<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to Access Subnet Behind Double NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127128#M1072403</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I imagine your traffic from 10.10.50.0/24 network is being natted by the dynamic NAT rule under the object ASA-SERVERS. If you don't want to NAT this traffic, create a NAT exemption rule (this will work in both directions). Example:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;nat (ASA-SERVERS,WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jul 2020 07:11:44 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-07-29T07:11:44Z</dc:date>
    <item>
      <title>Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127052#M1072391</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am having an issue were I am unable to access the 10.10.50.0/24 network when I am behind the 192.168.1.0 network. I have built a NAT statement for when I am accessing the 192.168.1.0 from the 10.10.50.0/24. However, when I try and access something from the other way, I get nothing back. I do see errors in the log viewer referring to an invalid NAT statement. Could someone point me in the right direction for resolving this issue?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;: Written by dean at 22:23:25.603 EDT Tue Jul 28 2020&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.8(4)20&lt;BR /&gt;!&lt;BR /&gt;hostname STORM-ASA&lt;BR /&gt;fips enable&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool VPN_POOL 10.10.30.100-10.10.30.120 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif ASA-TRUNK-OUT&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif ASA-SERVERS&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.50.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.60&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif ASA-UC&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.60.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;nameif Management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;banner exec UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec All activities performed on this device are logged and monitored.&lt;BR /&gt;banner login UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner login&lt;BR /&gt;banner login You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner login&lt;BR /&gt;banner login Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner login&lt;BR /&gt;banner login All activities performed on this device are logged and monitored.&lt;BR /&gt;banner motd UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd All activities performed on this device are logged and monitored.&lt;BR /&gt;banner asdm UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm All activities performed on this device are logged and monitored.&lt;BR /&gt;boot system disk0:/asa984-20-lfbff-k8.SPA&lt;BR /&gt;no ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup WAN&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.1.1&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NAT_10.10.20.0_24&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network VPN-Pool-Subnet&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NETWORK_OBJ_10.10.30.96_27&lt;BR /&gt;subnet 10.10.30.96 255.255.255.224&lt;BR /&gt;object network Verizon-Router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object network VPN_Scope_Default_Gateway&lt;BR /&gt;host 10.10.30.1&lt;BR /&gt;object network NAT_VPN_Subnet&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network Verizon-LAN-Subnet&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NAT_WAN_to_LAN&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NAT_LAN_to_WAN&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network all&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network vCenter-Server&lt;BR /&gt;host 192.168.1.200&lt;BR /&gt;description vCenter&lt;BR /&gt;object network Tenable-Nessus-Server&lt;BR /&gt;host 192.168.1.105&lt;BR /&gt;object service Nessus_Port&lt;BR /&gt;service tcp destination eq 8834&lt;BR /&gt;object service 8443&lt;BR /&gt;service tcp destination eq 8443&lt;BR /&gt;object service Appliance_Management_Interface&lt;BR /&gt;service tcp destination eq 5480&lt;BR /&gt;object service Remote_Access_Console&lt;BR /&gt;service tcp destination eq 903&lt;BR /&gt;object service vCenter_Remote_Access_Console&lt;BR /&gt;service tcp destination eq 903&lt;BR /&gt;object network ASA-LAN-Subnet&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network STORM-FILESHARE&lt;BR /&gt;host 192.168.1.123&lt;BR /&gt;object network Blue-Diamond&lt;BR /&gt;host 192.168.1.153&lt;BR /&gt;object network Cisco-ASA&lt;BR /&gt;host 192.168.1.11&lt;BR /&gt;description Cisco-ASA&lt;BR /&gt;object network Nessus-Server&lt;BR /&gt;host 192.168.1.105&lt;BR /&gt;object network VOICE-SUBNET&lt;BR /&gt;host 10.10.50.100&lt;BR /&gt;object network ASA-SERVERS&lt;BR /&gt;range 10.10.50.100 10.10.50.254&lt;BR /&gt;description ASA-SERVERS&lt;BR /&gt;object network ASA-SERVERS-Subnet&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;description ASA-SERVERS-Subnet&lt;BR /&gt;object network Verizon-&amp;gt;ASA-SERVERS&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;object network 192.168.1.1-test&lt;BR /&gt;host 10.10.50.0&lt;BR /&gt;object-group network Dell_Workstation&lt;BR /&gt;network-object host 10.10.20.100&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;object-group service SMB_Ports&lt;BR /&gt;service-object tcp-udp destination eq 139&lt;BR /&gt;service-object tcp-udp destination eq 445&lt;BR /&gt;object-group network LAN_NETWORK&lt;BR /&gt;network-object object ASA-LAN-Subnet&lt;BR /&gt;object-group service ICMP_Allow&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp alternate-address&lt;BR /&gt;service-object icmp conversion-error&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp information-reply&lt;BR /&gt;service-object icmp