799257 6be94d62 ed99823b 0fcb7883 18f1ace3 70f40e1a &lt;BR /&gt;    654e3536 6b398229 7d66e8bb 19a35c8f d80d6875 4d3b35a7 68d01e35 e366c731 &lt;BR /&gt;    b713f599 0584ccd3 a11edb73 68bceb24 64dcba2a ff35c5ff bbad15ef bab457de &lt;BR /&gt;    26bc3dbf 4030f725 96046473 c590a03e aa493e&lt;BR /&gt;  quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0_anyconnect&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash md5&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 192.168.9.0 255.255.255.0 Development&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 Development&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 CCC&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 office&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 hulian&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;BR /&gt;vpn-sessiondb max-other-vpn-limit 5000&lt;BR /&gt;vpn-sessiondb max-anyconnect-premium-or-essentials-limit 2&lt;BR /&gt;dhcpd update dns &lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.8.2-192.168.8.239 CallCenter&lt;BR /&gt;dhcpd dns 114.114.114.114 interface CallCenter&lt;BR /&gt;dhcpd enable CallCenter&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.9.2-192.168.9.239 Development&lt;BR /&gt;dhcpd dns 114.114.114.114 interface Development&lt;BR /&gt;dhcpd enable Development&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.255.2-192.168.255.252 inside&lt;BR /&gt;dhcpd dns 114.114.114.114 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.50-192.168.10.239 office&lt;BR /&gt;dhcpd dns 114.114.114.114 interface office&lt;BR /&gt;dhcpd enable office&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;tls-proxy maximum-session 3000&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption aes128-sha1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0_anyconnect inside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 2&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; keepout "Service out temporarily."&lt;BR /&gt;group-policy SSL-vpn_policy_remote internal&lt;BR /&gt;group-policy SSL-vpn_policy_remote attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 114.114.114.114&lt;BR /&gt; vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list value remote-vpn_splitTunnelAcl&lt;BR /&gt; default-domain value sirun.net&lt;BR /&gt; split-dns value 114.114.114&lt;BR /&gt; address-pools value vpn-pool&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy GroupPolicy_120.27.234.197 internal&lt;BR /&gt;group-policy GroupPolicy_120.27.234.197 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt;username test02 password /cXt2mD.GZuIfGDN encrypted&lt;BR /&gt;username test01 password 274Y4GRAbNElaCoV encrypted privilege 15&lt;BR /&gt;username test01 attributes&lt;BR /&gt; vpn-group-policy SSL-vpn_policy_remote&lt;BR /&gt;username caokai password vZOq68hnoLuvTlsi2pHOpw== nt-encrypted privilege 15&lt;BR /&gt;username caokai attributes&lt;BR /&gt; vpn-group-policy DefaultRAGroup&lt;BR /&gt;username admin password w4b7RpK6u3LUsuXd encrypted privilege 15&lt;BR /&gt;username admin attributes&lt;BR /&gt; service-type admin&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool vpn-pool&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication ms-chap-v1&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group 121.196.200.96 type ipsec-l2l&lt;BR /&gt;tunnel-group 121.196.200.96 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy1&lt;BR /&gt;tunnel-group 121.196.200.96 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 120.27.234.197 type ipsec-l2l&lt;BR /&gt;tunnel-group 120.27.234.197 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_120.27.234.197&lt;BR /&gt;tunnel-group 120.27.234.197 