<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cannot ping Cisco ASA Inside interface using anyconnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3183565#M1066154</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am configuring Cisco ASA 5505 for Anyconnect VPN, the VPN is working fine and I can access the local network 192.168.222.0 through the VPN but for some reason I cannot ping the inside interface of the firewall or open ASDM through the VPN, I can ping and access other hosts on the same subnet. The VPN subnet is 10.100.1.0/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.2(4)13&lt;BR /&gt;!&lt;BR /&gt;terminal width 511&lt;BR /&gt;hostname xxxxx&lt;BR /&gt;domain-name uk.mazars.com&lt;BR /&gt;enable password xxxxx&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool SSL_VPN_POOL 10.100.1.100-10.100.1.150 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 81.138.182.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan717&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.222.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;banner login Access permited Only to Authorised Users!! If you are not an authorised user disconnect now!&lt;BR /&gt;banner motd Authorised Access Only!!!&lt;BR /&gt;boot system disk0:/asa924-13-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;domain-name uk.mazars.com&lt;BR /&gt;object network PTSRV00&lt;BR /&gt;host 192.168.222.1xx&lt;BR /&gt;object network RDPtoPTSRV00&lt;BR /&gt;host 192.168.222.1xxx&lt;BR /&gt;object network RDPtoPTSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network SSHtoPTSRV02&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network PTSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network PTSRV02&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network SSHtoINSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network INSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network Router-INTERNAL&lt;BR /&gt;host 192.168.222.1&lt;BR /&gt;object network tmp_xxxxSRV01&lt;BR /&gt;host 192.168.222.20&lt;BR /&gt;object network NETWORK_OBJ_10.100.1.0_24&lt;BR /&gt;subnet 10.100.1.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object host 8.8.4.4&lt;BR /&gt;network-object host 8.8.8.8&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV00 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV02 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object INSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB remark VPN Allow ALL&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit ip object NETWORK_OBJ_10.100.1.0_24 any&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit ip object-group DM_INLINE_NETWORK_1 192.168.222.0 255.255.255.0&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended deny ip any any&lt;BR /&gt;access-list ALLOW_LAB extended permit ip any any&lt;BR /&gt;access-list SecurityLabLAN standard permit 192.168.222.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list SPLIT_TUNNEL extended permit ip 10.100.1.0 255.255.255.0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging device-id string CYBER-SEC-FW&lt;BR /&gt;logging host inside xxxxx&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.100.1.0_24 NETWORK_OBJ_10.100.1.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network RDPtoPTSRV00&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 50010&lt;BR /&gt;object network RDPtoPTSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 50020&lt;BR /&gt;object network SSHtoPTSRV02&lt;BR /&gt;nat (inside,outside) static interface service tcp ssh 50021&lt;BR /&gt;object network SSHtoINSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp ssh 50030&lt;BR /&gt;object network tmp_50044toPTSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp 4444 50044&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group ALLOW_EXTERNAL_ACCESS_TO_LAB in interface outside&lt;BR /&gt;access-group ALLOW_LAB in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 81.138.182.6 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 5&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.222.0 255.255.255.0 inside&lt;BR /&gt;http 10.100.