information-request&lt;BR /&gt;service-object icmp mask-reply&lt;BR /&gt;service-object icmp mask-request&lt;BR /&gt;service-object icmp mobile-redirect&lt;BR /&gt;service-object icmp parameter-problem&lt;BR /&gt;service-object icmp redirect&lt;BR /&gt;service-object icmp router-advertisement&lt;BR /&gt;service-object icmp router-solicitation&lt;BR /&gt;service-object icmp source-quench&lt;BR /&gt;service-object icmp time-exceeded&lt;BR /&gt;service-object icmp timestamp-reply&lt;BR /&gt;service-object icmp timestamp-request&lt;BR /&gt;service-object icmp traceroute&lt;BR /&gt;service-object icmp unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;service-object tcp-udp&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;group-object SMB_Ports&lt;BR /&gt;object-group network 10.10.20.0&lt;BR /&gt;network-object object ASA-LAN-Subnet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object Verizon-LAN-Subnet&lt;BR /&gt;network-object object Verizon-Router&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object Verizon-LAN-Subnet&lt;BR /&gt;network-object object Verizon-Router&lt;BR /&gt;object-group service vCenter_Ports&lt;BR /&gt;service-object object Appliance_Management_Interface&lt;BR /&gt;service-object tcp-udp destination eq 902&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object object vCenter_Remote_Access_Console&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;protocol-object ip&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;service-object tcp-udp&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;group-object SMB_Ports&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;service-object tcp destination eq ssh&lt;BR /&gt;object-group service Nessus tcp&lt;BR /&gt;port-object eq 8834&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;protocol-object ip&lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group Dell_Workstation any&lt;BR /&gt;access-list LAN_access_in extended deny ip any any&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list WAN_access_in_1 extended permit icmp object Verizon-Router object ASA-SERVERS-Subnet echo&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group vCenter_Ports object VPN-Pool-Subnet object vCenter-Server&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group DM_INLINE_SERVICE_2 object Verizon-LAN-Subnet object VPN-Pool-Subnet&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group DM_INLINE_SERVICE_3 object VPN-Pool-Subnet object Verizon-LAN-Subnet&lt;BR /&gt;access-list WAN_access_in_1 remark NTP Allow&lt;BR /&gt;access-list WAN_access_in_1 extended permit udp object Cisco-ASA any eq ntp&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group TCPUDP object Verizon-LAN-Subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group DM_INLINE_PROTOCOL_2 object Verizon-LAN-Subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;access-list WAN_access_in_1 extended deny object-group DM_INLINE_PROTOCOL_1 any any&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.200&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.123&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.153&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit object-group DM_INLINE_SERVICE_4 object ASA-SERVERS-Subnet object Verizon-LAN-Subnet&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit tcp object ASA-SERVERS-Subnet object Nessus-Server object-group Nessus&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit object-group TCPUDP any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu WAN 1406&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;mtu ASA-TRUNK-OUT 1500&lt;BR /&gt;mtu ASA-SERVERS 1500&lt;BR /&gt;mtu ASA-UC 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7131.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (WAN,WAN) source static Verizon-Router Verizon-Router dns no-proxy-arp route-lookup&lt;BR /&gt;nat (WAN,WAN) source dynamic VPN-Pool-Subnet interface&lt;BR /&gt;nat (LAN,LAN) source dynamic NAT_10.10.20.0_24 interface&lt;BR /&gt;nat (WAN,WAN) source static all all destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network NAT_VPN_Subnet&lt;BR /&gt;nat (WAN,WAN) dynamic interface dns&lt;BR /&gt;object network all&lt;BR /&gt;nat (LAN,WAN) dynamic interface&lt;BR /&gt;object network ASA-SERVERS&lt;BR /&gt;nat (ASA-SERVERS,WAN) dynamic interface dns&lt;BR /&gt;access-group WAN_access_in_1 in interface WAN&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group ASA-VOICE_access_in in interface ASA-SERVERS&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;route LAN 10.10.30.0 255.255.255.0 10.10.30.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no user-identity inactive-user-timer&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 10&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 LAN&lt;BR /&gt;http 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;keypair ASDM_TrustPoint2&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2-1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2&lt;BR /&gt;&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;ssh 10.10.20.100 255.255.255.255 LAN&lt;BR /&gt;ssh timeout 45&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption fips&lt;BR /&gt;ssh cipher integrity fips&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface Management&lt;BR /&gt;dhcpd address 10.10.20.100-10.10.20.250 LAN&lt;BR /&gt;dhcpd dns 192.168.1.1 interface LAN&lt;BR /&gt;dhcpd lease 1500 interface LAN&lt;BR /&gt;dhcpd enable LAN&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.50.101-10.10.50.254 ASA-SERVERS&lt;BR /&gt;dhcpd dns 192.168.1.1 interface ASA-SERVERS&lt;BR /&gt;dhcpd enable ASA-SERVERS&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.60.101-10.10.60.254 ASA-UC&lt;BR /&gt;dhcpd dns 192.168.1.1 interface ASA-UC&lt;BR /&gt;dhcpd enable ASA-UC&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 129.6.15.28 source WAN prefer&lt;BR /&gt;ssl server-version tlsv1.2&lt;BR /&gt;ssl