<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110260#M1071487</link>
    <description>&lt;P&gt;I just checked acl, looks like when I was writing it here I wrote the wrong mask, the config has it as 255.255.255.0&lt;/P&gt;&lt;P&gt;Below is the config...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;terminal width 160&lt;BR /&gt;hostname Testfw01&lt;BR /&gt;domain-name Testclinic.com&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;service-module ips keepalive-timeout 4&lt;BR /&gt;service-module ips keepalive-counter 6&lt;BR /&gt;service-module cxsc keepalive-timeout 4&lt;BR /&gt;service-module cxsc keepalive-counter 6&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;no names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool AnyConnect-VPN 10.1.96.1-10.1.96.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description Internet facing interface&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Internal Network facing interface&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.28.170 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; !&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; no ip address&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name Testclinic.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network AnyConnect_Users&lt;BR /&gt;subnet 10.1.96.0 255.255.255.0&lt;BR /&gt;object-group network Internal_Nets&lt;BR /&gt;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;network-object 192.10.10.0 255.255.254.0&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; network-object 192.10.12.0 255.255.252.0&lt;BR /&gt;network-object 192.10.16.0 255.255.254.0&lt;BR /&gt;network-object 172.30.1.0 255.255.255.0&lt;BR /&gt;network-object 10.1.90.0 255.255.255.0&lt;BR /&gt;network-object 10.1.80.0 255.255.255.0&lt;BR /&gt;network-object 10.1.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside-in-acl remark Allow all outbound traffic&lt;BR /&gt;access-list inside-in-acl extended permit ip any4 any4&lt;BR /&gt;access-list inside-in-acl remark Allow all outbound traffic&lt;BR /&gt;access-list outside-in-acl remark Deny all inbound traffic (Does not apply to VPN traffic)&lt;BR /&gt;access-list outside-in-acl extended deny ip any4 any4&lt;BR /&gt;access-list outside-in-acl remark Deny all inbound traffic (Does not apply to VPN traffic)&lt;BR /&gt;access-list match-icmp-acl remark Match all ICMP traffic&lt;BR /&gt;access-list match-icmp-acl extended permit icmp any4 any4&lt;BR /&gt;access-list match-icmp-acl remark Match all ICMP traffic&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit host 192.10.10.197&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit host 10.13.46.10&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.20.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.28.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.30.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.31.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.102.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.35.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.96.0 255.255.255.0&lt;BR /&gt;access-list RDP extended permit tcp object-group Internal_Nets object-group Internal_Nets eq 3389&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list VPN-LIST message 713000-713999&lt;BR /&gt;logging list VPN-LIST message 113000-113999&lt;BR /&gt;logging list VPN-LIST message 715000-715999&lt;BR /&gt;logging buffer-size 100000&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging monitor VPN-LIST&lt;BR /&gt;logging buffered warnings&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;logging queue 2048&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip audit name info info action alarm&lt;BR /&gt;ip audit name attack attack action alarm&lt;BR /&gt;ip audit interface outside attack&lt;BR /&gt;ip audit interface inside attack&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7122.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (outside,inside) source static AnyConnect_Users AnyConnect_Users destination static Internal_Nets Internal_Nets no-proxy-arp route-lookup&lt;BR /&gt;nat (outside,outside) source static AnyConnect_Users AnyConnect_Users destination static AnyConnect_Users AnyConnect_Users no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside-in-acl in interface outside&lt;BR /&gt;access-group inside-in-acl in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.1.28.169 1&lt;BR /&gt;route inside 10.1.20.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 10.1.70.