<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow Traffice Between VPN Users in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056274#M1068514</link>
    <description>I assume it's the 3rd NAT rule?...which appears to have been hit.&lt;BR /&gt;&lt;BR /&gt;Do they have a local firewall turned on?...which is blocking traffic??&lt;BR /&gt;&lt;BR /&gt;Do you have split tunnel configured?....if yes you will need to tunnel the VPN Pool network.</description>
    <pubDate>Tue, 31 Mar 2020 20:23:25 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-03-31T20:23:25Z</dc:date>
    <item>
      <title>Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056039#M1068473</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to be able to establish sofphone calls from one VPN user working from Home to another VPN user working from HOme too, I need to enable the traffic between VPN users. I have ASA 5515.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that I need to add a NAT&lt;/P&gt;&lt;P&gt;nat (outside,outside) source static static VPN-Pool&amp;nbsp;VPN-Pool destination static VPN-Pool&amp;nbsp;VPN-Pool&lt;/P&gt;&lt;P&gt;is this enough?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 15:45:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056039#M1068473</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T15:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056044#M1068474</link>
      <description>Hi,&lt;BR /&gt;You will also need this command "same-security-traffic permit intra-interface" configured, to allow traffic to be routed back out the same interface it came in on.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 31 Mar 2020 15:47:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056044#M1068474</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-31T15:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056057#M1068475</link>
      <description>&lt;P&gt;Do I need another Nat?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static VPN-Pool&amp;nbsp;VPN-Pool destination static VPN-Pool&amp;nbsp;VPN-Pool&lt;BR /&gt;nat (outside,outside) source static static VPN-Pool VPN-Pool destination static VPN-Pool&amp;nbsp;VPN-Pool&lt;BR /&gt;nat (any,outside) after-auto source dynamic PAT-SOURCE interface&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 16:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056057#M1068475</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T16:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056065#M1068476</link>
      <description>Can you explain more!</description>
      <pubDate>Tue, 31 Mar 2020 16:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056065#M1068476</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T16:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056079#M1068480</link>
      <description>Your existing nat rule looks correct, assuming the object in use defines the correct network.&lt;BR /&gt;&lt;BR /&gt;When an AnyConnect user connects to the VPN their traffic is sourced from the outside interface, so if you want those users to communicate with each other you need a NAT exemption rule "nat (outside,outside).....).&lt;BR /&gt;&lt;BR /&gt;The command I provided earlier "same-security-traffic permit intra-interface" allows traffic be routed back out the same interface traffic originated on. This is disabled as default on the ASA.</description>
      <pubDate>Tue, 31 Mar 2020 16:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056079#M1068480</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-31T16:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056220#M1068507</link>
      <description>&lt;P&gt;I am still not able to get VPN clients remote each others or even ping each others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added the access-list&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Nat outside, outside&lt;/P&gt;&lt;P&gt;and the&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;same-security-traffic permit intra-interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 19:12:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056220#M1068507</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T19:12:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056230#M1068509</link>