client-version tlsv1.2&lt;BR /&gt;ssl cipher tlsv1.2 custom "DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:AES256-SHA:AES128-SHA"&lt;BR /&gt;ssl dh-group group14&lt;BR /&gt;ssl ecdh-group group21&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 WAN&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 LAN&lt;BR /&gt;webvpn&lt;BR /&gt;port 8443&lt;BR /&gt;enable WAN&lt;BR /&gt;enable LAN&lt;BR /&gt;dtls port 8443&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.8.03052-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.8.03052-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.8.03052-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;group-policy Split-Tunnel internal&lt;BR /&gt;group-policy Split-Tunnel attributes&lt;BR /&gt;banner value&lt;BR /&gt;banner value *** ALL ACTIVITIES ARE MONITORED ***&lt;BR /&gt;banner value&lt;BR /&gt;banner value By accessing this system, you are consenting to system monitoring for law enforcement purposes.&lt;BR /&gt;banner value Unauthorized access or illegal use may subject you to criminal prosecution and penalties.&lt;BR /&gt;dns-server value 192.168.1.199&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Split-Tunnel&lt;BR /&gt;default-domain value team.com&lt;BR /&gt;split-dns value team.com storm.us&lt;BR /&gt;split-tunnel-all-dns disable&lt;BR /&gt;group-policy Full-Tunnel internal&lt;BR /&gt;group-policy Full-Tunnel attributes&lt;BR /&gt;banner value&lt;BR /&gt;banner value *** ALL ACTIVITIES ARE MONITORED ***&lt;BR /&gt;banner value&lt;BR /&gt;banner value By accessing this system, you are consenting to system monitoring for law enforcement purposes.&lt;BR /&gt;banner value Unauthorized access or illegal use may subject you to criminal prosecution and penalties.&lt;BR /&gt;dns-server value 192.168.1.199 192.168.1.1&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value team.com&lt;BR /&gt;split-tunnel-all-dns enable&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username test password $sha512$5000$5KC8R8JyRSDkbQ/D5WycnA==$ZnyBQ3acSODZHMaoJaPcqA== pbkdf2&lt;BR /&gt;username dean password $sha512$5000$zvtKT4f7tUtxBMTOVxMCMA==$qSb2qEcGRmlPlQK/JwybNA== pbkdf2 privilege 15&lt;BR /&gt;username caroline password $sha512$5000$yauY+3ak/ljS968jB63Iow==$4KZfuKamgb2G5miBJsV0pw== pbkdf2&lt;BR /&gt;username caroline attributes&lt;BR /&gt;vpn-group-policy Split-Tunnel&lt;BR /&gt;group-lock value Split-Tunnel&lt;BR /&gt;service-type remote-access&lt;BR /&gt;username soumare password $sha512$5000$/7gS0pOKOMcBF4U5pdVduA==$UHrxncZHtyWQUkSj7eEPnw== pbkdf2&lt;BR /&gt;username soumare attributes&lt;BR /&gt;vpn-group-policy Split-Tunnel&lt;BR /&gt;group-lock value Split-Tunnel&lt;BR /&gt;service-type remote-access&lt;BR /&gt;tunnel-group Full-Tunnel type remote-access&lt;BR /&gt;tunnel-group Full-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Full-Tunnel&lt;BR /&gt;tunnel-group Full-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Full-Tunnel enable&lt;BR /&gt;tunnel-group Split-Tunnel type remote-access&lt;BR /&gt;tunnel-group Split-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Split-Tunnel&lt;BR /&gt;tunnel-group Split-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Split-Tunnel enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:2510f5b2df94a33bc9823f264ec9fa27&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 02:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127052#M1072391</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-29T02:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127128#M1072403</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I imagine your traffic from 10.10.50.0/24 network is being natted by the dynamic NAT rule under the object ASA-SERVERS. If you don't want to NAT this traffic, create a NAT exemption rule (this will work in both directions). Example:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;nat (ASA-SERVERS,WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 07:11:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127128#M1072403</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-29T07:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127393#M1072418</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I went ahead and implemented the rule. Now I have the opposite problem. I am able to PING a host sitting on 10.10.50.0/24 network from the 192.168.1.0/24. However, if I get on a system that is sitting on the 10.10.50.0/24 and try to access something sitting behind the 192.168.1.0/24 I get nothing back. Cannot access the internet or reach stuff sitting behind 192.168.1.0/24 network.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 14:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127393#M1072418</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-29T14:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127438#M1072420</link>
      <description>Provide the output of "show nat detail"&lt;BR /&gt;&lt;BR /&gt;Run packet-tracer from the CLI and provide the output for review.&lt;BR /&gt;&lt;BR /&gt;Is that your full configuration you provide, it appears to be missing configuration. Ensure you are inspecting ICMP, use the command "fixup protocol icmp".</description>
      <pubDate>Wed, 29 Jul 2020 15:22:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127438#M1072420</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-29T15:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127489#M1072423</link>
