<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028577#M132399</link>
    <description>&lt;P&gt;Hello RJI,&lt;/P&gt;&lt;P&gt;Thanks For Your Reply, i cahanged the NAT Rule as you mentioned but still can not ping to inside LAN&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2020 21:19:11 GMT</pubDate>
    <dc:creator>Moamen Elsayed</dc:creator>
    <dc:date>2020-02-12T21:19:11Z</dc:date>
    <item>
      <title>Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028227#M132375</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;am using FBR 1010 to Configure AnyConnect Remote Access, on my test lap i used 192.168.1.0/24 as outside, and 5.5.5.0/24 as Inside, FW IP is 5.5.5.1 and outside VPN IP is 192.168.1.111&lt;/P&gt;&lt;P&gt;i connected VPN Client and i can access internet but i can not ping or &lt;A href="https://5.5.5.1" target="_blank" rel="noopener"&gt;https://5.5.5.1&lt;/A&gt;, any Help???&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161527.png" style="width: 790px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67062iFB33F2B6714F2D7D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161527.png" alt="Annotation 2020-02-12 161527.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161610.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67061iA00133A4241230F3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161610.png" alt="Annotation 2020-02-12 161610.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161737.png" style="width: 811px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67063iD0B5A6B35EAFDAAB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161737.png" alt="Annotation 2020-02-12 161737.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161756.png" style="width: 809px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67064i618BF2D420E4C3C4/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161756.png" alt="Annotation 2020-02-12 161756.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161812.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67065iB9B6AF509203CE4C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161812.png" alt="Annotation 2020-02-12 161812.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161822.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67066i34608A0834C0664F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161822.png" alt="Annotation 2020-02-12 161822.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161908.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67067i26495D77B93EA636/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161908.png" alt="Annotation 2020-02-12 161908.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161930.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67068iB8936B92E62294E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161930.png" alt="Annotation 2020-02-12 161930.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 161950.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67069i0219CB5E9E8C3194/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 161950.png" alt="Annotation 2020-02-12 161950.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Annotation 2020-02-12 162101.png" style="width: 987px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67070i5C52881EBEC494E9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Annotation 2020-02-12 162101.png" alt="Annotation 2020-02-12 162101.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:54:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028227#M132375</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-21T17:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028264#M132383</link>
      <description>Hi,&lt;BR /&gt;That's not possible. When you connect to the FTD via Remote Access VPN your traffic enters the FTD from the outside interface, by design you cannot ping the FTD/ASA's far interface, in this instance the inside interface. You should test connectivity by pinging through the FTD to a device behind the firewall, not the firewall itself.&lt;BR /&gt;&lt;BR /&gt;Aside from that it doesn't look like you have a NAT exemption rule defined. You need to define a NAT rule from that does not NAT traffic your inside network to your RAVPN IP Pool.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Wed, 12 Feb 2020 14:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028264#M132383</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-12T14:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028462#M132386</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i Add Nat Rules Below, But still having same issue&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 18:43:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028462#M132386</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-12T18:43:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028532#M132393</link>
      <description>&lt;P&gt;You rule should ressemble something like this:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="5.PNG" style="width: 702px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/67097i7F9613C11C8F2F02/image-size/large?v=v2&amp;amp;px=999" role="button" title="5.PNG" alt="5.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AND you need to ensure this NAT exemption rule is above your current rule #1, as at the moment your traffic from inside_2 will be natted on the outside interface.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 20:18:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028532#M132393</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-12T20:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028577#M132399</link>