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group sslvpn-remote_anyconnect type remote-access&lt;BR /&gt;tunnel-group sslvpn-remote_anyconnect general-attributes&lt;BR /&gt; address-pool vpn-pool&lt;BR /&gt; default-group-policy SSL-vpn_policy_remote&lt;BR /&gt;tunnel-group sslvpn-remote_anyconnect webvpn-attributes&lt;BR /&gt; group-alias SSLVPNClient enable&lt;BR /&gt;tunnel-group-map enable rules&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;  no active&lt;BR /&gt;  destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="test_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;  destination address email &lt;A href="mailto:&amp;quot;callhome@cisco.com&amp;quot;"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;  destination transport-method http&lt;BR /&gt;  subscribe-to-alert-group diagnostic&lt;BR /&gt;  subscribe-to-alert-group environment&lt;BR /&gt;  subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;  subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;  subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:00055f0b97a5bc792db25f24a62ea3ed&lt;BR /&gt;: end&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Mar 2017 06:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341567#M5132</guid>
      <dc:creator>w67531549</dc:creator>
      <dc:date>2017-03-03T06:56:10Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341568#M5133</link>
      <description>感谢您的提问！稍后会有小伙伴为您解答的！</description>
      <pubDate>Fri, 03 Mar 2017 10:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341568#M5133</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2017-03-03T10:26:02Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341569#M5134</link>
      <description>是否ASA 到内部服务器还有三层交换机或者路由器，他们之间的路由没有做？  感兴趣流是否有放通内网服务器与VPN 网段！</description>
      <pubDate>Mon, 06 Mar 2017 06:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341569#M5134</guid>
      <dc:creator>fortune</dc:creator>
      <dc:date>2017-03-06T06:09:39Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341570#M5135</link>
      <description>上个拓扑吧！</description>
      <pubDate>Tue, 07 Mar 2017 03:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341570#M5135</guid>
      <dc:creator>xuxianda7</dc:creator>
      <dc:date>2017-03-07T03:41:23Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341571#M5136</link>
      <description>&lt;I&gt; 本帖最后由 arvinjing 于 2017-3-10 12:04 编辑 &lt;/I&gt;&lt;BR /&gt;先说anyconnect , 不能访问内部网络有2方面的原因，1.没有路由，需要检查分割列表。2.NAT问题，需要检查VPN的NONAT配置, 从内部网络去往vpn pool地址的流量不能NAT&lt;BR /&gt;第一、隧道分割列表建议更改为扩展列表，当然使用标准列表也没有问题access-list remote-vpn_splitTunnelAcl standard permit 192.168.255.0 255.255.255.0&lt;BR /&gt;建议更改为：access-list remote-vpn_splitTunnelAcl extend permit ip object test192.168.255.0 any&lt;BR /&gt;第二、你的VPN pool地址和内网地址在同一个地址段内，我设计VPN的时候是分开的，建议分开，可能会影响其他NAT和ACL的配置，造成思路不清晰，   假如同一网段的话，那么你的NAT 写的也是错误的，原地址是需要访问的目标网段，destination 是vpn pool 地址，应该是这样的语句nat (inside,outside) source static test192.168.255.0 test192.168.255.0 destination static test192.168.255.0 test192.168.255.0&lt;BR /&gt;NAT 做对了，anyconnect VPN应该就正常了&lt;BR /&gt;</description>
      <pubDate>Fri, 10 Mar 2017 01:25:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341571#M5136</guid>
      <dc:creator>jingjian</dc:creator>
      <dc:date>2017-03-10T01:25:45Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341572#M5137</link>