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 172.30.1.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.10.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.11.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.12.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.13.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.14.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.15.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; route inside 192.10.16.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.17.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;ldap attribute-map anyconnectLDAP&lt;BR /&gt;map-name memberoOf Group-Policy&lt;BR /&gt;map-value memberoOf "CN=Test VPN users,OU=Security Groups,OU=Groups,OU=Test,DC=Test,DC=local" RemoteUsers&lt;BR /&gt;aaa-server Test_LDAP protocol ldap&lt;BR /&gt;aaa-server Test_LDAP (inside) host 192.10.10.197&lt;BR /&gt;ldap-base-dn DC=Test,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute samaccountname&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn CN=VPN LDAP,OU=Service Accounts,OU=Netgain,DC=Test,DC=local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map anyconnectLDAP&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; aaa-server Test_LDAP (inside) host 10.13.46.10&lt;BR /&gt;ldap-base-dn DC=Test,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute samaccountname&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn CN=VPN LDAP,OU=Service Accounts,OU=Netgain,DC=Test,DC=local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map anyconnectLDAP&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;/P&gt;&lt;P&gt;snmp-server location ZZZZZ, MN&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; snmp-server contact Test Clinic&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;service resetinbound interface inside&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto ipsec df-bit clear-df inside&lt;BR /&gt;crypto dynamic-map soho-dyno_map 100 set ikev1 transform-set ESP-AES-SHA&lt;BR /&gt;crypto map SOHO-map 100 ipsec-isakmp dynamic soho-dyno_map&lt;BR /&gt;crypto map SOHO-map interface outside&lt;BR /&gt;crypto ca trustpoint Testfw01.Testclinic.com&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn none&lt;BR /&gt;subject-name&lt;BR /&gt;ip-address 10.1.28.170&lt;BR /&gt;keypair idcert-kp&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 15&lt;BR /&gt;management-access inside&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;vpn-addr-assign local reuse-delay 30&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 192.43.244.18&lt;BR /&gt;ntp server 131.107.13.100&lt;BR /&gt;ntp server 129.6.15.29&lt;BR /&gt;ntp server 129.6.15.28&lt;BR /&gt;ntp server 64.236.96.53&lt;BR /&gt;tftp-server inside 172.30.1.124 Testfw01-confg.txt&lt;BR /&gt;ssl server-version tlsv1.1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;enable inside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.7.02036-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect profiles Test_VPN disk0:/Test_vpn.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;default-domain value Testclinic.com&lt;BR /&gt;group-policy GroupPolicy_AnyConnect-VPN internal&lt;BR /&gt;group-policy GroupPolicy_AnyConnect-VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.10.10.197 10.13.46.10&lt;BR /&gt;vpn-simultaneous-logins 5&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;group-lock value AnyConnect-VPN&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value AnyConnect-Split-Tunnel&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; default-domain value Test.local&lt;BR /&gt;vlan none&lt;BR /&gt;address-pools value AnyConnect-VPN&lt;BR /&gt;ipv6-address-pools none&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value Test_VPN type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;isakmp keepalive threshold 300 retry 2&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;authentication-server-group Test_LDAP&lt;BR /&gt;tunnel-group AnyConnect-VPN type remote-access&lt;BR /&gt;tunnel-group AnyConnect-VPN general-attributes&lt;BR /&gt;address-pool AnyConnect-VPN&lt;BR /&gt;authentication-server-group Test_LDAP&lt;BR /&gt;default-group-policy GroupPolicy_AnyConnect-VPN&lt;BR /&gt;tunnel-group AnyConnect-VPN webvpn-attributes&lt;BR /&gt;group-alias AnyConnect-VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map RDP&lt;BR /&gt;match access-list RDP&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; class-map