<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to Contact Networks Behind ASA 5506-X in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4122441#M1072161</link>
    <description>&lt;P&gt;Good to hear, but you need to mark it as solved &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2020 08:12:47 GMT</pubDate>
    <dc:creator>Seb Rupik</dc:creator>
    <dc:date>2020-07-21T08:12:47Z</dc:date>
    <item>
      <title>Unable to Contact Networks Behind ASA 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121617#M1072127</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am running into an issue where I cannot touch / connect with any networks that are not directly connected to the ASA from the WAN interface. However, if I am connected through SSL VPN or connected to one of the networks hosted by the ASA, I can touch devices hosted behind the WAN interface. I have a series of NAT rules in place. Not sure if one of them is are causing problem or not. My setup is basically like this : Cisco ASA 5506 -&amp;gt;&amp;nbsp; Verizon Router -&amp;gt; Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I am on the 192.168.1.0 network hosted by verzion, when I try to probe or connect with services behind the ASA I can't make contact. Hopefully, this makes sense. Anyone's assistance is greatly appreciated. Here is my config:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;STORM-ASA(config)# show running-config&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;ASA Version 9.8(4)20&lt;BR /&gt;!&lt;BR /&gt;hostname STORM-ASA&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool VPN_POOL 10.10.30.100-10.10.30.120 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;nameif Management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;banner exec UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec All activities performed on this device are logged and monitored.&lt;BR /&gt;banner login UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner login&lt;BR /&gt;banner login You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner login&lt;BR /&gt;banner login Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner login&lt;BR /&gt;banner login All activities performed on this device are logged and monitored.&lt;BR /&gt;banner motd UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd All activities performed on this device are logged and monitored.&lt;BR /&gt;banner asdm UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm All activities performed on this device are logged and monitored.&lt;BR /&gt;boot system disk0:/asa984-20-lfbff-k8.SPA&lt;BR /&gt;no ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup WAN&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.1.1&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NAT_10.10.20.0_24&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network STORMRUNNER_TEST&lt;BR /&gt;host 173.79.28.87&lt;BR /&gt;object network VPN_Pool&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NETWORK_OBJ_10.10.30.96_27&lt;BR /&gt;subnet 10.10.30.96 255.255.255.224&lt;BR /&gt;object network Verizon_router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object network VPN_GW&lt;BR /&gt;host 10.10.30.1&lt;BR /&gt;object network NAT_VPN&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NAT_WAN_to_LAN&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NAT_LAN_to_WAN&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network all&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network vCenter&lt;BR /&gt;host 192.168.1.200&lt;BR /&gt;description vCenter&lt;BR /&gt;object network Nessus-Server&lt;BR /&gt;host 192.168.1.105&lt;BR /&gt;object service Nessus_Port&lt;BR /&gt;service tcp destination eq 8834&lt;BR /&gt;object-group network Dell_Workstation&lt;BR /&gt;network-object host 10.10.20.100&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;object-group service SMB_Ports&lt;BR /&gt;service-object tcp-udp destination eq 139&lt;BR /&gt;service-object tcp-udp destination eq 445&lt;BR /&gt;object-group network LAN_NETWORK&lt;BR /&gt;network-object 10.10.20.0 255.255.255.0&lt;BR /&gt;object-group service Testing_Group&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object icmp&lt;BR /&gt;group-object SMB_Ports&lt;BR /&gt;service-object icmp alternate-address&lt;BR /&gt;service-object icmp conversion-error&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp information-reply&lt;BR /&gt;service-object icmp information-request&lt;BR /&gt;service-object icmp mask-reply&lt;BR /&gt;service-object icmp mask-request&lt;BR /&gt;service-object icmp mobile-redirect&lt;BR /&gt;service-object icmp parameter-problem&lt;BR /&gt;service-object icmp redirect&lt;BR /&gt;service-object icmp router-advertisement&lt;BR /&gt;service-object icmp router-solicitation&lt;BR /&gt;service-object icmp source-quench&lt;BR /&gt;service-object icmp time-exceeded&lt;BR /&gt;service-object icmp timestamp-reply&lt;BR /&gt;service-object icmp timestamp-request&lt;BR /&gt;service-object icmp traceroute&lt;BR /&gt;service-object icmp unreachable&lt;BR /&gt;service-object icmp6 echo&lt;BR /&gt;service-object icmp6 echo-reply&lt;BR /&gt;service-object icmp6 membership-query&lt;BR /&gt;service-object icmp6 membership-reduction&lt;BR /&gt;service-object icmp6 membership-report&lt;BR /&gt;service-object icmp6 neighbor-advertisement&lt;BR /&gt;service-object icmp6 neighbor-redirect&lt;BR /&gt;service-object icmp6 neighbor-solicitation&lt;BR /&gt;service-object icmp6 packet-too-big&lt;BR /&gt;service-object icmp6 parameter-problem&lt;BR /&gt;service-object icmp6 router-advertisement&lt;BR /&gt;service-object icmp6 router-renumbering&lt;BR /&gt;service-object icmp6 router-solicitation&lt;BR /&gt;service-object icmp6 time-exceeded&lt;BR /&gt;service-object icmp6 unreachable&lt;BR /&gt;service-object tcp-udp destination eq cifs&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;service-object tcp-udp destination eq echo&lt;BR /&gt;service-object tcp-udp destination eq www&lt;BR /&gt;service-object tcp-udp destination eq kerberos&lt;BR /&gt;service-object tcp-udp destination eq nfs&lt;BR /&gt;service-object tcp-udp destination eq pim-auto-rp&lt;BR /&gt;service-object tcp-udp destination eq sip&lt;BR /&gt;service-object tcp-udp destination eq sunrpc&lt;BR /&gt;service-object tcp-udp destination eq tacacs&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object udp destination eq domain&lt;BR /&gt;object-group icmp-type ICMP_ALLOW&lt;BR /&gt;icmp-object alternate-address&lt;BR /&gt;icmp-object conversion-error&lt;BR /&gt;icmp-object echo&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object information-reply&lt;BR /&gt;icmp-object information-request&lt;BR /&gt;icmp-object mask-reply&lt;BR /&gt;icmp-object mask-request&lt;BR /&gt;icmp-object mobile-redirect&lt;BR /&gt;icmp-object parameter-problem&lt;BR /&gt;icmp-object redirect&lt;BR /&gt;icmp-object router-advertisement&lt;BR /&gt;icmp-object router-solicitation&lt;BR /&gt;icmp-object source-quench&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object timestamp-reply&lt;BR /&gt;icmp-object timestamp-request&lt;BR /&gt;icmp-object traceroute&lt;BR /&gt;icmp-object unreachable&lt;BR /&gt;object-group network 10.10.20.0&lt;BR /&gt;network-object 10.10.20.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object 192.168.1.0&lt;BR /&gt;network-object object Verizon_router&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object 192.168.1.0&lt;BR /&gt;network-object object Verizon_router&lt;BR /&gt;access-list LAN_access_in extended deny tcp object-group Dell_Workstation object STORMRUNNER_TEST eq https log critical&lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group Dell_Workstation any&lt;BR /&gt;access-list global_access extended permit object-group Testing_Group 10.10.20.0 255.255.255.0 any&lt;BR /&gt;access-list global_access extended permit object-group Testing_Group object VPN_Pool 10.10.20.0 255.255.255.0&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group Testing_Group object Verizon_router object VPN_Pool&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group Testing_Group object 192.168.1.0 object VPN_Pool&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group Testing_Group any 10.10.20.0 255.255.255.0&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.200&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.123&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.153&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu WAN 1406&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7131.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (WAN,WAN) source static Verizon_router Verizon_router dns no-proxy-arp route-lookup description PING TROUBLZESHOOT&lt;BR /&gt;nat (WAN,WAN) source dynamic VPN_Pool interface&lt;BR /&gt;nat (LAN,LAN) source dynamic NAT_10.10.20.0_24 interface&lt;BR /&gt;!&lt;BR /&gt;object network NAT_VPN&lt;BR /&gt;nat (WAN,WAN) dynamic interface dns&lt;BR /&gt;object network all&lt;BR /&gt;nat (LAN,WAN) dynamic interface&lt;BR /&gt;access-group WAN_access_in_1 in interface WAN&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group global_access global&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;route LAN 10.10.30.0 255.255.255.0 10.10.30.