<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Config Issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931662#M1104706</link>
    <description>&lt;P&gt;This is a lab network without an internet connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following is requested output.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ciscoasa(config-pmap-c)# ping 172.16.10.10&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 172.16.10.10, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;BR /&gt;ciscoasa(config-pmap-c)# cap capin interface INSIDE-1 match ip 10.1.1.0 255.25$&lt;BR /&gt;ciscoasa(config-pmap-c)# show cap capin&lt;/P&gt;&lt;P&gt;190 packets captured&lt;/P&gt;&lt;P&gt;1: 16:15:05.339505 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;2: 16:15:06.365169 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;3: 16:15:07.377437 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;4: 16:15:08.391001 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;5: 16:15:09.404779 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;6: 16:15:10.418771 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;7: 16:15:11.431938 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;8: 16:15:12.446052 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;9: 16:15:13.459540 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;10: 16:15:14.473409 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;11: 16:15:15.487172 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;12: 16:15:16.500889 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;13: 16:15:17.514438 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;14: 16:15:18.527911 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;15: 16:15:19.541475 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;16: 16:15:20.555253 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;17: 16:15:21.568726 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;18: 16:15:22.582886 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;19: 16:15:23.596023 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;20: 16:15:24.610075 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;21: 16:15:25.623624 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;22: 16:15:26.637097 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;23: 16:15:27.651104 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;24: 16:15:28.664684 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;25: 16:15:29.678416 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;26: 16:15:30.691339 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;27: 16:15:31.704995 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;28: 16:15:32.719201 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;29: 16:15:33.732811 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;30: 16:15:34.746497 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;31: 16:15:35.760153 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;32: 16:15:36.773748 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;33: 16:15:37.787389 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;34: 16:15:38.800831 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;35: 16:15:39.814548 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;36: 16:15:40.828341 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;37: 16:15:41.842195 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;38: 16:15:42.855866 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;39: 16:15:43.869721 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;40: 16:15:44.883041 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;41: 16:15:45.896941 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;42: 16:15:46.910643 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;43: 16:15:47.923856 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;44: 16:15:48.937771 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;45: 16:15:49.951336 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;46: 16:15:50.965053 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;47: 16:15:51.978876 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;48: 16:15:52.992578 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;49: 16:15:54.006332 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;50: 16:15:55.019865 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;51: 16:15:56.034238 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;52: 16:15:57.047208 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;53: 16:15:58.061306 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;54: 16:15:59.074520 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;55: 16:16:00.088084 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;56: 16:16:01.102396 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;57: 16:16:02.115548 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;58: 16:16:03.129250 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;59: 16:16:04.142921 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;60: 16:16:05.156180 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;61: 16:16:06.170645 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;62: 16:16:07.183904 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;63: 16:16:08.197819 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;64: 16:16:09.211430 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;65: 16:16:10.224735 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;66: 16:16:11.238513 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;67: 16:16:12.252809 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;68: 16:16:13.265946 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;69: 16:16:14.279633 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;70: 16:16:15.293228 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;71: 16:16:16.306868 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;72: 16:16:17.320860 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;73: 16:16:18.334043 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;74: 16:16:19.348218 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;75: 16:16:20.361843 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;76: 16:16:21.375194 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;77: 16:16:22.389216 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;78: 16:16:23.402612 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;79: 16:16:24.416741 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;80: 16:16:25.430077 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;81: 16:16:26.443870 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;82: 16:16:27.457434 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;83: 16:16:28.470404 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;84: 16:16:29.484517 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;85: 16:16:30.498341 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;86: 16:16:31.511753 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;87: 16:16:32.525744 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;88: 16:16:33.539187 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;89: 16:16:34.552873 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;90: 16:16:35.567170 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;91: 16:16:36.580154 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;92: 16:16:37.593597 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;93: 16:16:38.607436 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;94: 16:16:39.621122 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;95: 16:16:40.634732 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;96: 16:16:41.648556 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;97: 16:16:42.662227 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;98: 16:16:43.675914 