<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco switch 3560 cannot get internet from ASA 5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718918#M1094964</link>
    <description>&lt;P&gt;Thank you so much. Admin just removed me from spam&lt;/P&gt;</description>
    <pubDate>Wed, 09 Nov 2022 20:29:58 GMT</pubDate>
    <dc:creator>phugiay</dc:creator>
    <dc:date>2022-11-09T20:29:58Z</dc:date>
    <item>
      <title>Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718129#M1094873</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;I am new for Cisco and try to set a new ASA 5505 and switch 3560. I can make the internet work from my Comcast to ASA 5505 to my laptop with DHCP from ASA. However, my switch cannot get to the internet from ASA. From switch, I can ping the ip port from ASA and also from ASA but no internet. The switch gets the DHCP from Windows server with VLAN10 and the port that connect to ASA is VLAN 20. I want to make sure it works before I can do other configuration. Thank you for all your help&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2022 19:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718129#M1094873</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-29T19:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718146#M1094875</link>
      <description>&lt;P&gt;You have not provided the some information - to get clarity&lt;/P&gt;
&lt;P&gt;when you connected the laptop ( what interface you connected on ASA, what IP address you used on the laptop)&lt;/P&gt;
&lt;P&gt;after testing- what port was ASA used to connect to switch?&lt;/P&gt;
&lt;P&gt;some reference :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/int5505.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 18:45:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718146#M1094875</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-11-08T18:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718191#M1094878</link>
      <description>&lt;P&gt;Hi Bandi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for quick response. I use Vlan15 from port 3&amp;nbsp; when I connect from ASA to my laptop. They get the DHCP from ASA and I can get to internet without any problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;------ASA-----&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Ethernet0/3&amp;nbsp; &amp;nbsp; &amp;nbsp;-&amp;gt;&amp;nbsp; port connect to switch&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport access vlan 15&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Vlan15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif VPHAM&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 172.168.10.1 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;dhcpd address 172.168.10.100-172.168.10.100 VPHAM&lt;BR /&gt;dhcpd dns 8.8.8.8 interface VPHAM&lt;BR /&gt;dhcpd enable VPHAM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;----switch&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/2 -&amp;gt; Connect to ASA&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport access vlan 20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport trunk allowed vlan 1,10,20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Vlan20&lt;BR /&gt;ip address 172.168.10.3 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;From switch, I can ping 172.168.10.1 and 172.168.10.3 and also from ASA&amp;nbsp; but if I connect my laptop to switch, I cannot ping those IPs. I hope that make sense.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 19:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718191#M1094878</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T19:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718217#M1094882</link>
      <description>&lt;P&gt;what port laptop connected ? did Laptop got IP address ( ipconfig /all - give you IP address)&lt;/P&gt;
&lt;P&gt;looking at switch config, (other than 1 or 2 trunk port belong to vlan 20) rest all not have any access vlan 20 config on the interface ?&lt;/P&gt;
&lt;P&gt;if you looking to get IP from ASA :&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface Vlan20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 172.168.10.3 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ip helper-address&amp;nbsp;172.168.10.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and one of the port should be as below config for the Laptop to work :&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernetx/x&lt;BR /&gt;switchport access vlan 20&lt;BR /&gt;switchport mode access&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;no shutdown&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 20:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718217#M1094882</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-11-08T20:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718229#M1094884</link>
      <description>&lt;P&gt;I see ASA have VLAN 15 but where the config of VLAN 15 ? may be you meaning VLAN25 ?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 20:36:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718229#M1094884</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-08T20:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718278#M1094886</link>