type regex match-any match-im-cm&lt;BR /&gt;match regex _default_aim-messenger&lt;BR /&gt;match regex _default_yahoo-messenger&lt;BR /&gt;match regex _default_GoToMyPC-tunnel&lt;BR /&gt;match regex _default_gator&lt;BR /&gt;match regex _default_firethru-tunnel_2&lt;BR /&gt;match regex _default_firethru-tunnel_1&lt;BR /&gt;match regex _default_msn-messenger&lt;BR /&gt;match regex _default_x-kazaa-network&lt;BR /&gt;match regex _default_GoToMyPC-tunnel_2&lt;BR /&gt;match regex _default_icy-metadata&lt;BR /&gt;match regex _default_gnu-http-tunnel_uri&lt;BR /&gt;match regex _default_httport-tunnel&lt;BR /&gt;match regex _default_windows-media-player-tunnel&lt;BR /&gt;match regex _default_gnu-http-tunnel_arg&lt;BR /&gt;match regex _default_http-tunnel&lt;BR /&gt;match regex _default_shoutcast-tunneling-protocol&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map match-icmp-cm&lt;BR /&gt;description Classify ICMP Traffic&lt;BR /&gt;match access-list match-icmp-acl&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect im log-im-pm&lt;BR /&gt;parameters&lt;BR /&gt;match service chat conference file-transfer games voice-chat webcam&lt;BR /&gt;log&lt;BR /&gt;match protocol msn-im yahoo-im&lt;BR /&gt;log&lt;BR /&gt;match version regex class match-im-cm&lt;BR /&gt;log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect http&lt;BR /&gt;inspect im log-im-pm&lt;BR /&gt;inspect ipsec-pass-thru&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect snmp&lt;BR /&gt;class match-icmp-cm&lt;BR /&gt;police input 90000 1000&lt;BR /&gt;class RDP&lt;BR /&gt;set connection timeout idle 8:00:00&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile test4me-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco" target="_blank"&gt;https://tools.cisco&lt;/A&gt;.&lt;BR /&gt;com/its/service/oddce/services/DDCEService&lt;BR /&gt;destination address email destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;: end&lt;BR /&gt;Testfw01#&lt;/P&gt;</description>
    <pubDate>Sat, 27 Jun 2020 15:46:00 GMT</pubDate>
    <dc:creator>peushohel</dc:creator>
    <dc:date>2020-06-27T15:46:00Z</dc:date>
    <item>
      <title>Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110085#M1071470</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am looking for suggestion please.&amp;nbsp; &amp;nbsp;I am trying to set up the ASA so that the remote users connecting using anyconnect client can communicate each other, specifically I am trying to figure out why softphone internal extension to internal extension doesn't work.&amp;nbsp; &amp;nbsp;I also tested the users can't ping each other.&amp;nbsp; &amp;nbsp;The users are trying to connect using anyconnect over Splitunneling through ASA 5512 running 9.12.&amp;nbsp; &amp;nbsp; I tried the nat 0 exemption but looks like nat (outside) 0 access list command is deprecated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list AnyConnect-NAT0&lt;BR /&gt;ERROR: This syntax of nat command has been deprecated.&lt;BR /&gt;Please refer to "help nat" command for more details.&lt;/P&gt;&lt;P&gt;below are the nat statements that I currently have&lt;/P&gt;&lt;P&gt;nat (outside,outside) source static AnyConnect_Users AnyConnect_Users destination static AnyConnect_Users AnyConnect_Users no-proxy-arp ro&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static AnyConnect_Users AnyConnect_Users destination static Internal_Nets Internal_Nets no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The current acl is allowing the Anyconnect Users in the acl&lt;/P&gt;&lt;P&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.96.0 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion will be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 20:31:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110085#M1071470</guid>
      <dc:creator>peushohel</dc:creator>
      <dc:date>2020-06-26T20:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110089#M1071471</link>
      <description>Hi,&lt;BR /&gt;In addition to the NAT rules, you will need to use the command "same-security-traffic permit intra-interface" in order for the traffic to hairpin and route back out the same interface the traffic entered from.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 26 Jun 2020 20:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110089#M1071471</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-06-26T20:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110136#M1071472</link>
