<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Firepower Anyconnect failuer in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790914#M1098558</link>
    <description>&lt;P&gt;Your failure description is quite vague ...&lt;/P&gt;
&lt;P&gt;But at least you have to make sure that the NAT-exemption rule is above the general internet rule. And I would configure this in the same logic as the "normal" NAT rule: From "any" to "outside".&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 10 Mar 2023 06:38:49 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2023-03-10T06:38:49Z</dc:date>
    <item>
      <title>Cisco Firepower Anyconnect failuer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790908#M1098557</link>
      <description>&lt;P&gt;Anyconnect is not able to connect to the server error!!&lt;/P&gt;&lt;P&gt;Firewall in BVI mode -&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 06:11:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790908#M1098557</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-10T06:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Anyconnect failuer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790914#M1098558</link>
      <description>&lt;P&gt;Your failure description is quite vague ...&lt;/P&gt;
&lt;P&gt;But at least you have to make sure that the NAT-exemption rule is above the general internet rule. And I would configure this in the same logic as the "normal" NAT rule: From "any" to "outside".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 06:38:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790914#M1098558</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-03-10T06:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Anyconnect failuer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790918#M1098559</link>
      <description>&lt;P&gt;I'm sorry for the lack of information!&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to VPN my office from ouside network like a cafe or any other source wifi! I'm not able to get this right!!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 06:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790918#M1098559</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-10T06:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Anyconnect failuer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790930#M1098560</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp; &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;This is what happened when I shift anyconnect nat to the top -&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. I can connect through anyconnect working perfectly but the second nat will stop working (OPEN-DSM).&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I can't ping my inside network like 10.206.167.111&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 12:00:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4790930#M1098560</guid>
      <dc:creator>saids3</dc:creator>
      <dc:date>2023-03-10T12:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Firepower Anyconnect failuer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4795313#M1098714</link>
      <description>&lt;P&gt;The nat rule of anyconnect is wrong. you need to exempt the vpn pool and the local subnet in order to reach the resource behind the Firewall. the rule you have it wont all you to connect the vpn AC behind the firewall.&lt;/P&gt;
&lt;P&gt;your nat rule should be in this order. I am writing the ASA code as I dont have FTD so you can work it around.&lt;/P&gt;
&lt;P&gt;nat(inside,outside) source static local-network local-network destin static vpn-pool vpn-pool no proxy arp route-lookup.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2023 08:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-firepower-anyconnect-failuer/m-p/4795313#M1098714</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-03-16T08:31:38Z</dc:date>
    </item>
  </channel>
</rss>