      <description>Do they have a local firewall turned on?...which is blocking traffic&lt;BR /&gt;Provide the output of "show nat detail"</description>
      <pubDate>Tue, 31 Mar 2020 19:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056230#M1068509</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-31T19:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056256#M1068511</link>
      <description>&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(inside) to (Internet100) source static VPNAccess-ITGroup VPNAccess-ITGroup destination static NETWORK_OBJ_10.1.1.0_24 NETWORK_OBJ_10.1.1.0_24 no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 191998, untranslate_hits = 192516&lt;BR /&gt;Source - Origin: 172.16.12.0/30, 172.16.13.0/24, 172.16.14.0/24, 172.16.16.0/24&lt;BR /&gt;192.168.0.0/24, 192.168.9.0/24, 192.168.99.248/29, 192.168.1.0/24&lt;BR /&gt;192.168.2.0/24, 192.168.3.0/24, 192.168.4.0/24, 192.168.6.0/24&lt;BR /&gt;172.16.11.0/29, 172.16.11.0/29, 192.168.0.6/32, 192.168.22.0/23&lt;BR /&gt;10.124.125.0/24, 10.124.126.0/24, 10.124.127.0/24, 10.124.127.13/32&lt;BR /&gt;192.168.111.0/24, 192.168.6.0/24, 192.168.6.0/24, Translated: 172.16.12.0/30, 172.16.13.0/24, 172.16.14.0/24, 172.16.16.0/24&lt;BR /&gt;192.168.0.0/24, 192.168.9.0/24, 192.168.99.248/29, 192.168.1.0/24&lt;BR /&gt;192.168.2.0/24, 192.168.3.0/24, 192.168.4.0/24, 192.168.6.0/24&lt;BR /&gt;172.16.11.0/29, 172.16.11.0/29, 192.168.0.6/32, 192.168.22.0/23&lt;BR /&gt;10.124.125.0/24, 10.124.126.0/24, 10.124.127.0/24, 10.124.127.13/32&lt;BR /&gt;192.168.111.0/24, 192.168.6.0/24, 192.168.6.0/24&lt;BR /&gt;Destination - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(inside) to (Internet100) source static any XXXXXXXXXXXXXXX.105.77 destination static OneMail-External-Group OneMail-External-Group&lt;BR /&gt;translate_hits = 44632, untranslate_hits = 59757&lt;BR /&gt;Source - Origin: 0.0.0.0/0, Translated: XXXXXXXXXXXXXXX.105.77/32&lt;BR /&gt;Destination - Origin: 142.46.226.16/30, 142.46.226.20/31, 142.46.226.22/32, 76.75.164.89/32&lt;BR /&gt;76.75.164.90/31, 76.75.149.36/31, 76.75.149.38/32, 76.75.177.168/31&lt;BR /&gt;76.75.177.170/32, 76.75.133.89/32, 76.75.133.90/31, 76.75.177.138/32&lt;BR /&gt;76.75.164.96/32, 76.75.133.96/32, 76.75.149.54/32, Translated: 142.46.226.16/30, 142.46.226.20/31, 142.46.226.22/32, 76.75.164.89/32&lt;BR /&gt;76.75.164.90/31, 76.75.149.36/31, 76.75.149.38/32, 76.75.177.168/31&lt;BR /&gt;76.75.177.170/32, 76.75.133.89/32, 76.75.133.90/31, 76.75.177.138/32&lt;BR /&gt;76.75.164.96/32, 76.75.133.96/32, 76.75.149.54/32&lt;BR /&gt;(any) to (DMZ) source static obj-VPNPool obj-VPNPool&lt;BR /&gt;translate_hits = 48243, untranslate_hits = 1113&lt;BR /&gt;Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Internet100) to (Internet100) source static obj-VPNPool obj-VPNPool destination static obj-VPNPool obj-VPNPool&lt;BR /&gt;translate_hits = 20, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24&lt;BR /&gt;Destination - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 20:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056256#M1068511</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T20:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056274#M1068514</link>
      <description>I assume it's the 3rd NAT rule?...which appears to have been hit.&lt;BR /&gt;&lt;BR /&gt;Do they have a local firewall turned on?...which is blocking traffic??&lt;BR /&gt;&lt;BR /&gt;Do you have split tunnel configured?....if yes you will need to tunnel the VPN Pool network.</description>
      <pubDate>Tue, 31 Mar 2020 20:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056274#M1068514</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-03-31T20:23:25Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Traffice Between VPN Users</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056275#M1068515</link>
      <description>&lt;P&gt;Yes I did tunnel&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list Internet100_access_in extended permit icmp object obj-VPNPool object obj-VPNPool&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think it is the local firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 20:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffice-between-vpn-users/m-p/4056275#M1068515</guid>
      <dc:creator>Ash160</dc:creator>
      <dc:date>2020-03-31T20:24:59Z</dc:date>
    </item>
  </channel>
</rss>