      <description>&lt;P&gt;Thanks a lot for your response.&amp;nbsp; &amp;nbsp; I have the below already in place, still not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jun 2020 00:08:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110136#M1071472</guid>
      <dc:creator>peushohel</dc:creator>
      <dc:date>2020-06-27T00:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110164#M1071475</link>
      <description>&lt;P&gt;You mask (255.255.255.255) in your split-tunnel ACL looks incorrect, are you sure your split-tunnel ACL is permitting the AnyConnect routes? Check the "Route Details" tab within AnyConnect once connected to the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your split-tunnel ACL should look like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.96.0 255.255.255.&lt;STRONG&gt;0&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jun 2020 06:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110164#M1071475</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-06-27T06:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110260#M1071487</link>
      <description>&lt;P&gt;I just checked acl, looks like when I was writing it here I wrote the wrong mask, the config has it as 255.255.255.0&lt;/P&gt;&lt;P&gt;Below is the config...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;terminal width 160&lt;BR /&gt;hostname Testfw01&lt;BR /&gt;domain-name Testclinic.com&lt;BR /&gt;service-module 0 keepalive-timeout 4&lt;BR /&gt;service-module 0 keepalive-counter 6&lt;BR /&gt;service-module ips keepalive-timeout 4&lt;BR /&gt;service-module ips keepalive-counter 6&lt;BR /&gt;service-module cxsc keepalive-timeout 4&lt;BR /&gt;service-module cxsc keepalive-counter 6&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;no names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool AnyConnect-VPN 10.1.96.1-10.1.96.250 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;description Internet facing interface&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description Internal Network facing interface&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.1.28.170 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; !&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; no ip address&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name Testclinic.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network AnyConnect_Users&lt;BR /&gt;subnet 10.1.96.0 255.255.255.0&lt;BR /&gt;object-group network Internal_Nets&lt;BR /&gt;network-object 10.0.0.0 255.0.0.0&lt;BR /&gt;network-object 192.10.10.0 255.255.254.0&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; network-object 192.10.12.0 255.255.252.0&lt;BR /&gt;network-object 192.10.16.0 255.255.254.0&lt;BR /&gt;network-object 172.30.1.0 255.255.255.0&lt;BR /&gt;network-object 10.1.90.0 255.255.255.0&lt;BR /&gt;network-object 10.1.80.0 255.255.255.0&lt;BR /&gt;network-object 10.1.21.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside-in-acl remark Allow all outbound traffic&lt;BR /&gt;access-list inside-in-acl extended permit ip any4 any4&lt;BR /&gt;access-list inside-in-acl remark Allow all outbound traffic&lt;BR /&gt;access-list outside-in-acl remark Deny all inbound traffic (Does not apply to VPN traffic)&lt;BR /&gt;access-list outside-in-acl extended deny ip any4 any4&lt;BR /&gt;access-list outside-in-acl remark Deny all inbound traffic (Does not apply to VPN traffic)&lt;BR /&gt;access-list match-icmp-acl remark Match all ICMP traffic&lt;BR /&gt;access-list match-icmp-acl extended permit icmp any4 any4&lt;BR /&gt;access-list match-icmp-acl remark Match all ICMP traffic&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit host 192.10.10.197&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit host 10.13.46.10&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.20.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.28.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.30.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.31.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.102.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.35.