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;auth-prompt prompt Authorised User Access Only!! If you are not an Authorised user disconnect now&lt;BR /&gt;auth-prompt accept Logged on Successfully&lt;BR /&gt;auth-prompt reject Logon Unsuccessful&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=CYBER-SEC-FW&lt;BR /&gt;keypair ASDM_LAUNCHER&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint3&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=CYBER-SEC-FW&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2&lt;BR /&gt;certificate 85f58557&lt;BR /&gt;30820260 308201c9 a0030201 02020485 f5855730 0d06092a 864886f7 0d010105&lt;BR /&gt;05003042 31153013 06035504 03130c43 59424552 2d534543 2d465731 29302706&lt;BR /&gt;092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e 6d617a61&lt;BR /&gt;72732e63 6f6d301e 170d3136 30383135 31333239 32365a17 0d323630 38313331&lt;BR /&gt;33323932 365a3042 31153013 06035504 03130c43 59424552 2d534543 2d465731&lt;BR /&gt;29302706 092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e&lt;BR /&gt;6d617a61 72732e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00&lt;BR /&gt;30818902 818100d3 b559592f 505ed21f 37da941d 4105261f c5a40e20 c323a5e2&lt;BR /&gt;7891e848 1ae722ae 3b1d5e5a 6ddc00e1 915c63d9 105f9fbe 4bae8d93 bca26a26&lt;BR /&gt;5246c7aa 9b47c3e5 2e7026cf 9fe5a646 88d7092e 947c3b8e 558ad81b 82bba1bd&lt;BR /&gt;edd85a93 ec2a7d10 7e69ceb7 711dae99 80138ad9 5b35dae0 5ba1e97b 7ac664fa&lt;BR /&gt;81d51448 ffebf502 03010001 a3633061 300f0603 551d1301 01ff0405 30030101&lt;BR /&gt;ff300e06 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 8014d795&lt;BR /&gt;7b49548c e9fca72e 43f077d1 cb11a58f 16e6301d 0603551d 0e041604 14d7957b&lt;BR /&gt;49548ce9 fca72e43 f077d1cb 11a58f16 e6300d06 092a8648 86f70d01 01050500&lt;BR /&gt;03818100 722f4bc9 5aebe3f7 30e50ea2 43b86ca0 cbd5d8ca 0ebb09f0 ebf709d5&lt;BR /&gt;3f7c8c7c 80d960d9 37405ef3 296f2fc2 df60a131 e38d07e3 6a75c9d6 569d9625&lt;BR /&gt;4a19d703 19e9dbb9 283dc296 1c116f09 0ccf0f7a c1482fd9 55e9a16f cc5f2a80&lt;BR /&gt;a2467d73 9ee9cec6 2715e26f dea46a46 a33df861 e846167f 83ac34a1 f5a4e28e&lt;BR /&gt;ed6a5785&lt;BR /&gt;quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint3&lt;BR /&gt;certificate 1b70b659&lt;BR /&gt;30820300 308201e8 a0030201 0202041b 70b65930 0d06092a 864886f7 0d010105&lt;BR /&gt;05003042 31153013 06035504 03130c43 59424552 2d534543 2d465731 29302706&lt;BR /&gt;092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e 6d617a61&lt;BR /&gt;72732e63 6f6d301e 170d3137 30393133 31303131 30305a17 0d323730 39313131&lt;BR /&gt;30313130 305a3042 31153013 06035504 03130c43 59424552 2d534543 2d465731&lt;BR /&gt;29302706 092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e&lt;BR /&gt;6d617a61 72732e63 6f6d3082 0122300d 06092a86 4886f70d 01010105 00038201&lt;BR /&gt;0f003082 010a0282 01010099 ffc593b2 ba1cd45f 8f64a511 a7928927 f6b0d085&lt;BR /&gt;390b5139 0369be84 b81ede93 bbc71c34 cbb260a1 5080fdc3 2148f7b8 eb12cbc3&lt;BR /&gt;1eb38a7d 65b8654a 11ada1cb 73cfc4b7 2a566190 fcbc362a 44f893ea b3a09ee0&lt;BR /&gt;020d04b5 3546aef8 d6fc0923 17f00be7 8a21a93d 3e3edef4 14e7e1e1 c6d7f420&lt;BR /&gt;7165293b 552defe3 827a2e4b 92680a22 4867615c da9ad85c 8a4a5f59 42456ffd&lt;BR /&gt;83e8398b 9c2c001b bb67e6af b41c23fa 7b475323 76bc4f75 4ad264e3 65da36ce&lt;BR /&gt;8c3cde62 89107093 00222419 05783b49 d8db4d24 9d02c699 dba0bd9c c123d416&lt;BR /&gt;13e1ff48 211c6f3e 67aae8c4 8f406911 6a83fa22 42b1ffb4 80978755 8d8b5595&lt;BR /&gt;18a1d8ce 420118ff dd0ffd02 03010001 300d0609 2a864886 f70d0101 05050003&lt;BR /&gt;82010100 7f9f3ebb e212578d 22b78101 8cba6159 d734620c 7d6b40b5 44ec3879&lt;BR /&gt;45cb6ed3 d2fb03ef ad4d10f5 c9719d5a 3feddbf8 b4d4546b 9faffb43 10b511ec&lt;BR /&gt;1263b527 5367a53c baa6a8a8 c352b365 49bccd36 6272d502 528ac1dd 562ccce5&lt;BR /&gt;53b73311 74df1d2a 5598d919 a424fe5a 30b5a2fb 12698486 65975442 8c4923d9&lt;BR /&gt;caf08cdb 8f27eb37 1021abd8 b74ec2ed 02ad9b96 55ed1c5b 223b6953 02d476fb&lt;BR /&gt;20c39de9 e1eebf2c 3a45033c 3178c086 3d5f0393 5a16411a 97533d4d 2e0d34b2&lt;BR /&gt;803acad7 4db79a12 b8fa7364 b92d932e 6bcf06ec 4077b7de 38f3e683 fd64b0ae&lt;BR /&gt;fb10bfc6 ab26159b 7a5fdf40 eb1a35a2 4f239e59 5ffb42d0 1336589b 041d7856&lt;BR /&gt;5fec32e1&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint2&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.222.