      <description>&lt;P&gt;Hello RJI,&lt;/P&gt;&lt;P&gt;Thanks For Your Reply, i cahanged the NAT Rule as you mentioned but still can not ping to inside LAN&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 21:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028577#M132399</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-12T21:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028579#M132407</link>
      <description>&lt;P&gt;Provide the output of "show vpn-sessiondb detail anyconnect" and "show nat detail"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;EDIT: You Firewall rule above doesn't permit trafic from outside to inside. All RAVPN traffic is sourced from outside, so you need to explictly permit traffic to inside.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 21:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028579#M132407</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-12T21:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028610#M132412</link>
      <description>&lt;P&gt;Hello RJI,&lt;/P&gt;&lt;P&gt;i Updated NAT Rules But Same Issue, I Can not reach to remote inside&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 22:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028610#M132412</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-12T22:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028611#M132416</link>
      <description>i do show nat detail from cli and here is output&lt;BR /&gt;&amp;gt; show nat detail&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (outside) to (outside) source static VPNPool VPNPool destination static InsideNetwork InsideNetwork&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.10.0/24, Translated: 10.10.10.0/24&lt;BR /&gt;Destination - Origin: 5.5.5.0/24, Translated: 5.5.5.0/24&lt;BR /&gt;2 (outside) to (inside_2) source static VPNPool VPNPool destination static InsideNetwork InsideNetwork&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 10.10.10.0/24, Translated: 10.10.10.0/24&lt;BR /&gt;Destination - Origin: 5.5.5.0/24, Translated: 5.5.5.0/24&lt;BR /&gt;3 (inside_2) to (outside) source dynamic any-ipv4 interface&lt;BR /&gt;translate_hits = 186, untranslate_hits = 333&lt;BR /&gt;Source - Origin: 0.0.0.0/0, Translated: 192.168.3.111/24&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (nlp_int_tap) to (inside_2) source static nlp_server_0_http_intf3 interface service tcp https https&lt;BR /&gt;translate_hits = 0, untranslate_hits = 102&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 5.5.5.1/24&lt;BR /&gt;Service - Protocol: tcp Real: https Mapped: https&lt;BR /&gt;2 (nlp_int_tap) to (inside_2) source static nlp_server_0_ssh_intf3 interface service tcp ssh ssh&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 5.5.5.1/24&lt;BR /&gt;Service - Protocol: tcp Real: ssh Mapped: ssh&lt;BR /&gt;3 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_intf10 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;4 (nlp_int_tap) to (outside) source dynamic nlp_client_0_intf2 interface&lt;BR /&gt;translate_hits = 311, untranslate_hits = 101&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 192.168.3.111/24&lt;BR /&gt;5 (nlp_int_tap) to (inside_2) source dynamic nlp_client_0_intf3 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 5.5.5.1/24&lt;BR /&gt;6 (nlp_int_tap) to (inside_3) source dynamic nlp_client_0_intf4 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;7 (nlp_int_tap) to (inside_4) source dynamic nlp_client_0_intf5 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;8 (nlp_int_tap) to (inside_5) source dynamic nlp_client_0_intf6 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;9 (nlp_int_tap) to (inside_6) source dynamic nlp_client_0_intf7 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;10 (nlp_int_tap) to (inside_7) source dynamic nlp_client_0_intf8 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;11 (nlp_int_tap) to (inside_8) source dynamic nlp_client_0_intf9 interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 169.254.1.3/32, Translated: 0.0.0.0/32&lt;BR /&gt;12 (nlp_int_tap) to (diagnostic) source dynamic nlp_client_0_ipv6_intf10 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;13 (nlp_int_tap) to (outside) source dynamic nlp_client_0_ipv6_intf2 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;14 (nlp_int_tap) to (inside_2) source dynamic nlp_client_0_ipv6_intf3 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;15 (nlp_int_tap) to (inside_3) source dynamic nlp_client_0_ipv6_intf4 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;16 (nlp_int_tap) to (inside_4) source dynamic nlp_client_0_ipv6_intf5 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;17 (nlp_int_tap) to (inside_5) source dynamic nlp_client_0_ipv6_intf6 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;18 (nlp_int_tap) to (inside_6) source dynamic nlp_client_0_ipv6_intf7 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;19 (nlp_int_tap) to (inside_7) source dynamic nlp_client_0_ipv6_intf8 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;20 (nlp_int_tap) to (inside_8) source dynamic nlp_client_0_ipv6_intf9 interface ipv6&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: fd00:0:0:1::3/128, Translated:&lt;BR /&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside_2) to (outside) source dynamic InsideNetwork interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 5.5.5.0/24, Translated: 192.168.3.111/24</description>