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect-Split-Tunnel standard permit 10.1.96.0 255.255.255.0&lt;BR /&gt;access-list RDP extended permit tcp object-group Internal_Nets object-group Internal_Nets eq 3389&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging list VPN-LIST message 713000-713999&lt;BR /&gt;logging list VPN-LIST message 113000-113999&lt;BR /&gt;logging list VPN-LIST message 715000-715999&lt;BR /&gt;logging buffer-size 100000&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging monitor VPN-LIST&lt;BR /&gt;logging buffered warnings&lt;BR /&gt;logging trap notifications&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;logging queue 2048&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip audit name info info action alarm&lt;BR /&gt;ip audit name attack attack action alarm&lt;BR /&gt;ip audit interface outside attack&lt;BR /&gt;ip audit interface inside attack&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7122.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 8192&lt;BR /&gt;nat (outside,inside) source static AnyConnect_Users AnyConnect_Users destination static Internal_Nets Internal_Nets no-proxy-arp route-lookup&lt;BR /&gt;nat (outside,outside) source static AnyConnect_Users AnyConnect_Users destination static AnyConnect_Users AnyConnect_Users no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-10.0.0.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside-in-acl in interface outside&lt;BR /&gt;access-group inside-in-acl in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route inside 10.0.0.0 255.0.0.0 10.1.28.169 1&lt;BR /&gt;route inside 10.1.20.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 10.1.70.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 172.30.1.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.10.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.11.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.12.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.13.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.14.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.15.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; route inside 192.10.16.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;route inside 192.10.17.0 255.255.255.0 10.1.28.169 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;ldap attribute-map anyconnectLDAP&lt;BR /&gt;map-name memberoOf Group-Policy&lt;BR /&gt;map-value memberoOf "CN=Test VPN users,OU=Security Groups,OU=Groups,OU=Test,DC=Test,DC=local" RemoteUsers&lt;BR /&gt;aaa-server Test_LDAP protocol ldap&lt;BR /&gt;aaa-server Test_LDAP (inside) host 192.10.10.197&lt;BR /&gt;ldap-base-dn DC=Test,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute samaccountname&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn CN=VPN LDAP,OU=Service Accounts,OU=Netgain,DC=Test,DC=local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map anyconnectLDAP&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; aaa-server Test_LDAP (inside) host 10.13.46.10&lt;BR /&gt;ldap-base-dn DC=Test,DC=local&lt;BR /&gt;ldap-scope subtree&lt;BR /&gt;ldap-naming-attribute samaccountname&lt;BR /&gt;ldap-login-password *****&lt;BR /&gt;ldap-login-dn CN=VPN LDAP,OU=Service Accounts,OU=Netgain,DC=Test,DC=local&lt;BR /&gt;server-type microsoft&lt;BR /&gt;ldap-attribute-map anyconnectLDAP&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;/P&gt;&lt;P&gt;snmp-server location ZZZZZ, MN&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; snmp-server contact Test Clinic&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;service resetinbound interface inside&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec df-bit clear-df outside&lt;BR /&gt;crypto ipsec df-bit clear-df inside&lt;BR /&gt;crypto dynamic-map soho-dyno_map 100 set ikev1 transform-set ESP-AES-SHA&lt;BR /&gt;crypto map SOHO-map 100 ipsec-isakmp dynamic soho-dyno_map&lt;BR /&gt;crypto map SOHO-map interface outside&lt;BR /&gt;crypto ca trustpoint Testfw01.Testclinic.com&lt;BR /&gt;enrollment self&lt;BR /&gt;fqdn none&lt;BR /&gt;subject-name&lt;BR /&gt;ip-address 10.1.28.170&lt;BR /&gt;keypair idcert-kp&lt;BR /&gt;crl configure&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh scopy enable&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 15&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 15&lt;BR /&gt;management-access inside&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;vpn-addr-assign local reuse-delay 30&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 192.43.244.18&lt;BR /&gt;ntp server 131.107.13.100&lt;BR /&gt;ntp server 129.6.15.29&lt;BR /&gt;ntp server 129.6.15.28&lt;BR /&gt;ntp server 64.236.96.53&lt;BR /&gt;tftp-server inside 172.30.1.124 Testfw01-confg.txt&lt;BR /&gt;ssl server-version tlsv1.1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;enable inside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.7.02036-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect profiles Test_VPN disk0:/Test_vpn.