<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Config Issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931255#M1104684</link>
    <description>&lt;P&gt;Do you have any internal dns server ?&lt;/P&gt;</description>
    <pubDate>Thu, 28 Sep 2023 20:59:16 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-09-28T20:59:16Z</dc:date>
    <item>
      <title>ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4930942#M1104653</link>
      <description>&lt;P&gt;I am having issues with my ASA not transferring traffic from VPN subnet to internal subnet. VPN is 10.1.1.0/24 subnet and internal is 172.16.10.0/24 subnet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)61&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password xxx xxx&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface inside&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:8d4178d35b9e92dae51bd1cbacee04e4&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4930942#M1104653</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T17:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931142#M1104663</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1602915"&gt;@bpierce1046&lt;/a&gt; is that your full configuration?....it does not have any VPN configuration.&lt;/P&gt;
&lt;P&gt;You'll probably need a NAT exemption rule to ensure the traffic between the networks is not unintentially translated, example:-&lt;/P&gt;
&lt;PRE&gt;nat (inside,outside) source static LAN-NET LAN-NET destination static VPN-NET VPN-NET&lt;/PRE&gt;
&lt;P&gt;Create an object LAN-NET to reflect your internal network and another object VPN-NET to reflect the VPN network and then just replace "inside" with your actually internal interface name.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931142#M1104663</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-28T17:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931144#M1104664</link>
      <description>&lt;P&gt;This not complete config share vpn config.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931144#M1104664</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T17:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931178#M1104670</link>
      <description>&lt;P&gt;actual config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)61&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password X.X.X&lt;BR /&gt;names&lt;BR /&gt;ip local pool anyconnect-subnet 10.1.1.5-10.1.1.250 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.20.33 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif INSIDE-1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network anyconnect-subnet&lt;BR /&gt;subnet 10.1.1.0 255.255.255.0&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu INSIDE-1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface inside&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;object network anyconnect-subnet&lt;BR /&gt;nat (outside,outside) dynamic interface&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authorization exec LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.10.05095-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy ANYCONNECT-GROUP-POLICY internal&lt;BR /&gt;group-policy ANYCONNECT-GROUP-POLICY attributes&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value packet.lan&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username user1 password X.X.X&lt;BR /&gt;username user1 attributes&lt;BR /&gt;service-type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP general-attributes&lt;BR /&gt;address-pool anyconnect-subnet&lt;BR /&gt;default-group-policy ANYCONNECT-GROUP-POLICY&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP webvpn-attributes&lt;BR /&gt;group-alias Packetswitch-VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:a75562b09bc9aa9380f81583fb10044e&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 01:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931178#M1104670</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-29T01:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931183#M1104671</link>
      <description>&lt;P&gt;Where is the config of anyconnect pool ?&lt;/P&gt;
&lt;P&gt;I see only object not pool' so I think the vpn not get IP&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931183#M1104671</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T18:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931194#M1104672</link>
      <description>&lt;P&gt;When connected it seems to get an internal IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bpierce1046_0-1695927208843.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198425iC78967B8FCDB3AEF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bpierce1046_0-1695927208843.png" alt="bpierce1046_0-1695927208843.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931194#M1104672</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T18:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931198#M1104673</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1602915"&gt;@bpierce1046&lt;/a&gt; as stated in my previous message above, configure NAT exemption to ensure the traffic between the internal network and vpn pool is not unintentially translated by your other auto NAT rules.&lt;/P&gt;
&lt;P&gt;If that does not work, run packet-tracer from the CLI to simulate the traffic flow and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931198#M1104673</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-28T18:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931201#M1104674</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I found the pool config&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ip local pool anyconnect-subnet 10.1.1.5-10.1.1.250 mask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And your share I see the anyconnect get IP from pool that good&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Other things I see is dyanimc policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;dynamic-access-policy-record DfltAccessPolicy !!!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This why you use it ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931201#M1104674</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931215#M1104675</link>
      <description>&lt;P&gt;The packet tracer allows but you can see it doesn't from the VPN client. it allows http and https through.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bpierce1046_0-1695929546483.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198426iEA0DC66DC5CB92D2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bpierce1046_0-1695929546483.png" alt="bpierce1046_0-1695929546483.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input OUTSIDE tcp 10.1.1.6 80 172.16.10.10 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.10/80 to 172.16.10.10/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/80 to 10.1.1.6/80&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 304, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.10 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address b827.eb3a.797f hits 2 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input OUTSIDE tcp 10.1.1.6 443 172.16.10.10 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.10/443 to 172.16.10.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/443 to 10.1.1.6/443&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 311, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.10 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address b827.eb3a.797f hits 3 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931215#M1104675</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T19:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931220#M1104676</link>
