<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: routing failed to locate next hop for TCP - Anyconnect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059215#M1110836</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1425405"&gt;@Psmurali89&lt;/a&gt; enable http access from the VPN to the inside interface.&lt;/P&gt;
&lt;PRE&gt;http 192.168.40.0 255.255.255.0 &lt;STRONG&gt;inside&lt;/STRONG&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 07 Apr 2024 17:03:27 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2024-04-07T17:03:27Z</dc:date>
    <item>
      <title>routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059101#M1110772</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured anyconnect vpn in ASA and its working ok. I enabled ASDM access in inside interface (10.10.50.254). After connecting to VPN, i tried to ping and connect to ASDM on&amp;nbsp;10.10.50.254 but its not working and i get "routing failed to locate next hop for TCP" in the logs. I configured access rules, NAT etc and also when i do route print in laptop i can see this inside subnet. Am not sure this even supposed to work, if not how do i connect to firewall ASDM or SSH via anyconnect vpn? if i connect a PC in subnet (10.10.50.11), i can ofcourse connect to ASDM. Also, i can ping this PC after connecting to anyconnect vpn (192.168.40.11), its just the inside interface i cant able to connect/ping. I dont see any traffic hitting the access rules either, i believe its most likely the NAT issue but i tried few ways of doing it but nothing working. Any help is much appreciated.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 9.12(4)40&lt;BR /&gt;!&lt;BR /&gt;hostname Home-Fw&lt;BR /&gt;domain-name Home-Fw.local&lt;BR /&gt;ip local pool Home-Fw 192.168.40.10 - 192.168.40.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif Outside&lt;BR /&gt;security-level 0&lt;BR /&gt;pppoe client vpdn group BT-PoE&lt;BR /&gt;ip address pppoe setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 10.10.50.254&amp;nbsp; &amp;nbsp; 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif Wi-Fi&lt;BR /&gt;security-level 90&lt;BR /&gt;ip address 192.168.1.10&amp;nbsp; &amp;nbsp; 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;management-only&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup Outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 8.8.8.8&lt;BR /&gt;domain-name Home-Fw.local&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Inside-Network&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;object network Wi-Fi&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network VPN&lt;BR /&gt;subnet 192.168.40.0 255.255.255.0&lt;BR /&gt;object network Inside&lt;BR /&gt;subnet 10.10.50.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object 10.10.50.0 255.255.255.0&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip 10.10.50.0 255.255.255.0 any&lt;BR /&gt;access-list Wi-Fi_access_in extended permit ip 192.168.1.0 255.255.255.0 any&lt;BR /&gt;access-list Home-Fw standard permit 10.10.50.0 255.255.255.0&lt;BR /&gt;access-list Home-Fw standard permit 192.168.10.0 255.255.255.0&lt;BR /&gt;access-list Home-Fw standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list Outside_access_in extended permit ip object VPN object-group DM_INLINE_NETWORK_1&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Wi-Fi 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;no failover wait-disable&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7131&amp;nbsp; &amp;nbsp; -101.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (Outside,inside) source static VPN VPN destination static Inside Inside no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network Inside-Network&lt;BR /&gt;nat (inside,Outside) dynamic interface&lt;BR /&gt;object network Wi-Fi&lt;BR /&gt;nat (Wi-Fi,Outside) dynamic interface&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group Wi-Fi_access_in in interface Wi-Fi&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.10.0 255.255.255.0 management&lt;BR /&gt;http 10.10.50.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 Wi-Fi&lt;BR /&gt;http 192.168.40.0 255.255.255.0 Outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha256&lt;BR /&gt;ssh 10.10.50.0 255.255.255.0 inside&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group BT-PoE request dialout pppoe&lt;BR /&gt;vpdn group BT-PoE localname&lt;BR /&gt;vpdn group BT-PoE ppp authentication chap&lt;BR /&gt;vpdn username user password *****&lt;BR /&gt;dhcpd dns 208.67.222.222&amp;nbsp; &amp;nbsp; 208.67.220.220&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.65-&amp;nbsp; &amp;nbsp;192.168.1.250 Wi-Fi&lt;BR /&gt;dhcpd enable Wi-Fi&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable Outside&lt;BR /&gt;hsts&lt;BR /&gt;enable&lt;BR /&gt;max-age 31536000&lt;BR /&gt;include-sub-domains&lt;BR /&gt;no preload&lt;BR /&gt;http-headers&lt;BR /&gt;x-content-type-options&lt;BR /&gt;x-xss-protection&lt;BR /&gt;content-security-policy&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.9.01095-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect profiles Home-Fw disk0:/Home-Fw.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy Home-Fw internal&lt;BR /&gt;group-policy Home-Fw attributes&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-simultaneous-logins 3&lt;BR /&gt;vpn-idle-timeout 30&lt;BR /&gt;vpn-session-timeout none&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client ssl-clientless&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Home-Fw&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value Home-Fw type user&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username user1d password ***** pbkdf2 privilege 15&lt;BR /&gt;username user1 password ***** pbkdf2 privilege 15&lt;BR /&gt;tunnel-group Home-Fw type remote-access&lt;BR /&gt;tunnel-group Home-Fw general-attributes&lt;BR /&gt;address-pool Home-Fw&lt;BR /&gt;default-group-policy Home-Fw&lt;BR /&gt;tunnel-group Home-Fw webvpn-attributes&lt;BR /&gt;group-alias Home-Fw enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 14:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059101#M1110772</guid>