      <description>&lt;P&gt;STORM-ASA(config)# show nat detail&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (WAN) to (WAN) source static Verizon-Router Verizon-Router dns no-proxy-arp route-looku p&lt;BR /&gt;translate_hits = 0, untranslate_hits = 1&lt;BR /&gt;Source - Origin: 192.168.1.1/32, Translated: 192.168.1.1/32&lt;BR /&gt;2 (WAN) to (WAN) source dynamic VPN-Pool-Subnet interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.30.100-10.10.30.120, Translated: 192.168.1.11/24&lt;BR /&gt;3 (LAN) to (LAN) source dynamic NAT_10.10.20.0_24 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.20.0/24, Translated: 10.10.20.254/24&lt;BR /&gt;4 (ASA-SERVERS) to (WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 128, untranslate_hits = 542&lt;BR /&gt;Source - Origin: 10.10.50.0/24, Translated: 10.10.50.0/24&lt;BR /&gt;Destination - Origin: 192.168.1.0/24, Translated: 192.168.1.0/24&lt;BR /&gt;5 (WAN) to (WAN) source static all all destination static Verizon-LAN-Subnet Verizon-LAN- Subnet no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.20.0/24, Translated: 10.10.20.0/24&lt;BR /&gt;Destination - Origin: 192.168.1.0/24, Translated: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (WAN) to (WAN) source dynamic NAT_VPN_Subnet interface dns&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.30.100-10.10.30.120, Translated: 192.168.1.11/24&lt;BR /&gt;2 (LAN) to (WAN) source dynamic all interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.20.0/24, Translated: 192.168.1.11/24&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;________________&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;STORM-ASA(config)# packet-tracer input ASA-SERVERS tcp 10.10.50.101 1024 192.1$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 192.168.1.105 using egress ifc WAN&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (ASA-SERVERS,WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface WAN&lt;BR /&gt;Untranslate 192.168.1.105/8834 to 192.168.1.105/8834&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group ASA-VOICE_access_in in interface ASA-SERVERS&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit object-group DM_INLINE_SERVICE_5 any any&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;service-object ip&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (ASA-SERVERS,WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.10.50.101/1024 to 10.10.50.101/1024&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (ASA-SERVERS,WAN) source static ASA-SERVERS-Subnet ASA-SERVERS-Subnet destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp route-lookup&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 22683, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: ASA-SERVERS&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: WAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;&lt;BR /&gt;________________________&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ICMP inspection disabled.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127489#M1072423</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-29T16:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127500#M1072426</link>
      <description>Modify your WAN_access_in_1 and permit echo-reply or enabled icmp inspection</description>
      <pubDate>Wed, 29 Jul 2020 16:19:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127500#M1072426</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-29T16:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127511#M1072427</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thats already in place and I still cannot ping or contact any resources on the 192.168.1.0/24 networks from the 10.10.50.0/24 subnet.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 16:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127511#M1072427</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-29T16:32:58Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127534#M1072430</link>
      <description>Judging by the output of your packet-tracer you've changed your configuration since your initial post, provide the latest.&lt;BR /&gt;&lt;BR /&gt;Regardless, it traffic appears to be matching the new NAT exemption rule and permitted on the ASA. Is there a local firewall on the destination blocking traffic?&lt;BR /&gt;&lt;BR /&gt;Take a packet capture on the WAN interface to determine whether there is a response.</description>
      <pubDate>Wed, 29 Jul 2020 16:55:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127534#M1072430</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-29T16:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Access Subnet Behind Double NAT</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127679#M1072434</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the latest config. I am still unable to touch any endpoints on the 192.168.1.0/24 network when trying to connect from the 10.10.50.0/24 network.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;STORM-ASA(config)# show running-config&lt;BR /&gt;: Saved&lt;/P&gt;&lt;P&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.8(4)20&lt;BR /&gt;!&lt;BR /&gt;hostname STORM-ASA&lt;BR /&gt;enable password $sha512$5000$7ZaTdAvDGSHnxGI7mjSN==$PNDCijQdIqDQ+MKPCng4gQ== pbkdf2&lt;BR /&gt;fips enable&lt;BR /&gt;names&lt;BR /&gt;no mac-address auto&lt;BR /&gt;ip local pool VPN_POOL 10.10.30.100-10.10.30.120 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif WAN&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif LAN&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.20.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif ASA-TRUNK-OUT&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.50&lt;BR /&gt;vlan 50&lt;BR /&gt;nameif ASA-SERVERS&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.50.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3.60&lt;BR /&gt;vlan 60&lt;BR /&gt;nameif ASA-UC&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.60.100 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;shutdown&lt;BR /&gt;nameif Management&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;banner exec UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner exec&lt;BR /&gt;banner exec All activities performed on this device are logged and monitored.