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;99: 16:16:44.689524 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;100: 16:16:45.703668 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;101: 16:16:46.717217 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;102: 16:16:47.730293 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;103: 16:16:48.744315 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;104: 16:16:49.757300 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;105: 16:16:50.771505 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;106: 16:16:51.785008 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;107: 16:16:52.798802 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;108: 16:16:53.812229 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;109: 16:16:54.825656 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;110: 16:16:55.839708 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;111: 16:16:56.853456 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;112: 16:16:57.867402 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;113: 16:16:58.880813 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;114: 16:16:59.894530 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;115: 16:17:00.908095 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;116: 16:17:01.921186 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;117: 16:17:02.935559 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;118: 16:17:03.949001 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;119: 16:17:04.963298 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;120: 16:17:05.976161 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;121: 16:17:06.990244 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;122: 16:17:08.003692 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;123: 16:17:09.017195 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;124: 16:17:10.031553 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;125: 16:17:11.044660 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;126: 16:17:12.058605 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;127: 16:17:13.072536 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;128: 16:17:14.085536 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;129: 16:17:15.099726 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;130: 16:17:16.112970 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;131: 16:17:17.126763 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;132: 16:17:18.140007 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;133: 16:17:19.153968 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;134: 16:17:20.167654 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;135: 16:17:21.181738 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;136: 16:17:22.195073 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;137: 16:17:23.209065 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;138: 16:17:24.222110 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;139: 16:17:25.235949 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;140: 16:17:26.249941 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;141: 16:17:27.263490 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;142: 16:17:28.277237 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;143: 16:17:29.290909 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;144: 16:17:30.304946 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;145: 16:17:31.318114 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;146: 16:17:32.331876 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;147: 16:17:33.345364 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;148: 16:17:34.359051 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;149: 16:17:35.373195 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;150: 16:17:36.385981 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;151: 16:17:37.400049 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;152: 16:17:38.413415 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;153: 16:17:39.427071 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;154: 16:17:40.441185 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;155: 16:17:41.454779 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;156: 16:17:42.468298 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;157: 16:17:43.482137 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;158: 16:17:44.495946 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;159: 16:17:45.509601 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;160: 16:17:46.522922 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;161: 16:17:47.536639 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;162: 16:17:48.550478 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;163: 16:17:49.563950 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;164: 16:17:50.578262 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;165: 16:17:51.591415 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;166: 16:17:52.604994 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;167: 16:17:53.618772 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;168: 16:17:54.632840 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;169: 16:17:55.646008 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;170: 16:17:56.659725 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;171: 16:17:57.673396 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;172: 16:17:58.687159 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;173: 16:17:59.701105 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;174: 16:18:00.714608 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;175: 16:18:01.728081 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;176: 16:18:02.741843 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;177: 16:18:03.755942 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;178: 16:18:04.769277 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;179: 16:18:05.782689 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;180: 16:18:06.796864 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;181: 16:18:07.810215 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;182: 16:18:08.823413 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;183: 16:18:09.836916 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;184: 16:18:10.850786 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;185: 16:18:11.864579 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;186: 16:18:12.878296 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;187: 16:18:13.891921 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;188: 16:18:14.905684 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;189: 16:18:15.919782 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;BR /&gt;190: 16:18:16.932996 10.1.1.5 &amp;gt; 172.16.10.10: icmp: echo request&lt;/P&gt;</description>
    <pubDate>Fri, 29 Sep 2023 15:58:35 GMT</pubDate>
    <dc:creator>bpierce1046</dc:creator>
    <dc:date>2023-09-29T15:58:35Z</dc:date>
    <item>
      <title>ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4930942#M1104653</link>
      <description>&lt;P&gt;I am having issues with my ASA not transferring traffic from VPN subnet to internal subnet. VPN is 10.1.1.0/24 subnet and internal is 172.16.10.0/24 subnet.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)61&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password xxx xxx&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface inside&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:8d4178d35b9e92dae51bd1cbacee04e4&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4930942#M1104653</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T17:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931142#M1104663</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1602915"&gt;@bpierce1046&lt;/a&gt; is that your full configuration?....it does not have any VPN configuration.&lt;/P&gt;
