<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941470#M155891</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you show output of: (delete public IPs).&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show crypto isakmp sa&lt;BR /&gt;show crypto ipsec sa&lt;/PRE&gt;
&lt;P&gt;//Cristian&lt;/P&gt;</description>
    <pubDate>Fri, 05 Aug 2016 06:57:58 GMT</pubDate>
    <dc:creator>Cristian Nilsson</dc:creator>
    <dc:date>2016-08-05T06:57:58Z</dc:date>
    <item>
      <title>Tunnel with LAN and Wifi in same network group, having problems</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941468#M155889</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I have an active IKEv2 tunnel running through my LAN which is great. When I created it, I made my network group do my LAN 192.168.80.0/24 and my Wireless 192.168.83.0/24 for everything. The fact that my LAN is tunneled but my wifi isn't, I'm wondering if I'm missing something dumb.&lt;BR /&gt;&lt;BR /&gt;Here's the part where I might be having a problem...&lt;BR /&gt;&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.80.7-192.168.80.149 inside&lt;BR /&gt;dhcpd dns 10.0.0.10 [static DNS]&amp;nbsp;interface inside&lt;BR /&gt;dhcpd option 3 ip 192.168.80.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.83.7-192.168.83.149 wifi&lt;BR /&gt;dhcpd dns 10.0.0.10 [static DNS]&amp;nbsp;interface wifi&lt;BR /&gt;dhcpd option 3 ip 192.168.83.1 interface wifi&lt;BR /&gt;dhcpd enable wifi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If they're in the same network group tunneling to the same IP, is there there a problem with the gateway? Perhaps it has something to do with that DHCPD ioption 3? My lan and wifi are on two separate interface, and this is a very basic setup. I notice when it mentions my IPsec through ADSM, it doesn't mention the 192.168.83.0/24 network, only 192.168.80.0/24.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do I have to create two separate tunnels for LAN and wifi?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:05:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941468#M155889</guid>
      <dc:creator>JpetersonMonarch</dc:creator>
      <dc:date>2019-03-12T08:05:44Z</dc:date>
    </item>
    <item>
      <title>Here's my edited show running</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941469#M155890</link>
      <description>&lt;P&gt;Here's my edited show running-config&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;
&lt;P&gt;: Saved&lt;/P&gt;
&lt;P&gt;: &lt;BR /&gt;: Hardware: ASA5506, 4096 MB RAM, CPU Atom C2000 series 1250 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.6(1) &lt;BR /&gt;!&lt;BR /&gt;hostname myhosts&lt;BR /&gt;domain-name mydomain.com&lt;BR /&gt;enable password []edit&amp;nbsp;encrypted&lt;BR /&gt;names&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address [static] 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.80.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; nameif wifi&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.83.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name mydomain.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network MyCorp&lt;BR /&gt; subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;object network MyCorp2&lt;BR /&gt; subnet [edit] 255.255.255.0&lt;BR /&gt;object network 0.0.0.0&lt;BR /&gt; host 0.0.0.0&lt;BR /&gt;object network 10.0.0.0&lt;BR /&gt; subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network 127.0.0.1&lt;BR /&gt; subnet 127.0.0.0 255.255.255.0&lt;BR /&gt;object network 172.16.0.0&lt;BR /&gt; subnet 172.16.0.0 255.240.0.0&lt;BR /&gt;object network 192.168.0.0&lt;BR /&gt; subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object-group network MyVPN&lt;BR /&gt; network-object object MyCorp&lt;BR /&gt; network-object object MyCorp2&lt;BR /&gt;object-group network private-nets&lt;BR /&gt; network-object object 0.0.0.0&lt;BR /&gt; network-object object 10.0.0.0&lt;BR /&gt; network-object object 127.0.0.1&lt;BR /&gt; network-object object 172.16.0.0&lt;BR /&gt; network-object object 192.168.0.0&lt;BR /&gt;object-group network VPNPrivate&lt;BR /&gt; network-object 192.168.80.0 255.255.255.0&lt;BR /&gt; network-object 192.168.83.0 255.255.255.0&lt;BR /&gt;access-list inside_access_in extended permit ip object-group VPNPrivate object-group MyVPN &lt;BR /&gt;access-list inside_access_in extended permit ip object-group VPNPrivate any &lt;BR /&gt;access-list outside_access_in extended permit ip object-group private-nets any &lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo &lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list outside_access_in extended permit icmp any any time-exceeded &lt;BR /&gt;access-list outside_access_in extended permit ip object-group MyVPN object-group VPNPrivate &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object-group VPNPrivate object-group MyVPN &lt;BR /&gt;access-list wifi_access_in extended permit ip object-group VPNPrivate object-group MyVPN &lt;BR /&gt;access-list wifi_access_in extended permit ip object-group VPNPrivate any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu wifi 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static VPNPrivate VPNPrivate destination static MyVPN MyVPN no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group wifi_access_in in interface wifi&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 [static gateway]&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.80.