&lt;BR /&gt;banner login UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner login&lt;BR /&gt;banner login You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner login&lt;BR /&gt;banner login Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner login&lt;BR /&gt;banner login All activities performed on this device are logged and monitored.&lt;BR /&gt;banner motd UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner motd&lt;BR /&gt;banner motd All activities performed on this device are logged and monitored.&lt;BR /&gt;banner asdm UNAUTHORIZED ACCESS TO THIS DEVICE IS PROHIBITED&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm You must have explicit, authorized permission to access or configure this device.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm Unauthorized attempts and actions to access or use this system may result in civil and/or criminal penalties.&lt;BR /&gt;banner asdm&lt;BR /&gt;banner asdm All activities performed on this device are logged and monitored.&lt;BR /&gt;boot system disk0:/asa984-20-lfbff-k8.SPA&lt;BR /&gt;no ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns domain-lookup WAN&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.1.1&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network NAT_10.10.20.0_24&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network VPN-Pool-Subnet&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NETWORK_OBJ_10.10.30.96_27&lt;BR /&gt;subnet 10.10.30.96 255.255.255.224&lt;BR /&gt;object network Verizon-Router&lt;BR /&gt;host 192.168.1.1&lt;BR /&gt;object network VPN_Scope_Default_Gateway&lt;BR /&gt;host 10.10.30.1&lt;BR /&gt;object network NAT_VPN_Subnet&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network Verizon-LAN-Subnet&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NAT_WAN_to_LAN&lt;BR /&gt;range 10.10.30.100 10.10.30.120&lt;BR /&gt;object network NAT_LAN_to_WAN&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network all&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network vCenter-Server&lt;BR /&gt;host 192.168.1.200&lt;BR /&gt;description vCenter&lt;BR /&gt;object network Tenable-Nessus-Server&lt;BR /&gt;host 192.168.1.105&lt;BR /&gt;object service Nessus_Port&lt;BR /&gt;service tcp destination eq 8834&lt;BR /&gt;object service 8443&lt;BR /&gt;service tcp destination eq 8443&lt;BR /&gt;object service Appliance_Management_Interface&lt;BR /&gt;service tcp destination eq 5480&lt;BR /&gt;object service Remote_Access_Console&lt;BR /&gt;service tcp destination eq 903&lt;BR /&gt;object service vCenter_Remote_Access_Console&lt;BR /&gt;service tcp destination eq 903&lt;BR /&gt;object network ASA-LAN-Subnet&lt;BR /&gt;subnet 10.10.20.0 255.255.255.0&lt;BR /&gt;object network STORM-FILESHARE&lt;BR /&gt;host 192.168.1.123&lt;BR /&gt;object network Blue-Diamond&lt;BR /&gt;host 192.168.1.153&lt;BR /&gt;object network Cisco-ASA&lt;BR /&gt;host 192.168.1.11&lt;BR /&gt;description Cisco-ASA&lt;BR /&gt;object network Nessus-Server&lt;BR /&gt;host 192.168.1.105&lt;BR /&gt;object network ASA-SERVERS&lt;BR /&gt;range 10.10.50.100 10.10.50.254&lt;BR /&gt;description ASA-SERVERS&lt;BR /&gt;object network ASA-SERVERS-Subnet&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;description ASA-SERVERS-Subnet&lt;BR /&gt;object network 10.10.50.100&lt;BR /&gt;host 10.10.50.100&lt;BR /&gt;object network 10.10.50.101&lt;BR /&gt;host 10.10.50.101&lt;BR /&gt;object-group network Dell_Workstation&lt;BR /&gt;network-object host 10.10.20.100&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object ip&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object tcp-udp destination eq domain&lt;BR /&gt;object-group service SMB_Ports&lt;BR /&gt;service-object tcp-udp destination eq 139&lt;BR /&gt;service-object tcp-udp destination eq 445&lt;BR /&gt;object-group network LAN_NETWORK&lt;BR /&gt;network-object object ASA-LAN-Subnet&lt;BR /&gt;object-group service ICMP_Allow&lt;BR /&gt;service-object icmp&lt;BR /&gt;service-object icmp alternate-address&lt;BR /&gt;service-object icmp conversion-error&lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp information-reply&lt;BR /&gt;service-object icmp information-request&lt;BR /&gt;service-object icmp mask-reply&lt;BR /&gt;service-object icmp mask-request&lt;BR /&gt;service-object icmp mobile-redirect&lt;BR /&gt;service-object icmp parameter-problem&lt;BR /&gt;service-object icmp redirect&lt;BR /&gt;service-object icmp router-advertisement&lt;BR /&gt;service-object icmp router-solicitation&lt;BR /&gt;service-object icmp source-quench&lt;BR /&gt;service-object icmp time-exceeded&lt;BR /&gt;service-object icmp timestamp-reply&lt;BR /&gt;service-object icmp timestamp-request&lt;BR /&gt;service-object icmp traceroute&lt;BR /&gt;service-object icmp unreachable&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;service-object tcp-udp&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;group-object SMB_Ports&lt;BR /&gt;object-group network 10.10.20.0&lt;BR /&gt;network-object object ASA-LAN-Subnet&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object Verizon-LAN-Subnet&lt;BR /&gt;network-object object Verizon-Router&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object object Verizon-LAN-Subnet&lt;BR /&gt;network-object object Verizon-Router&lt;BR /&gt;object-group service vCenter_Ports&lt;BR /&gt;service-object object Appliance_Management_Interface&lt;BR /&gt;service-object tcp-udp destination eq 902&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;service-object object vCenter_Remote_Access_Console&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;protocol-object ip&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;protocol-object udp&lt;BR /&gt;protocol-object tcp&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;service-object tcp-udp&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;group-object SMB_Ports&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;service-object tcp destination eq ssh&lt;BR /&gt;object-group service Nessus tcp&lt;BR /&gt;port-object eq 8834&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;service-object ip&lt;BR /&gt;group-object ICMP_Allow&lt;BR /&gt;service-object tcp destination eq ssh&lt;BR /&gt;access-list LAN_access_in extended permit object-group DM_INLINE_SERVICE_1 object-group Dell_Workstation any&lt;BR /&gt;access-list LAN_access_in extended deny ip any any&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list WAN_access_in_1 remark This allows users behind the Verizon router to PING node residing on the ASA-SERVERS subnet.