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpn-addr-assign local reuse-delay 1&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.222.150-192.168.222.250 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;no threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 143.210.16.201 source outside prefer&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux-2.4.1012-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy GroupPolicy_ANYCONNECT_VPN internal&lt;BR /&gt;group-policy GroupPolicy_ANYCONNECT_VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value uk.mazars.com&lt;BR /&gt;xxxxxxxxx&lt;/P&gt;&lt;P&gt;xxxxxxxx&lt;BR /&gt;tunnel-group ANYCONNECT_VPN type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT_VPN general-attributes&lt;BR /&gt;address-pool SSL_VPN_POOL&lt;BR /&gt;default-group-policy GroupPolicy_ANYCONNECT_VPN&lt;BR /&gt;tunnel-group ANYCONNECT_VPN webvpn-attributes&lt;BR /&gt;group-alias ANYCONNECT_VPN enable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;user-statistics accounting&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 14:18:03 GMT</pubDate>
    <dc:creator>ahmed-ejaz</dc:creator>
    <dc:date>2020-02-21T14:18:03Z</dc:date>
    <item>
      <title>Cannot ping Cisco ASA Inside interface using anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3183565#M1066154</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am configuring Cisco ASA 5505 for Anyconnect VPN, the VPN is working fine and I can access the local network 192.168.222.0 through the VPN but for some reason I cannot ping the inside interface of the firewall or open ASDM through the VPN, I can ping and access other hosts on the same subnet. The VPN subnet is 10.100.1.0/24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.2(4)13&lt;BR /&gt;!&lt;BR /&gt;terminal width 511&lt;BR /&gt;hostname xxxxx&lt;BR /&gt;domain-name uk.mazars.com&lt;BR /&gt;enable password xxxxx&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool SSL_VPN_POOL 10.100.1.100-10.100.1.150 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 717&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 81.138.182.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan717&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.222.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;banner login Access permited Only to Authorised Users!! If you are not an authorised user disconnect now!&lt;BR /&gt;banner motd Authorised Access Only!!!&lt;BR /&gt;boot system disk0:/asa924-13-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT/BST 0&lt;BR /&gt;clock summer-time GMT/BDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;name-server 8.8.4.4&lt;BR /&gt;domain-name uk.mazars.com&lt;BR /&gt;object network PTSRV00&lt;BR /&gt;host 192.168.222.1xx&lt;BR /&gt;object network RDPtoPTSRV00&lt;BR /&gt;host 192.168.222.1xxx&lt;BR /&gt;object network RDPtoPTSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network SSHtoPTSRV02&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network PTSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network PTSRV02&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network SSHtoINSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network INSRV01&lt;BR /&gt;host 192.168.222.xxx&lt;BR /&gt;object network Router-INTERNAL&lt;BR /&gt;host 192.168.222.1&lt;BR /&gt;object network tmp_xxxxSRV01&lt;BR /&gt;host 192.168.222.20&lt;BR /&gt;object network NETWORK_OBJ_10.100.1.0_24&lt;BR /&gt;subnet 10.100.1.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object host 8.8.4.4&lt;BR /&gt;network-object host 8.8.8.8&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV00 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV02 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object INSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit tcp any object PTSRV01 eq xxx&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB remark VPN Allow ALL&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit ip object NETWORK_OBJ_10.100.1.0_24 any&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended permit ip object-group DM_INLINE_NETWORK_1 192.168.222.0 255.255.255.0&lt;BR /&gt;access-list ALLOW_EXTERNAL_ACCESS_TO_LAB extended deny ip any any&lt;BR /&gt;access-list ALLOW_LAB extended permit ip any any&lt;BR /&gt;access-list SecurityLabLAN standard permit 192.168.222.