&lt;P&gt;You'll probably need a NAT exemption rule to ensure the traffic between the networks is not unintentially translated, example:-&lt;/P&gt;
&lt;PRE&gt;nat (inside,outside) source static LAN-NET LAN-NET destination static VPN-NET VPN-NET&lt;/PRE&gt;
&lt;P&gt;Create an object LAN-NET to reflect your internal network and another object VPN-NET to reflect the VPN network and then just replace "inside" with your actually internal interface name.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931142#M1104663</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-28T17:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931144#M1104664</link>
      <description>&lt;P&gt;This not complete config share vpn config.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 17:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931144#M1104664</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T17:38:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931178#M1104670</link>
      <description>&lt;P&gt;actual config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2)61&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password X.X.X&lt;BR /&gt;names&lt;BR /&gt;ip local pool anyconnect-subnet 10.1.1.5-10.1.1.250 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.20.33 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif INSIDE-1&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network anyconnect-subnet&lt;BR /&gt;subnet 10.1.1.0 255.255.255.0&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu INSIDE-1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface inside&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;!&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;object network anyconnect-subnet&lt;BR /&gt;nat (outside,outside) dynamic interface&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authorization exec LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-linux64-4.10.05095-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy ANYCONNECT-GROUP-POLICY internal&lt;BR /&gt;group-policy ANYCONNECT-GROUP-POLICY attributes&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ssl-client&lt;BR /&gt;default-domain value packet.lan&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username user1 password X.X.X&lt;BR /&gt;username user1 attributes&lt;BR /&gt;service-type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP type remote-access&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP general-attributes&lt;BR /&gt;address-pool anyconnect-subnet&lt;BR /&gt;default-group-policy ANYCONNECT-GROUP-POLICY&lt;BR /&gt;tunnel-group ANYCONNECT-TUNNEL-GROUP webvpn-attributes&lt;BR /&gt;group-alias Packetswitch-VPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:a75562b09bc9aa9380f81583fb10044e&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 01:55:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931178#M1104670</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-29T01:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931183#M1104671</link>
      <description>&lt;P&gt;Where is the config of anyconnect pool ?&lt;/P&gt;
&lt;P&gt;I see only object not pool' so I think the vpn not get IP&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931183#M1104671</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T18:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931194#M1104672</link>
      <description>&lt;P&gt;When connected it seems to get an internal IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bpierce1046_0-1695927208843.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198425iC78967B8FCDB3AEF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bpierce1046_0-1695927208843.png" alt="bpierce1046_0-1695927208843.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931194#M1104672</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T18:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931198#M1104673</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1602915"&gt;@bpierce1046&lt;/a&gt; as stated in my previous message above, configure NAT exemption to ensure the traffic between the internal network and vpn pool is not unintentially translated by your other auto NAT rules.&lt;/P&gt;
&lt;P&gt;If that does not work, run packet-tracer from the CLI to simulate the traffic flow and provide the output for review.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 18:57:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931198#M1104673</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-09-28T18:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931201#M1104674</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I found the pool config&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;ip local pool anyconnect-subnet 10.1.1.5-10.1.1.250 mask 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And your share I see the anyconnect get IP from pool that good&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Other things I see is dyanimc policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;dynamic-access-policy-record DfltAccessPolicy !!!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This why you use it ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931201#M1104674</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:03:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931215#M1104675</link>
      <description>&lt;P&gt;The packet tracer allows but you can see it doesn't from the VPN client. it allows http and https through.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bpierce1046_0-1695929546483.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/198426iEA0DC66DC5CB92D2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bpierce1046_0-1695929546483.png" alt="bpierce1046_0-1695929546483.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input OUTSIDE tcp 10.1.1.6 80 172.16.10.10 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.10/80 to 172.16.10.10/80&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/80 to 10.1.1.6/80&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 304, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.10 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address b827.eb3a.797f hits 2 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input OUTSIDE tcp 10.1.1.6 443 172.16.10.10 443&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.10/443 to 172.16.10.10/443&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/443 to 10.1.1.6/443&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 311, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.10 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address b827.eb3a.797f hits 3 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931215#M1104675</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T19:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931220#M1104676</link>
      <description>&lt;P&gt;Check below note&lt;/P&gt;
&lt;P&gt;You push&amp;nbsp;&lt;SPAN&gt;dns-server value 8.8.8.8 to anyconnect and you use tunnel all this why thr http/https is not work in real.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Use same packet tracer but instead use 8.8.8.8 as destiantion and check if it sucess or failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I sure it fialed you need to push internal dns server to anyconnect or use U-turn nat for anyconnect to connect to google dns server&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931220#M1104676</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931221#M1104677</link>
      <description>&lt;P&gt;Also when i try ICMP i get a failed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: INSIDE-1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931221#M1104677</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T19:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931227#M1104678</link>