&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group ICMP_Allow object Verizon-Router object ASA-SERVERS-Subnet&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group vCenter_Ports object VPN-Pool-Subnet object vCenter-Server&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group DM_INLINE_SERVICE_2 object Verizon-LAN-Subnet object VPN-Pool-Subnet&lt;BR /&gt;access-list WAN_access_in_1 extended permit object-group DM_INLINE_SERVICE_3 object VPN-Pool-Subnet object Verizon-LAN-Subnet&lt;BR /&gt;access-list WAN_access_in_1 remark NTP Allow&lt;BR /&gt;access-list WAN_access_in_1 extended permit udp object Cisco-ASA any eq ntp&lt;BR /&gt;access-list WAN_access_in_1 extended deny object-group DM_INLINE_PROTOCOL_1 any any&lt;BR /&gt;access-list Split-Tunnel standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.200&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.123&lt;BR /&gt;access-list Split-Tunnel standard permit host 192.168.1.153&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit object-group DM_INLINE_SERVICE_4 object ASA-SERVERS-Subnet object Verizon-LAN-Subnet inactive&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit tcp object ASA-SERVERS-Subnet object Nessus-Server object-group Nessus inactive&lt;BR /&gt;access-list ASA-VOICE_access_in extended permit object-group DM_INLINE_SERVICE_5 any any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu WAN 1406&lt;BR /&gt;mtu LAN 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;mtu ASA-TRUNK-OUT 1500&lt;BR /&gt;mtu ASA-SERVERS 1500&lt;BR /&gt;mtu ASA-UC 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7131.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (WAN,WAN) source static Verizon-Router Verizon-Router dns no-proxy-arp route-lookup&lt;BR /&gt;nat (WAN,WAN) source dynamic VPN-Pool-Subnet interface&lt;BR /&gt;nat (LAN,LAN) source dynamic NAT_10.10.20.0_24 interface&lt;BR /&gt;nat (WAN,WAN) source static all all destination static Verizon-LAN-Subnet Verizon-LAN-Subnet no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network NAT_VPN_Subnet&lt;BR /&gt;nat (WAN,WAN) dynamic interface dns&lt;BR /&gt;object network all&lt;BR /&gt;nat (LAN,WAN) dynamic interface&lt;BR /&gt;access-group WAN_access_in_1 in interface WAN&lt;BR /&gt;access-group LAN_access_in in interface LAN&lt;BR /&gt;access-group ASA-VOICE_access_in in interface ASA-SERVERS&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;route LAN 10.10.30.0 255.255.255.0 10.10.30.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no user-identity inactive-user-timer&lt;BR /&gt;aaa authentication serial console LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa local authentication attempts max-fail 10&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 LAN&lt;BR /&gt;http 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2&lt;BR /&gt;keypair ASDM_TrustPoint2&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint2-1&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2&lt;BR /&gt;certificate 2ab486533a6a5fa6dbf5fc5c&lt;BR /&gt;30820665 3082054d a0030201 02020c2a b486533a 6a5fa6db f5fc5c30 0d06092a&lt;BR /&gt;864886f7 0d01010b 0500304c 310b3009 06035504 06130242 45311930 17060355&lt;BR /&gt;040a1310 476c6f62 616c5369 676e206e 762d7361 31223020 06035504 03131941&lt;BR /&gt;6c706861 53534c20 4341202d 20534841 32353620 2d204732 301e170d 31393039&lt;BR /&gt;30383233 33323030 5a170d32 31303930 38323333 3230305a 303e3121 301f0603&lt;BR /&gt;55040b13 18446f6d 61696e20 436f6e74 726f6c20 56616c69 64617465 64311930&lt;BR /&gt;17060355 04030c10 2a2e7374 6f726d72 756e6e65 722e7573 30820122 300d0609&lt;BR /&gt;2a864886 f70d0101 01050003 82010f00 3082010a 02820101 00a8e414 f6a9b1b1&lt;BR /&gt;e3e12503 6b1837d1 ced7caf6 c19b2bfc 5974f2ad dda646cf f514ed09 65a2b42c&lt;BR /&gt;907d41d2 fd02a301 4f78f198 f7b156bb e14fd8f1 d4edd46f 89385f6f 323f3858&lt;BR /&gt;1adfb86e 6999b6a8 b7ed7c0e 7431c0ad 72c20152 40e33adb 5ee265f8 a0d868fc&lt;BR /&gt;dd0aba0b 94464a54 7ac6440f b3fa2640 30f12431 a185fb3c 659a9f87 aefc76c3&lt;BR /&gt;0f63708e cbb5c000 54296d6b d84259c5 4d2caeaf 406cb976 f1b8245f 90eb6af1&lt;BR /&gt;d840c333 53b6dc49 4c1a646a d3e5fa28 d55c7ef3 2e3a7b9b 529e6304 7d273adf&lt;BR /&gt;82538ac8 81711881 db4786cc 8d05e434 1874a21f 4875b863 c770cdb8 99ee8cd0&lt;BR /&gt;567bd9db cbf6ef99 77066207 1b27d3c1 f79860e3 50920b53 f3020301 0001a382&lt;BR /&gt;03533082 034f300e 0603551d 0f0101ff 04040302 05a03081 8906082b 06010505&lt;BR /&gt;07010104 7d307b30 4206082b 06010505 07300286 36687474 703a2f2f 73656375&lt;BR /&gt;7265322e 616c7068 6173736c 2e636f6d 2f636163 6572742f 6773616c 70686173&lt;BR /&gt;68613267 3272312e 63727430 3506082b 06010505 07300186 29687474 703a2f2f&lt;BR /&gt;6f637370 322e676c 6f62616c 7369676e 2e636f6d 2f677361 6c706861 73686132&lt;BR /&gt;67323057 0603551d 20045030 4e304206 0a2b0601 0401a032 010a0a30 34303206&lt;BR /&gt;082b0601 05050702 01162668 74747073 3a2f2f77 77772e67 6c6f6261 6c736967&lt;BR /&gt;6e2e636f 6d2f7265 706f7369 746f7279 2f300806 0667810c 01020130 09060355&lt;BR /&gt;1d130402 3000303e 0603551d 1f043730 353033a0 31a02f86 2d687474 703a2f2f&lt;BR /&gt;63726c32 2e616c70 68617373 6c2e636f 6d2f6773 2f677361 6c706861 73686132&lt;BR /&gt;67322e63 726c302b 0603551d 11042430 2282102a 2e73746f 726d7275 6e6e6572&lt;BR /&gt;2e757382 0e73746f 726d7275 6e6e6572 2e757330 1d060355 1d250416 30140608&lt;BR /&gt;2b060105 05070301 06082b06 01050507 0302301f 0603551d 23041830 168014f5&lt;BR /&gt;cdd53c08 50f96a4f 3ab797da 5683e669 