<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I'm not using AnyConnect to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970226#M144165</link>
    <description>&lt;P&gt;I'm not using AnyConnect to establish the VPN, i'm using the Windows 10 built-in VPN client, which is what i've always used in the past when setting up this kind of connection...but its been a single ASA on the network, not two. &amp;nbsp;I believe that's why i'm having these issues. &amp;nbsp;So I don't have a route tab.&lt;/P&gt;
&lt;P&gt;However, if it helps any, when this didn't work..I did go through the AnyConnect wizard and setup the ASA 2 for AnyConnect and tried to connect that way and it established connection but still wouldn't let me get to any devices on the network. &amp;nbsp;So regardless of the method, the result has been the same.&lt;/P&gt;</description>
    <pubDate>Sun, 18 Dec 2016 05:02:09 GMT</pubDate>
    <dc:creator>sherenian</dc:creator>
    <dc:date>2016-12-18T05:02:09Z</dc:date>
    <item>
      <title>Cisco ASA 5505 IPSEC VPN Connecting but not routing traffic</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970221#M144159</link>
      <description>&lt;P&gt;I have a pair of ASA's on my network,&lt;/P&gt;
&lt;P&gt;Both ASA's have their own Static WAN IP's&lt;/P&gt;
&lt;P&gt;Internal Interface IP of ASA 1 is 10.7.0.1 (its a /24 subnet)&lt;/P&gt;
&lt;P&gt;Internal Interface IP of ASA 2 is 10.7.0.2 (same subnet)&lt;/P&gt;
&lt;P&gt;ASA 1 is running DHCP (scope is 10.7.0.40-100) and hands out the addresses to the servers/computers, it also has Site to Site VPN's configured and functioning between 2 of our offices.&lt;/P&gt;
&lt;P&gt;ASA 2 has been setup for IPSEC VPN, and external clients can connect, authenticate to ASA 2, receive an IP address from the 10.7.50.0 vpn pool that I created but can't ping the 10.7.0.0 subnet or access any devices on it. The VPN was setup using the ASDM Wizard and i've done this a few times in the past with no issues, so I can't figure out what's wrong in this case. Its too hard to mess up the IPSEC VPN config so I don't think I did anything wrong there, I suspect the problem is on the other ASA&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For more info...the WAN ports of the ASA's plug into the same modem to get out to the internet. ASA 2 has a LAN port plugged directly into one of ASA 1's LAN ports, that's how it can see devices on the LAN.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;I did add "route inside 10.7.50.0 255.255.255.0 10.7.0.2" on ASA 1 and I can now ping 10.7.0.1 but nothing else on the subnet.&lt;/P&gt;
&lt;P&gt;Is there an ACL that needs to be added as well??&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any help would be appreciated&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:40:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970221#M144159</guid>
      <dc:creator>sherenian</dc:creator>
      <dc:date>2019-03-12T08:40:04Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970222#M144161</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Unless configured with a VPN filter, you may find your VPN client is bypassing the ACLs you have in place anyway, on ingress. You would need to define an ACE for connections initiated from the DMZ/Inside to 10.7.50.0/24.&lt;/P&gt;
&lt;P&gt;It could be that you need to place a NAT exception rule in place to ensure traffic arriving from 10.7.0.0/7 to 10.7.50.0/24 isn't be matched against another NAT statement.&lt;/P&gt;
&lt;P&gt;If possible, share the running configuration.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 09:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970222#M144161</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-17T09:46:51Z</dc:date>
    </item>
    <item>
      <title>Hi Matt,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970223#M144162</link>
      <description>&lt;P&gt;Hi Matt,&lt;/P&gt;
&lt;P&gt;Here is the sanitized running config of ASA 1&lt;/P&gt;