      <description>&lt;P&gt;Check below note&lt;/P&gt;
&lt;P&gt;You push&amp;nbsp;&lt;SPAN&gt;dns-server value 8.8.8.8 to anyconnect and you use tunnel all this why thr http/https is not work in real.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use same packet tracer but instead use 8.8.8.8 as destiantion and check if it sucess or failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I sure it fialed you need to push internal dns server to anyconnect or use U-turn nat for anyconnect to connect to google dns server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931220#M1104676</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931221#M1104677</link>
      <description>&lt;P&gt;Also when i try ICMP i get a failed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: INSIDE-1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931221#M1104677</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T19:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931227#M1104678</link>
      <description>&lt;P&gt;Can I see icmp packet tracer detail&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931227#M1104678</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931232#M1104679</link>
      <description>&lt;P&gt;ciscoasa# packet-tracer input INSIDE-1 icmp 172.16.10.9 8 0 10.1.1.6 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2bbb030, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=2, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.1.1.6/0 to 10.1.1.6/0&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.9/0 to 172.16.10.9/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8ebd0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x2aaac3bdd610, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=565, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f1b2d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=46, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f30b00, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=3, user_data=0x2aaac2c10c40, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaab9b8d6b0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x2aaac161f740, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 609, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.1.1.6/0 to 10.1.1.6/0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.9/0 to 172.16.10.9/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8ebd0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1, user_data=0x2aaac3bdd610, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=566, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f1b2d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=47, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.10.0.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE-1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931232#M1104679</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931236#M1104680</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ciscoasa# packet-tracer input outside&amp;nbsp; icmp 10.1.1.6 8 0&amp;nbsp; 172.16.10.9 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do this way&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931236#M1104680</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931239#M1104681</link>
      <description>&lt;P&gt;&lt;BR /&gt;ciscoasa# packet-tracer input outside icmp 10.1.1.6 8 0 172.16.10.9 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.9/0 to 172.16.10.9/0&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b89a30, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3, user_data=0x2aaabbe600c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/0 to 10.1.1.6/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8bd00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=112, user_data=0x2aaac161f740, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=827, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e8b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1829, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e3c0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=7, user_data=0x2aaac2c2e070, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaab9b8e4f0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=113, user_data=0x2aaac3bdd610, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 992, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.9/0 to 172.16.10.9/0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b89a30, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=4, user_data=0x2aaabbe600c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/0 to 10.1.1.6/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8bd00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=113, user_data=0x2aaac161f740, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=828, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e8b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1830, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.9 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931239#M1104681</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931251#M1104682</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ciscoasa# packet-tracer input outside icmp 10.1.1.6 8 0 &lt;STRONG&gt;172.16.10.10&lt;/STRONG&gt; detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;No adj is appear if the asa dobt have arp entry for this IP' so change it to .10 and check.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am sure it will success but traffic to dns server will failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check to more more sure&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931251#M1104682</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931254#M1104683</link>
      <description>&lt;P&gt;that worked but it still doesn't work from the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, for the internal web-server at 172.16.10.10. Since it cant get to the dns server could that be why the packet is being dropped. That i need to do:&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source static 10.1.1.5 172.16.10.10 dns
!
policy-map global_policy
  class inspection_default 
    inspect dns&lt;/PRE&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931254#M1104683</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931255#M1104684</link>
      <description>&lt;P&gt;Do you have any internal dns server ?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931255#M1104684</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931291#M1104687</link>
      <description>&lt;P&gt;I dont have an internal DNS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 00:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931291#M1104687</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-29T00:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931383#M1104690</link>
      <description>&lt;P&gt;Can you access http server with IP not name ?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 07:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931383#M1104690</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-29T07:07:18Z</dc:date>
    </item>
  </channel>
</rss>