      <description>&lt;P&gt;Can I see icmp packet tracer detail&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 19:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931227#M1104678</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T19:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931232#M1104679</link>
      <description>&lt;P&gt;ciscoasa# packet-tracer input INSIDE-1 icmp 172.16.10.9 8 0 10.1.1.6 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2bbb030, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=2, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.1.1.6/0 to 10.1.1.6/0&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.9/0 to 172.16.10.9/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8ebd0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=0, user_data=0x2aaac3bdd610, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=565, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f1b2d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=46, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f30b00, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=3, user_data=0x2aaac2c10c40, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaab9b8d6b0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=1, user_data=0x2aaac161f740, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 609, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate 10.1.1.6/0 to 10.1.1.6/0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.16.10.9/0 to 172.16.10.9/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8ebd0, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=1, user_data=0x2aaac3bdd610, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=566, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2f1b2d0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=47, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=INSIDE-1, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.10.0.1 using egress ifc outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: INSIDE-1&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:00:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931232#M1104679</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931236#M1104680</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ciscoasa# packet-tracer input outside&amp;nbsp; icmp 10.1.1.6 8 0&amp;nbsp; 172.16.10.9 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do this way&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931236#M1104680</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931239#M1104681</link>
      <description>&lt;P&gt;&lt;BR /&gt;ciscoasa# packet-tracer input outside icmp 10.1.1.6 8 0 172.16.10.9 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.9/0 to 172.16.10.9/0&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b89a30, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=3, user_data=0x2aaabbe600c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/0 to 10.1.1.6/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8bd00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=112, user_data=0x2aaac161f740, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=827, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e8b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1829, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e3c0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=7, user_data=0x2aaac2c2e070, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaab9b8e4f0, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=113, user_data=0x2aaac3bdd610, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 992, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface INSIDE-1&lt;BR /&gt;Untranslate 172.16.10.9/0 to 172.16.10.9/0&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group OUTSIDE_to_IN in interface outside&lt;BR /&gt;access-list OUTSIDE_to_IN extended permit ip object anyconnect-subnet any&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b89a30, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=4, user_data=0x2aaabbe600c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (INSIDE-1,outside) source static LAN-NET LAN-NET destination static anyconnect-subnet anyconnect-subnet&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.1.1.6/0 to 10.1.1.6/0&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaab9b8bd00, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=113, user_data=0x2aaac161f740, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=10.1.1.0, mask=255.255.255.0, port=0, tag=any&lt;BR /&gt;dst ip/id=172.16.10.0, mask=255.255.255.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=INSIDE-1&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac1a10280, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=828, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac2c2e8b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=1830, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.16.10.9 using egress ifc INSIDE-1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INSIDE-1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-adjacency) No valid adjacency&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:13:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931239#M1104681</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931251#M1104682</link>
      <description>&lt;P&gt;&lt;SPAN&gt;ciscoasa# packet-tracer input outside icmp 10.1.1.6 8 0 &lt;STRONG&gt;172.16.10.10&lt;/STRONG&gt; detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;No adj is appear if the asa dobt have arp entry for this IP' so change it to .10 and check.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am sure it will success but traffic to dns server will failed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Check to more more sure&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:36:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931251#M1104682</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931254#M1104683</link>
      <description>&lt;P&gt;that worked but it still doesn't work from the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, for the internal web-server at 172.16.10.10. Since it cant get to the dns server could that be why the packet is being dropped. That i need to do:&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source static 10.1.1.5 172.16.10.10 dns
!
policy-map global_policy
  class inspection_default 
    inspect dns&lt;/PRE&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931254#M1104683</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-28T20:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931255#M1104684</link>
      <description>&lt;P&gt;Do you have any internal dns server ?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 20:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931255#M1104684</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-28T20:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931291#M1104687</link>
      <description>&lt;P&gt;I dont have an internal DNS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 00:10:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931291#M1104687</guid>
      <dc:creator>bpierce1046</dc:creator>
      <dc:date>2023-09-29T00:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Config Issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931383#M1104690</link>
      <description>&lt;P&gt;Can you access http server with IP not name ?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Sep 2023 07:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-config-issues/m-p/4931383#M1104690</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-29T07:07:18Z</dc:date>
    </item>
  </channel>
</rss>