&lt;P&gt;-----------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;:&lt;BR /&gt;ASA Version 8.4(4) &lt;BR /&gt;!&lt;BR /&gt;hostname Bruton&lt;BR /&gt;enable password 2Vnu/DKqj.gNMe.K encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; !&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.7.0.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 123.123.123.123 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.0.0_24&lt;BR /&gt; subnet 10.7.0.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.16.0_24&lt;BR /&gt; subnet 10.7.16.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.40.0_24&lt;BR /&gt; subnet 10.7.40.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.24.0_24&lt;BR /&gt; subnet 10.7.24.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.32.0_24&lt;BR /&gt; subnet 10.7.32.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.64.0_24&lt;BR /&gt; subnet 10.7.64.0 255.255.255.0&lt;BR /&gt;object network OldServer&lt;BR /&gt; host 10.7.0.20&lt;BR /&gt; description OldServer&lt;BR /&gt;access-list outside_cryptomap extended permit ip 10.7.0.0 255.255.255.0 object NETWORK_OBJ_10.7.16.0_24 &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 10.7.0.0 255.255.255.0 10.7.40.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_2 extended permit ip 10.7.0.0 255.255.255.0 10.7.24.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip 10.7.0.0 255.255.255.0 10.7.32.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip 10.7.0.0 255.255.255.0 object NETWORK_OBJ_10.7.64.0_24 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.40.0_24 NETWORK_OBJ_10.7.40.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.24.0_24 NETWORK_OBJ_10.7.24.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.32.0_24 NETWORK_OBJ_10.7.32.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.16.0_24 NETWORK_OBJ_10.7.16.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.64.0_24 NETWORK_OBJ_10.7.64.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network OldServer&lt;BR /&gt; nat (inside,outside) static interface service tcp 3389 3389 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx64.45 1&lt;BR /&gt;route inside 10.7.50.0 255.255.255.0 10.7.0.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt; http 10.7.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt; crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer xxx.xxx.xxx.xxx &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer xxx.xxx.xxx.xxx &lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap_2&lt;BR /&gt;crypto map outside_map 3 set peer xxx.xxx.xxx.xxx &lt;BR /&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 3 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set peer xxx.xxx.xxx.xxx &lt;BR /&gt;crypto map outside_map 4 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 5 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map 5 set peer xxx.xxx.xxx.xxx &lt;BR /&gt;crypto map outside_map 5 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 5 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt; crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt; crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt; crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt; telnet 10.7.0.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.7.0.40-10.7.0.245 inside&lt;BR /&gt;dhcpd dns xxx.xxx.xxx.61 8.8.8.8 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;group-policy GroupPolicy_xxx.xxx.194.26 internal&lt;BR /&gt;group-policy GroupPolicy_xxx.xxx.194.26 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_xxx.xxx64.54 internal&lt;BR /&gt;group-policy GroupPolicy_xxx.xxx64.54 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_xxx.xxx64.42 internal&lt;BR /&gt; group-policy GroupPolicy_xxx.xxx64.42 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_xxx.xxx64.50 internal&lt;BR /&gt;group-policy GroupPolicy_xxx.xxx64.50 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_xxx.xxx.80.60 internal&lt;BR /&gt;group-policy GroupPolicy_xxx.xxx.80.60 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;username patient password GEqTPF5KLDUpidaX encrypted&lt;BR /&gt;tunnel-group xxx.xxx64.42 type ipsec-l2l&lt;BR /&gt;tunnel-group xxx.xxx64.42 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_xxx.xxx64.42&lt;BR /&gt;tunnel-group xxx.xxx64.42 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group xxx.xxx64.54 type ipsec-l2l&lt;BR /&gt;tunnel-group xxx.xxx64.54 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_xxx.xxx64.54&lt;BR /&gt;tunnel-group xxx.xxx64.54 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group xxx.xxx.194.26 type ipsec-l2l&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; tunnel-group xxx.xxx.194.26 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_xxx.xxx.194.26&lt;BR /&gt;tunnel-group xxx.xxx.194.26 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group xxx.xxx64.50 type ipsec-l2l&lt;BR /&gt;tunnel-group xxx.xxx64.50 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_xxx.xxx64.50&lt;BR /&gt;tunnel-group xxx.xxx64.50 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;tunnel-group xxx.xxx.80.60 type ipsec-l2l&lt;BR /&gt;tunnel-group xxx.xxx.80.60 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_xxx.xxx.80.60&lt;BR /&gt;tunnel-group xxx.xxx.80.60 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt; !&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt; service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:ddae6a11ed3b928035d47839ea85d725&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 18:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970223#M144162</guid>