      <pubDate>Wed, 12 Feb 2020 22:27:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028611#M132416</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-12T22:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028616#M132419</link>
      <description>show vpn-sessiondb detail anyconnect&lt;BR /&gt;&lt;BR /&gt;&amp;gt; show vpn-sessiondb detail anyconnect&lt;BR /&gt;Session Type: AnyConnect Detailed&lt;BR /&gt;Username : user Index : 3&lt;BR /&gt;Assigned IP : 10.10.10.1 Public IP : 192.168.3.61&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel&lt;BR /&gt;License : AnyConnect Premium&lt;BR /&gt;Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES-GCM-256&lt;BR /&gt;Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA384&lt;BR /&gt;Bytes Tx : 15942 Bytes Rx : 2893&lt;BR /&gt;Pkts Tx : 12 Pkts Rx : 34&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;Group Policy : DfltGrpPolicy Tunnel Group : MegaSoft&lt;BR /&gt;Login Time : 22:29:01 UTC Wed Feb 12 2020&lt;BR /&gt;Duration : 0h:00m:08s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;BR /&gt;Audt Sess ID : c0a8036f000030005e447c2d&lt;BR /&gt;Security Grp : none Tunnel Zone : 0&lt;BR /&gt;AnyConnect-Parent Tunnels: 1&lt;BR /&gt;SSL-Tunnel Tunnels: 1&lt;BR /&gt;AnyConnect-Parent:&lt;BR /&gt;Tunnel ID : 3.1&lt;BR /&gt;Public IP : 192.168.3.61&lt;BR /&gt;Encryption : none Hashing : none&lt;BR /&gt;TCP Src Port : 50508 TCP Dst Port : 443&lt;BR /&gt;Auth Mode : userPassword&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 29 Minutes&lt;BR /&gt;Client OS : win&lt;BR /&gt;Client OS Ver: 10.0.18362&lt;BR /&gt;Client Type : AnyConnect&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.02042&lt;BR /&gt;Bytes Tx : 7971 Bytes Rx : 0&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 0&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;&lt;BR /&gt;SSL-Tunnel:&lt;BR /&gt;Tunnel ID : 3.2&lt;BR /&gt;Assigned IP : 10.10.10.1 Public IP : 192.168.3.61&lt;BR /&gt;Encryption : AES-GCM-256 Hashing : SHA384&lt;BR /&gt;Ciphersuite : ECDHE-RSA-AES256-GCM-SHA384&lt;BR /&gt;Encapsulation: TLSv1.2 TCP Src Port : 50514&lt;BR /&gt;TCP Dst Port : 443 Auth Mode : userPassword&lt;BR /&gt;Rekey Int (T): 240 Seconds Rekey Left(T): 237 Seconds&lt;BR /&gt;Idle Time Out: 30 Minutes Idle TO Left : 30 Minutes&lt;BR /&gt;Client OS : Windows&lt;BR /&gt;Client Type : SSL VPN Client&lt;BR /&gt;Client Ver : Cisco AnyConnect VPN Agent for Windows 4.8.02042&lt;BR /&gt;Bytes Tx : 7971 Bytes Rx : 2893&lt;BR /&gt;Pkts Tx : 6 Pkts Rx : 34&lt;BR /&gt;Pkts Tx Drop : 0 Pkts Rx Drop : 0&lt;BR /&gt;</description>
      <pubDate>Wed, 12 Feb 2020 22:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028616#M132419</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-12T22:30:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028621#M132420</link>
      <description>&lt;P&gt;You needed to update your FIREWALL rule in the Access Control Policy, not the nat rule. The NAT rule you had previously would have sufficed, you need to change it back. When configured correctly the output of the NAT Exemption rule from the CLI would look like this:&lt;BR /&gt;&lt;BR /&gt;"nat (inside_2,outside) source static InsideNetwork InsideNetwork destination static VPNPool VPNPool no-proxy-arp" - ensure it's the top nat rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;InsideNetwork = inside_2 interface and VPNPool = outside interface, you need to ensure the nat rules are firewall rules reflect the correct source/destination interface.&lt;BR /&gt;&lt;BR /&gt;Change your NAT rule back and amend the firewall rule, permitting traffic between the VPNPool and InsideNetwork and another permitting traffic from InsideNetwork to VPNPool.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2020 22:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028621#M132420</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-12T22:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028829#M132421</link>
      <description>&lt;P&gt;Helli RJI,&lt;/P&gt;&lt;P&gt;Thanks For youe Reply, Kindly can you check update rules below, i have changed as you mentioned, but no things changed, am still can not ping to remote inside lan&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 08:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4028829#M132421</guid>
      <dc:creator>Moamen Elsayed</dc:creator>
      <dc:date>2020-02-13T08:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FPR 1010 AnyConnect Can not Access Remote Internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4029051#M132422</link>
      <description>What device are you pinging? Does it have a local firewall turned on that could be blocking the ping?&lt;BR /&gt;&lt;BR /&gt;Provide the output of "route print" from your the AnyConnect client computer, once connected to the VPN&lt;BR /&gt;Provide the output of "show nat detail" and "show vpn-sessiondb detail anyconnect" from the FTD&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 13 Feb 2020 15:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fpr-1010-anyconnect-can-not-access-remote-internal-lan/m-p/4029051#M132422</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-13T15:39:30Z</dc:date>
    </item>
  </channel>
</rss>