      <description>&lt;P&gt;Hi MHM,&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is vlan 15 in ASA I post above.&amp;nbsp; I want to make sure the internet work first before I jump to other Vlan.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Vlan15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif VPHAM&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 172.168.10.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-----------------------------ASA 5505 ------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show config&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;: Serial Number: XXXX&lt;BR /&gt;: Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz&lt;BR /&gt;: Written by enable_15 at 12:19:05.212 PST Sun Nov 6 2022&lt;BR /&gt;!&lt;BR /&gt;ASA Version 9.1(7)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name testXXXXX&lt;BR /&gt;enable password XXXXX encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;ip local pool vpn-pool xxxx.200 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.33.20.3 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt;nameif Wireless-guest&lt;BR /&gt;security-level 10&lt;BR /&gt;ip address 10.33.13.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan15&lt;BR /&gt;nameif VPHAM&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa917-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 10.33.10.50&lt;BR /&gt;domain-name XXXXX.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network VPHAM&lt;BR /&gt;subnet 172.168.10.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.10.0&lt;BR /&gt;subnet 192.168.10.0 255.255.255.0&lt;BR /&gt;object network LAN&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt;description for SIP&lt;BR /&gt;port-object eq 3389&lt;BR /&gt;object-group service rtp udp&lt;BR /&gt;description REal time for SIP&lt;BR /&gt;port-object range 1000 10500&lt;BR /&gt;object-group service DM_INLINE_UDP_1 udp&lt;BR /&gt;group-object rtp&lt;BR /&gt;port-object eq sip&lt;BR /&gt;object-group network XXXXX&lt;BR /&gt;network-object XXXXX 255.255.255.0&lt;BR /&gt;network-object XXXXXX255.255.255.0&lt;BR /&gt;network-object object XXXXX&lt;BR /&gt;object-group network Forefront-Servers&lt;BR /&gt;description AV servers at microsoft&lt;BR /&gt;network-object object forefront-2&lt;BR /&gt;network-object object forefront-1&lt;BR /&gt;network-object object forefront-3&lt;BR /&gt;network-object object forefront-7&lt;BR /&gt;network-object object forefront-9&lt;BR /&gt;network-object object forefront-8&lt;BR /&gt;network-object object forefront-10&lt;BR /&gt;network-object object forefront-11&lt;BR /&gt;network-object object forefront-12&lt;BR /&gt;network-object object forefront-13&lt;BR /&gt;network-object object forefront-4&lt;BR /&gt;network-object object forefront-5&lt;BR /&gt;network-object object forefront-6&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt;network-object XXXXX 255.255.255.0&lt;BR /&gt;network-object host XXXXXX&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any4 any4&lt;BR /&gt;access-list inside_access_in extended permit ip any4 any4&lt;BR /&gt;access-list inside_access_in extended permit ip host 192.0.0.0 any&lt;BR /&gt;access-list inside_access_in extended permit ip 192.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list XXXXX_splitTunnelAcl standard permit XXXXXXX 255.255.0.0&lt;BR /&gt;access-list voice_access_in extended permit ip any4 any4&lt;BR /&gt;access-list voice_access_in extended permit icmp any4 any4&lt;BR /&gt;access-list Wireless-guest_access_in extended permit icmp any4 any4&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any4 any4&lt;/P&gt;&lt;P&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm-buffer-size 500&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging flash-bufferwrap&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu Wireless-guest 1500&lt;BR /&gt;mtu VPHAM 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-752-153.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network VPHAM&lt;BR /&gt;nat (VPHAM,outside) dynamic interface&lt;BR /&gt;object network obj-192.168.10.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group Wireless-guest_access_in in interface Wireless-guest&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.0.0.1 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.0 172.168.10.3 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server RADIUS protocol radius&lt;BR /&gt;aaa-server RADIUS (inside) host 10.33.10.50&lt;BR /&gt;key *****&lt;BR /&gt;radius-common-pw R@dius&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;nac-policy site2site-nac-framework-create nac-framework&lt;BR /&gt;reval-period 36000&lt;BR /&gt;sq-period 300&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sla monitor 1&lt;BR /&gt;type echo protocol ipIcmpEcho XXXX interface outside&lt;BR /&gt;frequency 5&lt;BR /&gt;sla monitor schedule 1 life forever start-time now&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set ikev1 transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set pfs&lt;BR /&gt;crypto map outside_map 2 set peer XXXXXXX&lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint XXXX-onsite&lt;BR /&gt;enrollment self&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 201&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 28800&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd address 172.168.10.100-172.168.10.100 VPHAM&lt;BR /&gt;dhcpd dns 8.8.8.8 interface VPHAM&lt;BR /&gt;dhcpd enable