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list SPLIT_TUNNEL extended permit ip 10.100.1.0 255.255.255.0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap errors&lt;BR /&gt;logging asdm warnings&lt;BR /&gt;logging device-id string CYBER-SEC-FW&lt;BR /&gt;logging host inside xxxxx&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-743.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.100.1.0_24 NETWORK_OBJ_10.100.1.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network RDPtoPTSRV00&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 50010&lt;BR /&gt;object network RDPtoPTSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp 3389 50020&lt;BR /&gt;object network SSHtoPTSRV02&lt;BR /&gt;nat (inside,outside) static interface service tcp ssh 50021&lt;BR /&gt;object network SSHtoINSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp ssh 50030&lt;BR /&gt;object network tmp_50044toPTSRV01&lt;BR /&gt;nat (inside,outside) static interface service tcp 4444 50044&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group ALLOW_EXTERNAL_ACCESS_TO_LAB in interface outside&lt;BR /&gt;access-group ALLOW_LAB in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 81.138.182.6 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 5&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.222.0 255.255.255.0 inside&lt;BR /&gt;http 10.100.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;auth-prompt prompt Authorised User Access Only!! If you are not an Authorised user disconnect now&lt;BR /&gt;auth-prompt accept Logged on Successfully&lt;BR /&gt;auth-prompt reject Logon Unsuccessful&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=CYBER-SEC-FW&lt;BR /&gt;keypair ASDM_LAUNCHER&lt;BR /&gt;proxy-ldc-issuer&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint3&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=CYBER-SEC-FW&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2&lt;BR /&gt;certificate 85f58557&lt;BR /&gt;30820260 308201c9 a0030201 02020485 f5855730 0d06092a 864886f7 0d010105&lt;BR /&gt;05003042 31153013 06035504 03130c43 59424552 2d534543 2d465731 29302706&lt;BR /&gt;092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e 6d617a61&lt;BR /&gt;72732e63 6f6d301e 170d3136 30383135 31333239 32365a17 0d323630 38313331&lt;BR /&gt;33323932 365a3042 31153013 06035504 03130c43 59424552 2d534543 2d465731&lt;BR /&gt;29302706 092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e&lt;BR /&gt;6d617a61 72732e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00&lt;BR /&gt;30818902 818100d3 b559592f 505ed21f 37da941d 4105261f c5a40e20 c323a5e2&lt;BR /&gt;7891e848 1ae722ae 3b1d5e5a 6ddc00e1 915c63d9 105f9fbe 4bae8d93 bca26a26&lt;BR /&gt;5246c7aa 9b47c3e5 2e7026cf 9fe5a646 88d7092e 947c3b8e 558ad81b 82bba1bd&lt;BR /&gt;edd85a93 ec2a7d10 7e69ceb7 711dae99 80138ad9 5b35dae0 5ba1e97b 7ac664fa&lt;BR /&gt;81d51448 ffebf502 03010001 a3633061 300f0603 551d1301 01ff0405 30030101&lt;BR /&gt;ff300e06 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 8014d795&lt;BR /&gt;7b49548c e9fca72e 43f077d1 cb11a58f 16e6301d 0603551d 0e041604 14d7957b&lt;BR /&gt;49548ce9 fca72e43 f077d1cb 11a58f16 e6300d06 092a8648 86f70d01 01050500&lt;BR /&gt;03818100 722f4bc9 5aebe3f7 30e50ea2 43b86ca0 cbd5d8ca 0ebb09f0 ebf709d5&lt;BR /&gt;3f7c8c7c 80d960d9 37405ef3 296f2fc2 df60a131 e38d07e3 6a75c9d6 569d9625&lt;BR /&gt;4a19d703 19e9dbb9 283dc296 1c116f09 0ccf0f7a c1482fd9 55e9a16f cc5f2a80&lt;BR /&gt;a2467d73 9ee9cec6 2715e26f dea46a46 a33df861 e846167f 83ac34a1 f5a4e28e&lt;BR /&gt;ed6a5785&lt;BR /&gt;quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint3&lt;BR /&gt;certificate 1b70b659&lt;BR /&gt;30820300 308201e8 a0030201 0202041b 70b65930 0d06092a 864886f7 0d010105&lt;BR /&gt;05003042 31153013 06035504 03130c43 59424552 2d534543 2d465731 29302706&lt;BR /&gt;092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e 6d617a61&lt;BR /&gt;72732e63 6f6d301e 170d3137 30393133 31303131 30305a17 0d323730 39313131&lt;BR /&gt;30313130 305a3042 31153013 06035504 03130c43 59424552 2d534543 2d465731&lt;BR /&gt;29302706 092a8648 86f70d01 0902161a 43594245 522d5345 432d4657 2e756b2e&lt;BR /&gt;6d617a61 72732e63 6f6d3082 0122300d 06092a86 4886f70d 01010105 00038201&lt;BR /&gt;0f003082 010a0282 01010099 ffc593b2 ba1cd45f 8f64a511 a7928927 f6b0d085&lt;BR /&gt;390b5139 0369be84 b81ede93 bbc71c34 cbb260a1 5080fdc3 2148f7b8 eb12cbc3&lt;BR /&gt;1eb38a7d 65b8654a 11ada1cb 73cfc4b7 2a566190 fcbc362a 44f893ea b3a09ee0&lt;BR /&gt;020d04b5 3546aef8 d6fc0923 17f00be7 8a21a93d 3e3edef4 14e7e1e1 c6d7f420&lt;BR /&gt;7165293b 552defe3 827a2e4b 92680a22 4867615c da9ad85c 8a4a5f59 42456ffd&lt;BR /&gt;83e8398b 9c2c001b bb67e6af b41c23fa 7b475323 76bc4f75 4ad264e3 65da36ce&lt;BR /&gt;8c3cde62 89107093 00222419 05783b49 d8db4d24 9d02c699 dba0bd9c c123d416&lt;BR /&gt;13e1ff48 211c6f3e 67aae8c4 8f406911 6a83fa22 42b1ffb4 80978755 8d8b5595&lt;BR /&gt;18a1d8ce 420118ff dd0ffd02 03010001 300d0609 2a864886 f70d0101 05050003&lt;BR /&gt;82010100 7f9f3ebb e212578d 22b78101 8cba6159 d734620c 7d6b40b5 44ec3879&lt;BR /&gt;45cb6ed3 d2fb03ef ad4d10f5 c9719d5a 3feddbf8 b4d4546b 9faffb43 10b511ec&lt;BR /&gt;1263b527 5367a53c baa6a8a8 c352b365 49bccd36 6272d502 528ac1dd 562ccce5&lt;BR /&gt;53b73311 74df1d2a 5598d919 a424fe5a 30b5a2fb 12698486 65975442 8c4923d9&lt;BR /&gt;caf08cdb 8f27eb37 1021abd8 b74ec2ed 02ad9b96 55ed1c5b 223b6953 02d476fb&lt;BR /&gt;20c39de9 e1eebf2c 3a45033c 3178c086 3d5f0393 5a16411a 97533d4d 2e0d34b2&lt;BR /&gt;803acad7 4db79a12 b8fa7364 b92d932e 6bcf06ec 4077b7de 38f3e683 fd64b0ae&lt;BR /&gt;fb10bfc6 ab26159b 7a5fdf40 eb1a35a2 4f239e59 5ffb42d0 1336589b 041d7856&lt;BR /&gt;5fec32e1&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint2&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.222.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpn-addr-assign local reuse-delay 1&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.222.150-192.168.222.250 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;no threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 143.210.16.201 source outside prefer&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux-2.4.1012-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy GroupPolicy_ANYCONNECT_VPN internal&lt;BR /&gt;group-policy GroupPolicy_ANYCONNECT_VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 8.8.8.8 8.8.4.4&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value uk.mazars.com&lt;BR /&gt;xxxxxxxxx&lt;/P&gt;&lt;P&gt;xxxxxxxx&lt;BR /&gt;tunnel-group ANYCONNECT_VPN type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT_VPN general-attributes&lt;BR /&gt;address-pool SSL_VPN_POOL&lt;BR /&gt;default-group-policy GroupPolicy_ANYCONNECT_VPN&lt;BR /&gt;tunnel-group ANYCONNECT_VPN webvpn-attributes&lt;BR /&gt;group-alias ANYCONNECT_VPN enable&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;user-statistics accounting&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:18:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3183565#M1066154</guid>
      <dc:creator>ahmed-ejaz</dc:creator>
      <dc:date>2020-02-21T14:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping Cisco ASA Inside interface using anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3183651#M1066155</link>
      <description>&lt;P&gt;Hi Ahmed,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add the following commands&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;http 10.100.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ssh&amp;nbsp;10.100.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Sep 2017 17:01:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3183651#M1066155</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-09-13T17:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot ping Cisco ASA Inside interface using anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3184568#M1066156</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I got it working in the end applying the same command which was indeed missing. Thank you so much, spot on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ahmed&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 09:08:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-ping-cisco-asa-inside-interface-using-anyconnect/m-p/3184568#M1066156</guid>
      <dc:creator>ahmed-ejaz</dc:creator>
      <dc:date>2017-09-15T09:08:00Z</dc:date>
    </item>
  </channel>
</rss>