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 10&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 LAN&lt;BR /&gt;http 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;keypair ASDM_TrustPoint2&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2-1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;ssh 10.10.20.100 255.255.255.255 LAN&lt;BR /&gt;ssh timeout 45&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption fips&lt;BR /&gt;ssh cipher integrity fips&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface Management&lt;BR /&gt;dhcpd address 10.10.20.100-10.10.20.250 LAN&lt;BR /&gt;dhcpd dns 192.168.1.1 interface LAN&lt;BR /&gt;dhcpd lease 1500 interface LAN&lt;BR /&gt;dhcpd enable LAN&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 129.6.15.28 source WAN prefer&lt;BR /&gt;ssl server-version tlsv1.1&lt;BR /&gt;ssl client-version tlsv1.1&lt;BR /&gt;ssl cipher tlsv1.2 high&lt;BR /&gt;ssl dh-group group24&lt;BR /&gt;ssl ecdh-group group20&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 WAN&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 LAN&lt;BR /&gt;webvpn&lt;BR /&gt;port 8443&lt;BR /&gt;enable WAN&lt;BR /&gt;enable LAN&lt;BR /&gt;dtls port 8443&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.8.03052-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.8.03052-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.8.03052-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;group-policy Split-Tunnel internal&lt;BR /&gt;group-policy Split-Tunnel attributes&lt;BR /&gt;dns-server value 192.168.1.199&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Split-Tunnel&lt;BR /&gt;default-domain value abcteam.com&lt;BR /&gt;split-dns value abcteam.com storm.us&lt;BR /&gt;split-tunnel-all-dns disable&lt;BR /&gt;group-policy Full-Tunnel internal&lt;BR /&gt;group-policy Full-Tunnel attributes&lt;BR /&gt;dns-server value 192.168.1.199 192.168.1.1&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value abcteam.com&lt;BR /&gt;split-tunnel-all-dns enable&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username test password $sha512$5000$5KC8R8JyRSDkbQ/D5WycnA==$ZnyBQ3acSODZHMaoJaPcqA== pbkdf2&lt;BR /&gt;username dean password $sha512$5000$zvtKT4f7tUtxBMTOVxMCMA==$qSb2qEcGRmlPlQK/JwybNA== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group Full-Tunnel type remote-access&lt;BR /&gt;tunnel-group Full-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Full-Tunnel&lt;BR /&gt;tunnel-group Full-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Full-Tunnel enable&lt;BR /&gt;tunnel-group Split-Tunnel type remote-access&lt;BR /&gt;tunnel-group Split-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Split-Tunnel&lt;BR /&gt;tunnel-group Split-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Split-Tunnel enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:3ebf2eeec1e783558c13689264793724&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 07:26:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121617#M1072127</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-20T07:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Contact Networks Behind ASA 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121626#M1072128</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;This sounds like the sort of behaviour you would want from a firewall!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That point aside, if you want your 192.168.1.0/24 (I'm guessing on that subnet mask), then you need to make the following addition to you WAN inbound ACL:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;!
access-list WAN_access_in_1 ext permit tcp 192.168.1.0 255.255.255.0 any
!&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDIT----&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will also need to configure 'no-nat' for the return traffic:&lt;/P&gt;
&lt;PRE&gt;!
nat (LAN,WAN) source static all all destination static 192.168.1.0 192.168.1.0 no-proxy-arp
!&lt;/PRE&gt;
&lt;P&gt;...and ensure devices in the 192.168.1.0/24 know that to reach the&amp;nbsp;&lt;SPAN&gt;10.10.20..0/24 subnet it must go via ASA Gi1/1 IP address.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 07:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121626#M1072128</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2020-07-20T07:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Contact Networks Behind ASA 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121996#M1072145</link>
      <description>&lt;P&gt;Thanks a lot! This worked. This case can be marked as resolved.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 17:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4121996#M1072145</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-20T17:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Contact Networks Behind ASA 5506-X</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4122441#M1072161</link>
      <description>&lt;P&gt;Good to hear, but you need to mark it as solved &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 08:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-contact-networks-behind-asa-5506-x/m-p/4122441#M1072161</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2020-07-21T08:12:47Z</dc:date>
    </item>
  </channel>
</rss>