VPHAM&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-dart-win-2.5.3055-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-2.5.3055-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/sslclient-win-1.1.0.154.pkg 3&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;group-policy ssl-cal-ssf internal&lt;BR /&gt;group-policy ssl-cal-ssf attributes&lt;BR /&gt;banner none&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 10.33.10.10&lt;BR /&gt;vpn-access-hours none&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-filter none&lt;BR /&gt;ipv6-vpn-filter none&lt;BR /&gt;vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt;group-lock none&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value XXXX_splitTunnelAcl&lt;BR /&gt;default-domain value XXXXX.com&lt;BR /&gt;split-dns value XXXXX.com&lt;BR /&gt;vlan none&lt;BR /&gt;nac-settings none&lt;BR /&gt;address-pools none&lt;BR /&gt;ipv6-address-pools none&lt;BR /&gt;smartcard-removal-disconnect enable&lt;BR /&gt;webvpn&lt;BR /&gt;url-list none&lt;BR /&gt;filter none&lt;BR /&gt;anyconnect ask enable default anyconnect&lt;BR /&gt;group-policy XXXXX internal&lt;BR /&gt;group-policy XXXXXX attributes&lt;BR /&gt;dns-server value XXXXXX XXXXX&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value XXXXX_splitTunnelAcl&lt;BR /&gt;default-domain value XXXX.com&lt;BR /&gt;split-dns value XXXX.com&lt;BR /&gt;address-pools value vpn-pool&lt;BR /&gt;group-policy users internal&lt;BR /&gt;group-policy users attributes&lt;BR /&gt;dns-server value XXXXX&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value XXXX_splitTunnelAcl&lt;BR /&gt;default-domain value XXXX.com&lt;BR /&gt;split-dns value XXXX.com&lt;BR /&gt;address-pools value vpn-pool&lt;BR /&gt;group-policy site2site internal&lt;BR /&gt;group-policy site2site attributes&lt;BR /&gt;vpn-access-hours none&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt;ip-comp disable&lt;BR /&gt;re-xauth disable&lt;BR /&gt;group-lock none&lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;split-tunnel-network-list none&lt;BR /&gt;default-domain none&lt;BR /&gt;split-dns none&lt;BR /&gt;secure-unit-authentication disable&lt;BR /&gt;user-authentication disable&lt;BR /&gt;user-authentication-idle-timeout none&lt;BR /&gt;ip-phone-bypass disable&lt;BR /&gt;leap-bypass disable&lt;BR /&gt;nem disable&lt;BR /&gt;nac-settings value site2site-nac-framework-create&lt;BR /&gt;address-pools none&lt;BR /&gt;smartcard-removal-disconnect enable&lt;BR /&gt;client-firewall none&lt;BR /&gt;group-policy any-gp internal&lt;BR /&gt;group-policy any-gp attributes&lt;BR /&gt;dns-server value XXXXXX&lt;BR /&gt;vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value XXXX&lt;BR /&gt;default-domain value calithera.com&lt;BR /&gt;split-dns value XXXX.com&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect ssl dtls enable&lt;BR /&gt;anyconnect mtu 1406&lt;BR /&gt;anyconnect keep-installer installed&lt;BR /&gt;anyconnect ssl keepalive 20&lt;BR /&gt;anyconnect ssl compression none&lt;BR /&gt;anyconnect ssl df-bit-ignore disable&lt;BR /&gt;anyconnect routing-filtering-ignore disable&lt;BR /&gt;username administrator password nbRyFH1UC.tq1qxD encrypted privilege 15&lt;BR /&gt;username administrator attributes&lt;BR /&gt;vpn-group-policy XXXXX&lt;/P&gt;&lt;P&gt;tunnel-group XXXXX type remote-access&lt;BR /&gt;tunnel-group XXXXXX general-attributes&lt;BR /&gt;address-pool vpn-pool&lt;BR /&gt;default-group-policy XXXXXX&lt;BR /&gt;tunnel-group XXXXX ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key *****&lt;BR /&gt;chain&lt;BR /&gt;tunnel-group users type remote-access&lt;BR /&gt;tunnel-group users general-attributes&lt;BR /&gt;address-pool vpn-pool&lt;BR /&gt;authentication-server-group RADIUS&lt;BR /&gt;default-group-policy users&lt;BR /&gt;tunnel-group users ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group any-ssl type remote-access&lt;BR /&gt;tunnel-group any-ssl general-attributes&lt;BR /&gt;address-pool vpn-pool&lt;BR /&gt;authentication-server-group RADIUS LOCAL&lt;BR /&gt;default-group-policy any-gp&lt;BR /&gt;tunnel-group any-ssl webvpn-attributes&lt;BR /&gt;group-alias Anyconnect enable&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="nofollow noopener noreferrer"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:4e5ad507be2d97ab1195823b9f8b9d9a&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 21:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718278#M1094886</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T21:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718285#M1094887</link>
      <description>&lt;P&gt;From ASA Port 0/3 and I set up DHCP and if I connect straight to the laptop, the laptop gets the IP 172.168.10.100 and it has internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;dhcpd address 172.168.10.100-172.168.10.200 VPHAM&lt;BR /&gt;dhcpd dns 8.8.8.8 interface VPHAM&lt;BR /&gt;dhcpd enable VPHAM&lt;/P&gt;&lt;P&gt;However, if I connect ASA port 0/ 3 to switch port # 0/2 (Vlan20 and it is only port belong to Vlan20), nothing happen because the rest of switch is vlan 10 and 12 and I use&amp;nbsp;&lt;SPAN&gt;switchport trunk allowed vlan 1,10,20 to talk each other. May be I am wrong?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 21:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718285#M1094887</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T21:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718295#M1094889</link>