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;default-domain value Testclinic.com&lt;BR /&gt;group-policy GroupPolicy_AnyConnect-VPN internal&lt;BR /&gt;group-policy GroupPolicy_AnyConnect-VPN attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.10.10.197 10.13.46.10&lt;BR /&gt;vpn-simultaneous-logins 5&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;group-lock value AnyConnect-VPN&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value AnyConnect-Split-Tunnel&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; default-domain value Test.local&lt;BR /&gt;vlan none&lt;BR /&gt;address-pools value AnyConnect-VPN&lt;BR /&gt;ipv6-address-pools none&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value Test_VPN type user&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt;isakmp keepalive threshold 300 retry 2&lt;BR /&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;BR /&gt;authentication-server-group Test_LDAP&lt;BR /&gt;tunnel-group AnyConnect-VPN type remote-access&lt;BR /&gt;tunnel-group AnyConnect-VPN general-attributes&lt;BR /&gt;address-pool AnyConnect-VPN&lt;BR /&gt;authentication-server-group Test_LDAP&lt;BR /&gt;default-group-policy GroupPolicy_AnyConnect-VPN&lt;BR /&gt;tunnel-group AnyConnect-VPN webvpn-attributes&lt;BR /&gt;group-alias AnyConnect-VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map RDP&lt;BR /&gt;match access-list RDP&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; class-map type regex match-any match-im-cm&lt;BR /&gt;match regex _default_aim-messenger&lt;BR /&gt;match regex _default_yahoo-messenger&lt;BR /&gt;match regex _default_GoToMyPC-tunnel&lt;BR /&gt;match regex _default_gator&lt;BR /&gt;match regex _default_firethru-tunnel_2&lt;BR /&gt;match regex _default_firethru-tunnel_1&lt;BR /&gt;match regex _default_msn-messenger&lt;BR /&gt;match regex _default_x-kazaa-network&lt;BR /&gt;match regex _default_GoToMyPC-tunnel_2&lt;BR /&gt;match regex _default_icy-metadata&lt;BR /&gt;match regex _default_gnu-http-tunnel_uri&lt;BR /&gt;match regex _default_httport-tunnel&lt;BR /&gt;match regex _default_windows-media-player-tunnel&lt;BR /&gt;match regex _default_gnu-http-tunnel_arg&lt;BR /&gt;match regex _default_http-tunnel&lt;BR /&gt;match regex _default_shoutcast-tunneling-protocol&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map match-icmp-cm&lt;BR /&gt;description Classify ICMP Traffic&lt;BR /&gt;match access-list match-icmp-acl&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map type inspect im log-im-pm&lt;BR /&gt;parameters&lt;BR /&gt;match service chat conference file-transfer games voice-chat webcam&lt;BR /&gt;log&lt;BR /&gt;match protocol msn-im yahoo-im&lt;BR /&gt;log&lt;BR /&gt;match version regex class match-im-cm&lt;BR /&gt;log&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect http&lt;BR /&gt;inspect im log-im-pm&lt;BR /&gt;inspect ipsec-pass-thru&lt;BR /&gt;inspect pptp&lt;BR /&gt;inspect snmp&lt;BR /&gt;class match-icmp-cm&lt;BR /&gt;police input 90000 1000&lt;BR /&gt;class RDP&lt;BR /&gt;set connection timeout idle 8:00:00&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile test4me-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco" target="_blank"&gt;https://tools.cisco&lt;/A&gt;.&lt;BR /&gt;com/its/service/oddce/services/DDCEService&lt;BR /&gt;destination address email destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;: end&lt;BR /&gt;Testfw01#&lt;/P&gt;</description>
      <pubDate>Sat, 27 Jun 2020 15:46:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110260#M1071487</guid>
      <dc:creator>peushohel</dc:creator>
      <dc:date>2020-06-27T15:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble communicating between anyconnect clients coming over Split Tunnel ASA 5512 running 9.12</title>
      <link>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110262#M1071488</link>
      <description>Are there any hits on the NAT rule? Provide the output of "show nat detail"&lt;BR /&gt;Run packet-tracer from the CLI and provide the output for review.&lt;BR /&gt;Do you have any ACLs or a VPN filter configured?</description>
      <pubDate>Sat, 27 Jun 2020 15:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-communicating-between-anyconnect-clients-coming-over/m-p/4110262#M1071488</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-06-27T15:16:37Z</dc:date>
    </item>
  </channel>
</rss>

