<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You need to allow the ASA to in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986311#M155588</link>
    <description>&lt;P&gt;You need to allow the ASA to route traffic from the VPN back out the on the interface it arrived, which is the outside.&lt;/P&gt;
&lt;P&gt;Enter the command same-security-traffic permit intra-interface in global configuration mode.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Please rate any helpful posts.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Sep 2016 13:53:27 GMT</pubDate>
    <dc:creator>S-Lemming</dc:creator>
    <dc:date>2016-09-01T13:53:27Z</dc:date>
    <item>
      <title>ASA AnyConnect VPN can ping but not browse</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986310#M155587</link>
      <description>&lt;P&gt;I'm throwing in the white flag.. I have an ASA 5508 with ver 9.5. I have setup an AnyConnect Profile, VPN Pool, split tunneling etc. Via AnyConnect VPN software I can connect, authenticate and see internal network just as I should. I can ping google but I cannot browse the internet while connected to the VPN. I am pulling DNS from the ASA. I've tried Charter and Google DNS. Still users cannot browse internet while connected via VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hopefully from the pieces below someone can see something I have that I shouldn't or vice versa. Internal network 192.168.3.x, vpn pool 192.168.100.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip local pool GriffinVPNPool1 192.168.100.1-192.168.100.255 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;object network NETWORK_OBJ_192.168.3.0_24&lt;BR /&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;access-list Split_Tunnel_List standard permit 192.168.3.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;
&lt;P&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.100.0_24 NETWORK_OBJ_192.168.100.0_24 no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 outside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 inside&lt;BR /&gt;ssl trust-point ASDM_Launcher_Access_TrustPoint_1 inside vpnlb-ip&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.2.04039-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-macosx-i386-4.2.00096-k9.pkg 2&lt;BR /&gt; anyconnect profiles GriffinVPN_client_profile disk0:/GriffinVPN_client_profile.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt; error-recovery disable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy GroupPolicy_GriffinVPN internal&lt;BR /&gt;group-policy GroupPolicy_GriffinVPN attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 24.196.64.53&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt; default-domain none&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt; inspect icmp&lt;BR /&gt; inspect icmp error&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you in advance for help&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986310#M155587</guid>
      <dc:creator>taspencegltc</dc:creator>
      <dc:date>2019-03-12T08:13:14Z</dc:date>
    </item>
    <item>
      <title>You need to allow the ASA to</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986311#M155588</link>
      <description>&lt;P&gt;You need to allow the ASA to route traffic from the VPN back out the on the interface it arrived, which is the outside.&lt;/P&gt;
&lt;P&gt;Enter the command same-security-traffic permit intra-interface in global configuration mode.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Please rate any helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2016 13:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986311#M155588</guid>
      <dc:creator>S-Lemming</dc:creator>
      <dc:date>2016-09-01T13:53:27Z</dc:date>
    </item>
    <item>
      <title>Worked perfectly. Thank you!</title>
      <link>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986312#M155589</link>
      <description>&lt;P&gt;Worked perfectly. Thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2016 14:40:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-anyconnect-vpn-can-ping-but-not-browse/m-p/2986312#M155589</guid>
      <dc:creator>taspencegltc</dc:creator>
      <dc:date>2016-09-01T14:40:03Z</dc:date>
    </item>
  </channel>
</rss>