      <description>你的第二个问题关于端口映射分三个步骤检查&lt;BR /&gt;1.object 定义的host是否正确，先检查端口22的object, 可以在定义一个object-group，包含这些object，方便写列表&lt;BR /&gt;object network obj_172.16.7.210:22&lt;BR /&gt;host 172.16.7.210&lt;BR /&gt;object network obj_172.16.7.211:22&lt;BR /&gt;host 172.16.7.211&lt;BR /&gt;object network obj_172.16.7.212:22&lt;BR /&gt;host 172.16.7.212&lt;BR /&gt;object network obj_172.16.7.213:22&lt;BR /&gt;host 172.16.7.213&lt;BR /&gt;object network obj_172.16.7.203:22&lt;BR /&gt;host 172.16.7.203&lt;BR /&gt;object network obj_192.168.9.67:22&lt;BR /&gt;host 192.168.9.67&lt;BR /&gt;2. 检查nat 端口映射的配置，端口映射的原则：1一个public IP地址，可以对应不同的服务，&lt;A href="https://community.cisco.com/www.ftp.ssh"&gt;www.ftp.ssh&lt;/A&gt;等，这么多主机要开放22端口，1个地址肯定是做不到的。我检查你的配置没有发现关于端口22的映射，因为没有拓扑，看不到172.16.7.0/24的流量从哪个接口进入，假设从inside进入，我定义一个nat&lt;BR /&gt;object network obj_172.16.7.210:22&lt;BR /&gt; nat (inside,outside) static A.B.C.D service tcp 22 22&lt;BR /&gt;3.检查从外部访问的ACL的放行流量&lt;BR /&gt;检测了你的配置，没有发现关于端口22放行的ACL&lt;BR /&gt;access-list outside_access_in extended permit tcp any  object obj_172.16.7.210:22 eq 22&lt;BR /&gt;希望给你一个思路，整理一下的你的object、NAT和ACL的配置，条目虽然很多，但是思路一定要清晰。&lt;BR /&gt;</description>
      <pubDate>Fri, 03 Mar 2017 06:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341572#M5137</guid>
      <dc:creator>jingjian</dc:creator>
      <dc:date>2017-03-03T06:56:11Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341573#M5138</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=990214&amp;amp;ptid=969201" target="_blank"&gt;&lt;FONT color="#999999"&gt;vsop5207 发表于 2017-3-6 14:09&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;是否ASA 到内部服务器还有三层交换机或者路由器，他们之间的路由没有做？  感兴趣流是否有放通内网服务器与 ...&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;感谢您的回复！20金钱已发放给您啦~</description>
      <pubDate>Mon, 13 Mar 2017 01:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341573#M5138</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2017-03-13T01:58:16Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341574#M5139</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=990345&amp;amp;ptid=969201" target="_blank"&gt;&lt;FONT color="#999999"&gt;arvinjing 发表于 2017-3-10 09:58&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;你的第二个问题关于端口映射分三个步骤检查&lt;BR /&gt;1.object 定义的host是否正确，先检查端口22的object, 可以在 ...&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;感谢您的回复！20金钱已发放给您啦~</description>
      <pubDate>Mon, 13 Mar 2017 01:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341574#M5139</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2017-03-13T01:58:34Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341575#M5140</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;FONT size="2"&gt;&lt;A href="https://community.cisco.com/forum.php?mod=redirect&amp;amp;goto=findpost&amp;amp;pid=990271&amp;amp;ptid=969201" target="_blank"&gt;&lt;FONT color="#999999"&gt;xuxianda7 发表于 2017-3-7 11:41&lt;/FONT&gt;&lt;/A&gt;&lt;/FONT&gt;&lt;BR /&gt;上个拓扑吧！&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;感谢您的回复！20金钱已发放给您啦~</description>
      <pubDate>Mon, 13 Mar 2017 01:59:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341575#M5140</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2017-03-13T01:59:00Z</dc:date>
    </item>
    <item>
      <title>ASA5550NAT故障和 anyconnect VPN 配置完毕后远程能连接上但无法访问到内部的机器</title>
      <link>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341576#M5141</link>
      <description>若您的问题已解决，请不要忘了标记最佳答案！</description>
      <pubDate>Mon, 13 Mar 2017 02:07:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/%E5%AE%89%E5%85%A8%E8%AE%A8%E8%AE%BA%E5%8C%BA/asa5550nat%E6%95%85%E9%9A%9C%E5%92%8C-anyconnect-vpn-%E9%85%8D%E7%BD%AE%E5%AE%8C%E6%AF%95%E5%90%8E%E8%BF%9C%E7%A8%8B%E8%83%BD%E8%BF%9E%E6%8E%A5%E4%B8%8A%E4%BD%86%E6%97%A0%E6%B3%95%E8%AE%BF%E9%97%AE%E5%88%B0%E5%86%85%E9%83%A8%E7%9A%84%E6%9C%BA%E5%99%A8/m-p/4341576#M5141</guid>
      <dc:creator>one-time</dc:creator>
      <dc:date>2017-03-13T02:07:45Z</dc:date>
    </item>
  </channel>
</rss>