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 1 set peer [static ip]&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 2147482800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds none&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds none&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds none&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds none&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds none&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime none&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.80.7-192.168.80.149 inside&lt;BR /&gt;dhcpd dns 10.0.0.10 71.10.216.1 interface inside&lt;BR /&gt;dhcpd option 3 ip 192.168.80.1 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.83.7-192.168.83.149 wifi&lt;BR /&gt;dhcpd dns 10.0.0.10 71.10.216.1 interface wifi&lt;BR /&gt;dhcpd option 3 ip 192.168.83.1 interface wifi&lt;BR /&gt;dhcpd enable wifi&lt;BR /&gt;!&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy GroupPolicy_[static] internal&lt;BR /&gt;group-policy GroupPolicy_[static] attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev2 &lt;BR /&gt; periodic-authentication certificate none&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;password-policy authenticate-enable&lt;BR /&gt;username Admin password [edit] encrypted privilege 15&lt;BR /&gt;tunnel-group [static] type ipsec-l2l&lt;BR /&gt;tunnel-group [static] general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_[static]&lt;BR /&gt;tunnel-group[static] ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:06f9c99f49f823bcba0de8e9e57c634b&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2016 18:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941469#M155890</guid>
      <dc:creator>JpetersonMonarch</dc:creator>
      <dc:date>2016-08-04T18:01:10Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941470#M155891</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you show output of: (delete public IPs).&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show crypto isakmp sa&lt;BR /&gt;show crypto ipsec sa&lt;/PRE&gt;
&lt;P&gt;//Cristian&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 06:57:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941470#M155891</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-05T06:57:58Z</dc:date>
    </item>
    <item>
      <title>Sorry for the late reply, but</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941471#M155892</link>
      <description>&lt;P&gt;Sorry for the late reply, but I'm getting this&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show crypto ipsec sa"&lt;BR /&gt;&lt;BR /&gt;interface: outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_map, seq num: 1, local addr: [my ip]&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list outside_cryptomap_1 extended permit ip 192.168.80.0 255.255.255.0 10.0.0.0 255.255.255.0 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (192.168.80.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.0.0.0/255.255.255.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: [my ip]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Looks like my wireless isn't even showing up for that.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 16:52:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941471#M155892</guid>
      <dc:creator>JpetersonMonarch</dc:creator>
      <dc:date>2016-08-09T16:52:54Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941472#M155893</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That does indeed seems wierd.&lt;/P&gt;
&lt;P&gt;Could you try the ACL without using objects/object-groups and show output again?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;access-list outside_cryptomap_1 extended permit ip 192.168.80.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 192.168.83.0 255.255.255.0 10.0.0.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 192.168.80.0 255.255.255.0 &amp;lt;IP&amp;gt; 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 192.168.83.0 255.255.255.0 &amp;lt;IP&amp;gt; 255.255.255.0&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 08:15:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941472#M155893</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-10T08:15:27Z</dc:date>
    </item>
    <item>
      <title>I tried that and duplicated</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941473#M155894</link>
      <description>&lt;P&gt;I tried that and duplicated some details from the LAN on the used cryptomap, and now it claims the tunnel is running!. It even says my domain on the network adapter, but says unauthenticated. Any ideas with this?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2016 06:38:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941473#M155894</guid>
      <dc:creator>JpetersonMonarch</dc:creator>
      <dc:date>2016-08-11T06:38:23Z</dc:date>
    </item>
    <item>
      <title>I think I have it going now.</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941474#M155895</link>
      <description>&lt;P&gt;I think I have it going now.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I enabled reverse route injection and that did the trick just in-case anybody else is wondering.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Aug 2016 06:55:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-with-lan-and-wifi-in-same-network-group-having-problems/m-p/2941474#M155895</guid>
      <dc:creator>JpetersonMonarch</dc:creator>
      <dc:date>2016-08-11T06:55:37Z</dc:date>
    </item>
  </channel>
</rss>