d268f730 1d060355 1d0e0416 04141ed9&lt;BR /&gt;37376689 30fee45b bf912738 90823c92 02ac3082 017f060a 2b060104 01d67902&lt;BR /&gt;04020482 016f0482 016b0169 007600bb d9dfbc1f 8a71b593 942397aa 927b4738&lt;BR /&gt;57950aab 52e81a90 9664368e 1ed18500 00016d13 38592000 00040300 47304502&lt;BR /&gt;21009215 79de6d5e 8006cb14 8cec41d8 8f429971 6e1d67e6 3326ff6a 0552850e&lt;BR /&gt;d0980220 0b3df1fb c7dff338 1c0563fe 3c5c5f10 d29c74bc bcd44355 560e717d&lt;BR /&gt;50ed4b24 0076005c dc4392fe e6ab4544 b15e9ad4 56e61037 fbd5fa47 dca17394&lt;BR /&gt;b25ee6f6 c70eca00 00016d13 38586400 00040300 47304502 203fbe97 6d26fa4e&lt;BR /&gt;0ee692a8 214b9af1 8ccbd744 5c979ab3 c3930b20 2662efac 60022100 c27616f9&lt;BR /&gt;0eef5338 720b5540 f969afa6 a78d5658 78cbbc4c b97cecd8 f38ca9b6 0077006f&lt;BR /&gt;5376ac31 f03119d8 9900a451 15ff7715 1c11d902 c1002906 8db2089a 37d91300&lt;BR /&gt;00016d13 38598700 00040300 48304602 2100fd64 0c4921ec 7ea72d30 4239dad0&lt;BR /&gt;5461eed8 501e40cc f5f807e5 eb3334bc aa800221 00f382de 1b664f73 a72bae38&lt;BR /&gt;c109cca7 43b0fab4 393cc69f 0f5ab92d e823d2d8 02300d06 092a8648 86f70d01&lt;BR /&gt;010b0500 03820101 00c7c6fe 86ace53c ee3e7fad 5ec6d1ec ebbce65f dabd0940&lt;BR /&gt;91b54602 f126e359 ef32dd17 eb074f00 f6c70d13 c26b2ab3 9c26e368 32007f91&lt;BR /&gt;86cb0e89 6ca4ea1c c460c1d4 924ee219 6472c69a cc95c37b 8fd632d9 f8e413b4&lt;BR /&gt;14a4d625 b3aeb9e5 3ab0b794 21650de2 e1ee9232 f9bef362 c6a04e66 7dc13c2f&lt;BR /&gt;09777213 cbac5c67 5b955c5a 96099e79 f72c732d 3ac5e424 2842aeba 1d5b183b&lt;BR /&gt;891fd546 6709e73c a67e5290 e290e5e9 fca5595c 0ff7f183 c8813b75 fb205260&lt;BR /&gt;2ac1fa12 f1f37213 b33c713f 0d33bfb1 6e09eac7 b4c0f51d 7c5d2388 84e62216&lt;BR /&gt;b33fde19 0771a721 afe46c27 2e62968a 1bcdba5a 043e8bad 72b99a4a a3ec5234&lt;BR /&gt;61e105ca 6e621058 d2&lt;BR /&gt;quit&lt;BR /&gt;certificate ca 040000000001444ef03631&lt;BR /&gt;3082044d 30820335 a0030201 02020b04 00000000 01444ef0 3631300d 06092a86&lt;BR /&gt;4886f70d 01010b05 00305731 0b300906 03550406 13024245 31193017 06035504&lt;BR /&gt;0a131047 6c6f6261 6c536967 6e206e76 2d736131 10300e06 0355040b 1307526f&lt;BR /&gt;6f742043 41311b30 19060355 04031312 476c6f62 616c5369 676e2052 6f6f7420&lt;BR /&gt;4341301e 170d3134 30323230 31303030 30305a17 0d323430 32323031 30303030&lt;BR /&gt;305a304c 310b3009 06035504 06130242 45311930 17060355 040a1310 476c6f62&lt;BR /&gt;616c5369 676e206e 762d7361 31223020 06035504 03131941 6c706861 53534c20&lt;BR /&gt;4341202d 20534841 32353620 2d204732 30820122 300d0609 2a864886 f70d0101&lt;BR /&gt;01050003 82010f00 3082010a 02820101 00da01ec e4ec7360 fb7e8f6a b7c617e3&lt;BR /&gt;926432d4 ac00d9a2 0fb9edee 6b8a86ca 9267d974 d75d4702 3c8f40d6 9e6d14cd&lt;BR /&gt;c3da2939 a70f050a 68a2661a 1ec4b28b 7658e5ab 5d1d8f40 b3398bef 1e837d22&lt;BR /&gt;d0e3a900 2eec53cf 62198544 284cc027 cb7b0eec 10640010 a405cca0 72be416c&lt;BR /&gt;315b48e4 b1ecb923 eb554dd0 7d624aa5 b4a5a459 85c52591 a6fea609 9f06106d&lt;BR /&gt;8f810c64 405e7300 9ae02e65 98541000 7098c8e1 ed345fd8 9cc70dc0 d6235945&lt;BR /&gt;fcfe557a 86ee9460 22f1aed1 e65546f6 99c51b08 745facb0 64848f89 381ca1a7&lt;BR /&gt;90214f02 6ebde061 67d4f842 870f0af7 c9046d2a a92fef42 a5dfdda3 53db981e&lt;BR /&gt;81f99a72 7b5ade4f 3e7fa258 a0e217ad 67020301 0001a382 01233082 011f300e&lt;BR /&gt;0603551d 0f0101ff 04040302 01063012 0603551d 130101ff 04083006 0101ff02&lt;BR /&gt;0100301d 0603551d 0e041604 14f5cdd5 3c0850f9 6a4f3ab7 97da5683 e669d268&lt;BR /&gt;f7304506 03551d20 043e303c 303a0604 551d2000 30323030 06082b06 01050507&lt;BR /&gt;02011624 68747470 733a2f2f 7777772e 616c7068 6173736c 2e636f6d 2f726570&lt;BR /&gt;6f736974 6f72792f 30330603 55155f04 2c302a30 28a026a0 24862268 7474703a&lt;BR /&gt;2f2f6372 6c2e676c 6f62616c 7369676e 2e6e6574 2f726f6f 742e6372 6c303d06&lt;BR /&gt;082b0601 05050701 01043130 2f302d06 082b0601 05050730 01862168 7474703a&lt;BR /&gt;2f2f6f63 73702e67 6c6f6261 6c736967 6e2e636f 6d2f726f 6f747231 301f0603&lt;BR /&gt;551d2304 18301680 14607b66 1a450d97 ca89502f 7d04cd34 a8fffcfd 4b300d06&lt;BR /&gt;092a8648 86f70d01 010b0500 03820101 00604068 1647e716 8ddb5ca1 562acbf4&lt;BR /&gt;5c9bb01e a24bf5cb 023ff80b a1f2a742 d4b74ceb e36680f3 2543782e 1b175607&lt;BR /&gt;5218cbd1 a8ece6fb 733ea462 8c80b4d2 c51273a3 d3fa0238 be633d84 b899c1f1&lt;BR /&gt;baf79fc3 40d15818 53c162dd af18427f 344ec543 d571b030 00c7e390 ae3f5786&lt;BR /&gt;97ceea0c 128e2270 e366a754 7f2e28cb d454d0b3 1e626708 f927e1cb e366b824&lt;BR /&gt;1b896a89 4465f2d9 4cd2581c 8c4ec095 a1d4ef67 2f3820e8 2eff9651 f0bad83d&lt;BR /&gt;92704765 1c9e7372 b4600c5c e2d17376 e0af4ee2 e537a545 2f8a233e 87c730e6&lt;BR /&gt;31387cf4 dd52caf3 53042557 566694e8 0beee603 144eeefd 6d94649e 5ece79d4&lt;BR /&gt;b2a6cf40 b144a83e 87195ee9 f8211659 53&lt;BR /&gt;quit&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint2-1&lt;BR /&gt;certificate ca 040000000001154b5ac394&lt;BR /&gt;30820375 3082025d a0030201 02020b04 00000000 01154b5a c394300d 06092a86&lt;BR /&gt;4886f70d 01010505 00305731 0b300906 03550406 13024245 31193017 06035504&lt;BR /&gt;0a131047 6c6f6261 6c536967 6e206e76 2d736131 10300e06 0355040b 1307526f&lt;BR /&gt;6f742043 41311b30 19060355 04031312 476c6f62 616c5369 676e2052 6f6f7420&lt;BR /&gt;4341301e 170d3938 30393031 31323030 30305a17 0d323830 31323831 32303030&lt;BR /&gt;305a3057 310b3009 06035504 06130242 45311930 17060355 040a1310 476c6f62&lt;BR /&gt;616c5369 676e206e 762d7361 3110300e 06035504 0b130752 6f6f7420 4341311b&lt;BR /&gt;30190603 55040313 12476c6f 62616c53 69676e20 526f6f74 20434130 82012230&lt;BR /&gt;0d06092a 864886f7 0d010101 05000382 010f0030 82010a02 82010100 da0ee699&lt;BR /&gt;8dcea3e3 4f8a7efb f18b8325 6bea481f f12ab0b9 951104bd f063d1e2 6766cf1c&lt;BR /&gt;ddcf1b48 2bee8d89 8e9aaf29 8065abe9 c72d12cb ab1c4c70 07a13d0a 30cd158d&lt;BR /&gt;4ff8ddd4 8c50151c ef50eec4 2ef7fce9 52f2917d e06dd535 308e5e43 73f241e9&lt;BR /&gt;d56ae3b2 893a5639 386f063c 88695b2a 4dc5a754 b86c89cc 9bf93cca e5fd89f5&lt;BR /&gt;123c9278 96d6dc74 6e934461 d18dc746 b2750e86 e8198ad5 6d6cd578 1695a2e9&lt;BR /&gt;c80a38eb f224134f 73549313 853a1bbc 1e34b58b 058cb977 8bb1db1f 2091ab09&lt;BR /&gt;536e90ce 7b3774b9 70479122 51631679 aeb1ae41 2608c819 2bd146aa 48d6642a&lt;BR /&gt;d78334ff 2c2ac16c 19434a07 85e7d37c f62168ef eaf2529f 7f9390cf 02030100&lt;BR /&gt;01a34230 40300e06 03551d0f 0101ff04 04030201 06300f06 03551d13 0101ff04&lt;BR /&gt;05300301 01ff301d 0603551d 0e041604 14607b66 1a450d97 ca89502f 7d04cd34&lt;BR /&gt;a8fffcfd 4b300d06 092a8648 86f70d01 01050500 03820101 00d673e7 7c4f76d0&lt;BR /&gt;8dbfecba a2be34c5 2832b57c fc6c9c2c 2bbd099e 53bf6b5e aa1148b6 e508a3b3&lt;BR /&gt;ca3d614d d34609b3 3ec3a0e3 63551bf2 baefad39 e143b938 a3e62f8a 263befa0&lt;BR /&gt;5056f9c6 0afd38cd c40b7051 94979804 dfc35f94 d515c914 419cc45d 7564150d&lt;BR /&gt;ff5530ec 868fff0d ef2cb963 46f6aafc dfbc69fd 2e124864 9ae095f0 a6ef298f&lt;BR /&gt;01b115b5 0c1da5fe 692c6924 781eb3a7 1c7162ee cac897ac 175d8ac2 f847866e&lt;BR /&gt;2ac45631 95d06789 852bf96c a65d469d 0caa82e4 9951dd70 b7db563d 61e46ae1&lt;BR /&gt;5cd6f6fe 3dde41cc 07ae6352 bf5353f4 2be9c7fd b6f7825f 85d24118 db81b304&lt;BR /&gt;1cc51fa4 806f1520 c9de0c88 0a1dd666 55e2fc48 c9292669 e0&lt;BR /&gt;quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;ssh 10.10.20.100 255.255.255.255 LAN&lt;BR /&gt;ssh timeout 45&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption fips&lt;BR /&gt;ssh cipher integrity fips&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;no ipv6-vpn-addr-assign aaa&lt;BR /&gt;no ipv6-vpn-addr-assign local&lt;/P&gt;&lt;P&gt;dhcp-client client-id interface Management&lt;BR /&gt;dhcpd address 10.10.20.100-10.10.20.250 LAN&lt;BR /&gt;dhcpd dns 192.168.1.1 interface LAN&lt;BR /&gt;dhcpd lease 1500 interface LAN&lt;BR /&gt;dhcpd enable LAN&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.50.101-10.10.50.254 ASA-SERVERS&lt;BR /&gt;dhcpd dns 192.168.1.1 interface ASA-SERVERS&lt;BR /&gt;dhcpd enable ASA-SERVERS&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.10.60.101-10.10.60.254 ASA-UC&lt;BR /&gt;dhcpd dns 192.168.1.1 interface ASA-UC&lt;BR /&gt;dhcpd enable ASA-UC&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 129.6.15.28 source WAN prefer&lt;BR /&gt;ssl server-version tlsv1.2&lt;BR /&gt;ssl client-version tlsv1.2&lt;BR /&gt;ssl cipher tlsv1.2 custom "DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:AES256-SHA:AES128-SHA"&lt;BR /&gt;ssl dh-group group14&lt;BR /&gt;ssl ecdh-group group21&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 WAN&lt;BR /&gt;ssl trust-point ASDM_TrustPoint2 LAN&lt;BR /&gt;webvpn&lt;BR /&gt;port 8443&lt;BR /&gt;enable WAN&lt;BR /&gt;enable LAN&lt;BR /&gt;dtls port 8443&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.8.03052-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.8.03052-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.8.03052-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-clientless&lt;BR /&gt;group-policy Split-Tunnel internal&lt;BR /&gt;group-policy Split-Tunnel attributes&lt;BR /&gt;banner value&lt;BR /&gt;banner value *** ALL ACTIVITIES ARE MONITORED ***&lt;BR /&gt;banner value&lt;BR /&gt;banner value By accessing this system, you are consenting to system monitoring for law enforcement purposes.&lt;BR /&gt;banner value Unauthorized access or illegal use may subject you to criminal prosecution and penalties.&lt;BR /&gt;dns-server value 192.168.1.199&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Split-Tunnel&lt;BR /&gt;default-domain value nextblueteam.com&lt;BR /&gt;split-dns value nextblueteam.com storm.us&lt;BR /&gt;split-tunnel-all-dns disable&lt;BR /&gt;group-policy Full-Tunnel internal&lt;BR /&gt;group-policy Full-Tunnel attributes&lt;BR /&gt;banner value&lt;BR /&gt;banner value *** ALL ACTIVITIES ARE MONITORED ***&lt;BR /&gt;banner value&lt;BR /&gt;banner value By accessing this system, you are consenting to system monitoring for law enforcement purposes.&lt;BR /&gt;banner value Unauthorized access or illegal use may subject you to criminal prosecution and penalties.&lt;BR /&gt;dns-server value 192.168.1.199 192.168.1.1&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value nextblueteam.com&lt;BR /&gt;split-tunnel-all-dns enable&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username test password $sha512$5000$5KC8R8JyRSDkbQ/D5WycnA==$ZnyBQ3acSODZHMaoJaPcqA== pbkdf2&lt;BR /&gt;username dean password $sha512$5000$zvtKT4f7tUtxBMTOVxMCMA==$qSb2qEcGRmlPlQK/JwybNA== pbkdf2 privilege 15&lt;BR /&gt;username caroline password $sha512$5000$yauY+3ak/ljS968jB63Iow==$4KZfuKamgb2G5miBJsV0pw== pbkdf2&lt;BR /&gt;username caroline attributes&lt;BR /&gt;vpn-group-policy Split-Tunnel&lt;BR /&gt;group-lock value Split-Tunnel&lt;BR /&gt;service-type remote-access&lt;BR /&gt;username soumare password $sha512$5000$/7gS0pOKOMcBF4U5pdVduA==$UHrxncZHtyWQUkSj7eEPnw== pbkdf2&lt;BR /&gt;username soumare attributes&lt;BR /&gt;vpn-group-policy Split-Tunnel&lt;BR /&gt;group-lock value Split-Tunnel&lt;BR /&gt;service-type remote-access&lt;BR /&gt;tunnel-group Full-Tunnel type remote-access&lt;BR /&gt;tunnel-group Full-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Full-Tunnel&lt;BR /&gt;tunnel-group Full-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Full-Tunnel enable&lt;BR /&gt;tunnel-group Split-Tunnel type remote-access&lt;BR /&gt;tunnel-group Split-Tunnel general-attributes&lt;BR /&gt;address-pool VPN_POOL&lt;BR /&gt;default-group-policy Split-Tunnel&lt;BR /&gt;tunnel-group Split-Tunnel webvpn-attributes&lt;BR /&gt;group-alias Split-Tunnel enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:661850ed6b80c13352cd37898d0091fe&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 21:12:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-access-subnet-behind-double-nat/m-p/4127679#M1072434</guid>
      <dc:creator>dj0321</dc:creator>
      <dc:date>2020-07-29T21:12:45Z</dc:date>
    </item>
  </channel>
</rss>