      <description>&lt;P&gt;I still figure out from ASA connect to switch port 0/2 vlan 20(only this port is vlan20), how internet go to Vlan10,12 ?&lt;/P&gt;&lt;P&gt;I connect the laptop to vlan10,12, the laptop will get the IP from DHCP server 192.168.10.100.. I can ping the servers and the server can ping the laptop but no internet or cannot ping the port 0/2 vlan 20 . I think I miss something here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet0/2 -&amp;gt; Connect to ASA port&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport access vlan 20&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;switchport trunk allowed vlan 1,10,20&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Vlan20&lt;BR /&gt;ip address 172.168.10.3 255.255.255.0&lt;BR /&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;interface Vlan10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.10.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;interface Vlan12&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.33.12.1 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip helper-address 10.33.10.10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip helper-address 192.168.10.10&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 21:44:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718295#M1094889</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T21:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718300#M1094890</link>
      <description>&lt;P&gt;sorry if I am not clear, I am asking where the config of VLAN15 in SW no in ASA ?&lt;BR /&gt;&lt;BR /&gt;for the interconnect between VLAN through ASA you need&amp;nbsp;&lt;BR /&gt;same security traffic permit inter/inter-interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;for internet you need&amp;nbsp;&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside)&amp;nbsp; dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (Wireless-guest,outside)&amp;nbsp; dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (VPHAM,outside)&amp;nbsp; dynamic any interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;one dynamic NAT for each VLAN.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 21:56:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718300#M1094890</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-08T21:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718301#M1094891</link>
      <description>&lt;P&gt;for the routing which I think is big issue here, you config VLAN in ASA that reach via other VLAN to L3SW ??&lt;BR /&gt;can you draw topology?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 22:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718301#M1094891</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-08T22:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718334#M1094896</link>
      <description>&lt;P&gt;Hi MHM,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for quick response. There is no VLAN15 in switch.&amp;nbsp; From ASA port 0/3 Vlan 15 to switch port 0/2 vlan 20.&lt;/P&gt;&lt;P&gt;1. Do they have to be the same vlan for both ASA and switch?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 22:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718334#M1094896</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T22:50:28Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718346#M1094897</link>
      <description>&lt;P&gt;Hi MHH,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here it is. I still figure out how connect internet from ASA to switch. I will configure Wifi with another switch.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 23:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718346#M1094897</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-08T23:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718351#M1094898</link>
      <description>&lt;P&gt;Sure yes, otherwise the tag make traffic drop&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 23:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718351#M1094898</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-11-08T23:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718918#M1094964</link>
      <description>&lt;P&gt;Thank you so much. Admin just removed me from spam&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 20:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4718918#M1094964</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-09T20:29:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4724395#M1095173</link>
      <description>&lt;P&gt;Thank you so much. Finally I made it works.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 21:08:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4724395#M1095173</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-19T21:08:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco switch 3560 cannot get internet from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4724396#M1095174</link>
      <description>&lt;P&gt;Thank you so much for point out the same vlan 15 for both ASA and switch. It works. Thank you.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Nov 2022 21:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-switch-3560-cannot-get-internet-from-asa-5505/m-p/4724396#M1095174</guid>
      <dc:creator>phugiay</dc:creator>
      <dc:date>2022-11-19T21:09:38Z</dc:date>
    </item>
  </channel>
</rss>