      <dc:creator>Psmurali89</dc:creator>
      <dc:date>2024-04-07T14:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059102#M1110773</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1425405"&gt;@Psmurali89&lt;/a&gt; to allow management of the ASA over a VPN you need to use the &lt;STRONG&gt;management-access &amp;lt;interface name&amp;gt;&lt;/STRONG&gt; command.&lt;/P&gt;
&lt;P&gt;"If your VPN tunnel terminates on one interface, but you want to manage the ASA by accessing a different interface, you can identify that interface as a management-access interface. For example, if you enter the ASA from the outside interface, this feature lets you connect to the inside interface using ASDM, SSH, Telnet, or SNMP; or you can ping the inside interface when entering from the outside interface"&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/access_management.pdf" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/access_management.pdf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 14:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059102#M1110773</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-07T14:10:20Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059212#M1110835</link>
      <description>&lt;P&gt;Thank you, I have made the changes but i still cant able to ping or use ASDM on inside interface after connecting to anyconnect vpn. It still says&amp;nbsp;&lt;SPAN&gt;"routing failed to locate next hop for TCP".&amp;nbsp; Not sure what am missing here.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Home-FW# sh run | i management-acc&lt;BR /&gt;management-access inside&lt;BR /&gt;Home-FW#&lt;/P&gt;&lt;P&gt;Home-FW# sh run | i nat&lt;BR /&gt;nat (inside,Outside) source static Inside Inside destination static VPN VPN&lt;BR /&gt;nat (inside,Outside) dynamic interface&lt;BR /&gt;nat (Wi-Fi,Outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 16:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059212#M1110835</guid>
      <dc:creator>Psmurali89</dc:creator>
      <dc:date>2024-04-07T16:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059215#M1110836</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1425405"&gt;@Psmurali89&lt;/a&gt; enable http access from the VPN to the inside interface.&lt;/P&gt;
&lt;PRE&gt;http 192.168.40.0 255.255.255.0 &lt;STRONG&gt;inside&lt;/STRONG&gt;&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 17:03:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059215#M1110836</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-04-07T17:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059288#M1110840</link>
      <description>&lt;P&gt;Unfortunately its still the same. I cant ping, browse or connect via ASDM. Does the NAT rule looks ok? When i ping 10.10.50.254 from laptop, I cant even see the hits in Outside incoming access rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;# sh run | i http&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.10.0 255.255.255.0 management&lt;BR /&gt;http 10.10.50.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 Wi-Fi&lt;BR /&gt;http 92.40.190.7 255.255.255.255 Outside&lt;BR /&gt;http 192.168.40.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Route Print from laptop:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;IPv4 Route Table&lt;BR /&gt;===========================================================================&lt;BR /&gt;Active Routes:&lt;BR /&gt;Network Destination Netmask Gateway Interface Metric&lt;BR /&gt;0.0.0.0 0.0.0.0 192.168.204.111&amp;nbsp; &amp;nbsp;192.168.204.210&amp;nbsp; &amp;nbsp;55&lt;BR /&gt;8.8.8.8 255.255.255.255&amp;nbsp; &amp;nbsp;192.168.40.1 192.168.40.11&amp;nbsp; 2&lt;BR /&gt;10.10.50.0 255.255.255.0 192.168.40.1 192.168.40.11&amp;nbsp; 2&lt;/P&gt;&lt;P&gt;192.168.1.0 255.255.255.0 192.168.40.1 192.168.40.11&amp;nbsp; 2&lt;BR /&gt;192.168.10.0 255.255.255.0 192.168.40.1 192.168.40.11&amp;nbsp; 2&lt;BR /&gt;192.168.40.0 255.255.255.0 On-link 192.168.40.11&amp;nbsp; 257&lt;BR /&gt;192.168.40.11&amp;nbsp; &amp;nbsp;255.255.255.255 On-link 192.168.40.11&amp;nbsp; 257&lt;/P&gt;</description>
      <pubDate>Sun, 07 Apr 2024 18:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5059288#M1110840</guid>
      <dc:creator>Psmurali89</dc:creator>
      <dc:date>2024-04-07T18:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5073065#M1111419</link>
      <description>&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestion on how to fix this issue please?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 14:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5073065#M1111419</guid>
      <dc:creator>Psmurali89</dc:creator>
      <dc:date>2024-04-18T14:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: routing failed to locate next hop for TCP - Anyconnect</title>
      <link>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5073120#M1111425</link>
      <description>&lt;P&gt;I have two ideas:&lt;/P&gt;&lt;P&gt;nat (inside,Outside) source static Inside Inside destination static VPN VPN &lt;STRONG&gt;no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;"route-lookup" is typically a must in this scenario, although ASA behavior changed many times. Refer to CSCtr16184. Also, I never remember what needs to be configured here:&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;http 192.168.40.0 255.255.255.0 Outside&lt;/P&gt;&lt;P&gt;Secondly, if above doesn't help, the issue might be due to PPPoE. Believe you or not, routing in the control-plane is implemented differently for ethernet and PPPoE interfaces. If this is the case, there is no workaround. But I hope that adding "route-lookup" will resolve the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Apr 2024 15:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-failed-to-locate-next-hop-for-tcp-anyconnect/m-p/5073120#M1111425</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-04-18T15:03:08Z</dc:date>
    </item>
  </channel>
</rss>

