<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807823#M1022113</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without even looking at your config, my guess is that you need a route on the remote network which points to the vpn client pool subnet. Probably...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.20.0 255.255.255.0 192.168.8.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jun 2007 17:34:56 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-06-13T17:34:56Z</dc:date>
    <item>
      <title>Remote Access VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807822#M1022112</link>
      <description>&lt;P&gt;Hi friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a ASA 7.2 acting as a VPN gateway for a Remote Access VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are primarily three networks behind the ASA inside network that are accessed by Remote VPN clients. They are:&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;192.168.7.0&lt;/P&gt;&lt;P&gt;192.168.8.0&lt;/P&gt;&lt;P&gt;10.10.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an access-list on which the ASA is doing No natting and Split tunneling for these three networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the above three networks, 192.168.7.0 and 192.168.8.0 are local network resources. The other network viz. 10.10.0.0 is a remote network to the ASA and is accessible via a MPLS link to the remote network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the three networks are reachable from the ASA but for the remote clients, only the local networks behind the ASA are reachable viz. 192.168.7.0 and 192.168.8.0. The remote network on other end of MPLS 10.10.0.0 is not reachable for the remote VPN clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible for these remote VPN users to access 10.10.0.0 network (remote network to ASA)? Just wanted to know if it is technically possible and any directions/ pointers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am also enclosing a copy of the config for your kind reference.&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Gautam&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:30:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807822#M1022112</guid>
      <dc:creator>gautamzone</dc:creator>
      <dc:date>2019-03-11T10:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807823#M1022113</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without even looking at your config, my guess is that you need a route on the remote network which points to the vpn client pool subnet. Probably...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.20.0 255.255.255.0 192.168.8.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jun 2007 17:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807823#M1022113</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-13T17:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807824#M1022114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ever figure it out?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2007 13:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807824#M1022114</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-06-14T13:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807825#M1022115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think I have a solution to your problem, but your inside acl is poorly configured..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip host 192.168.8.51 any log critical&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp any any eq ftp&lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp any any eq ftp-data&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your permit ip any any statement negates anything after it (and really everything before it).  You dont even need that ACL on the inside interface, unless you want to specifically deny any traffic, or specifically permit any traffic while denying others.  your permit ip any any causes EVERYthing to be allowed through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Jun 2007 13:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/807825#M1022115</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-06-14T13:56:51Z</dc:date>
    </item>
  </channel>
</rss>