      <dc:creator>sherenian</dc:creator>
      <dc:date>2016-12-17T18:15:38Z</dc:date>
    </item>
    <item>
      <title>And the running config of ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970224#M144163</link>
      <description>&lt;P&gt;And the running config of ASA 2 (the one that accepts the L2TP VPN connections)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(4) &lt;BR /&gt;!&lt;BR /&gt;hostname BrutonVPN&lt;BR /&gt;enable password 2Vnu/DKqj.gNMe.K encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; !&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.7.0.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 123.123.123.123 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.0.0_24&lt;BR /&gt; subnet 10.7.0.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.7.50.0_28&lt;BR /&gt; subnet 10.7.50.0 255.255.255.240&lt;BR /&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 10.7.0.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool PP-VPN 10.7.50.5-10.7.50.10 mask 255.255.255.0&lt;BR /&gt; no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-732.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.7.0.0_24 NETWORK_OBJ_10.7.0.0_24 destination static NETWORK_OBJ_10.7.50.0_28 NETWORK_OBJ_10.7.50.0_28 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 123.123.123.123 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt; http 10.7.0.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-256-SHA ESP-3DES-SHA ESP-DES-SHA ESP-AES-128-SHA-TRANS ESP-AES-192-SHA-TRANS ESP-AES-256-SHA-TRANS ESP-3DES-SHA-TRANS ESP-DES-SHA-TRANS&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt;encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; dns-server value 8.8.8.8&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;BR /&gt;username user1 password 8nOwfeP86VRxjYiqBUepxA== nt-encrypted privilege 0&lt;BR /&gt;username user1 attributes&lt;BR /&gt; vpn-group-policy DefaultRAGroup&lt;BR /&gt;username user2 password JlPX5Zyq3F/BE5A46phVuA== nt-encrypted privilege 0&lt;BR /&gt;username user2 attributes&lt;BR /&gt; vpn-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool PP-VPN&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt; no authentication chap&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect pptp &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:2bf674cd3b9e9855f85ffc421b3e5cd4&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 18:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970224#M144163</guid>
      <dc:creator>sherenian</dc:creator>
      <dc:date>2016-12-17T18:21:12Z</dc:date>
    </item>
    <item>
      <title>Just to confirm,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970225#M144164</link>
      <description>&lt;P&gt;Just to confirm,&lt;/P&gt;
&lt;P&gt;Once the VPN is established, you are seeing the secured route 10.7.0.0/24 under the "route" tab?&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 21:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970225#M144164</guid>
      <dc:creator>mattjones03</dc:creator>
      <dc:date>2016-12-17T21:04:51Z</dc:date>
    </item>
    <item>
      <title>I'm not using AnyConnect to</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970226#M144165</link>
      <description>&lt;P&gt;I'm not using AnyConnect to establish the VPN, i'm using the Windows 10 built-in VPN client, which is what i've always used in the past when setting up this kind of connection...but its been a single ASA on the network, not two. &amp;nbsp;I believe that's why i'm having these issues. &amp;nbsp;So I don't have a route tab.&lt;/P&gt;
&lt;P&gt;However, if it helps any, when this didn't work..I did go through the AnyConnect wizard and setup the ASA 2 for AnyConnect and tried to connect that way and it established connection but still wouldn't let me get to any devices on the network. &amp;nbsp;So regardless of the method, the result has been the same.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Dec 2016 05:02:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-ipsec-vpn-connecting-but-not-routing-traffic/m-p/2970226#M144165</guid>
      <dc:creator>sherenian</dc:creator>
      <dc:date>2016-12-18T05:02:09Z</dc:date>
    </item>
  </channel>
</rss>

