<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't Connect to RADIUS server, or anything on INSIDE Interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935522#M156920</link>
    <description>&lt;P&gt;I'm getting stumped by what I think should be a simple issue. &amp;nbsp;First, here's a layout of my network as prior to any changes:&lt;/P&gt;
&lt;P&gt;Cisco ASA running 9.23 Base License acting as the default gateway (10.1.10.1) for a flat network. &amp;nbsp;Authentication for remote access VPN is handled by VM running WS 2008 (10.1.10.10) on the same LAN.&lt;/P&gt;
&lt;P&gt;The Change:&lt;/P&gt;
&lt;P&gt;Wanting more control of our limited bandwidth, we've added a high-end home router with Streamboost technology to the network. &amp;nbsp;Now the ASA is one hop away from the production network. &amp;nbsp;NAT and firewall rules still handled at the ASA. &amp;nbsp;Access to the Internet works perfectly, but remote-access broke. &amp;nbsp;I checked the ASA and it began logging a message saying it could no longer connect to the RADIUS server. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additional thoughts:&lt;/P&gt;
&lt;P&gt;* Prior to change, the ASA could ping the RADIUS server (or any device). &amp;nbsp;After the change, the ASA can no longer ping.&lt;/P&gt;
&lt;P&gt;* ICMP is set for inspection on the global policy.&lt;/P&gt;
&lt;P&gt;* ICMP is not explicitly granted on the inside interface.&lt;/P&gt;
&lt;P&gt;* Both networks 10.1.10.0 and 10.1.11.0 are permitted on the inside interface.&lt;/P&gt;
&lt;P&gt;* I did go into the WS 2008 server and change the IP address of the RADIUS client.&lt;/P&gt;
&lt;P&gt;* I don't think the problem is the ACL applied to the internal network. &amp;nbsp;No messages are logged when I ping from the ASA to the RADIUS server.&lt;/P&gt;
&lt;P&gt;* I did a traceroute from the ASA to the RADIUS server. The ASA sent the packet to the next IP address, but it dropped there.&lt;/P&gt;
&lt;P&gt;* The home router has firewall and NAT disabled.&lt;/P&gt;
&lt;P&gt;* Pings sent from the ASA to the router's WAN IP time out. &amp;nbsp;Can't ping from 10.1.11.1 to 10.1.11.2.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:02:05 GMT</pubDate>
    <dc:creator>procopius1980</dc:creator>
    <dc:date>2019-03-12T08:02:05Z</dc:date>
    <item>
      <title>Can't Connect to RADIUS server, or anything on INSIDE Interface</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935522#M156920</link>
      <description>&lt;P&gt;I'm getting stumped by what I think should be a simple issue. &amp;nbsp;First, here's a layout of my network as prior to any changes:&lt;/P&gt;
&lt;P&gt;Cisco ASA running 9.23 Base License acting as the default gateway (10.1.10.1) for a flat network. &amp;nbsp;Authentication for remote access VPN is handled by VM running WS 2008 (10.1.10.10) on the same LAN.&lt;/P&gt;
&lt;P&gt;The Change:&lt;/P&gt;
&lt;P&gt;Wanting more control of our limited bandwidth, we've added a high-end home router with Streamboost technology to the network. &amp;nbsp;Now the ASA is one hop away from the production network. &amp;nbsp;NAT and firewall rules still handled at the ASA. &amp;nbsp;Access to the Internet works perfectly, but remote-access broke. &amp;nbsp;I checked the ASA and it began logging a message saying it could no longer connect to the RADIUS server. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additional thoughts:&lt;/P&gt;
&lt;P&gt;* Prior to change, the ASA could ping the RADIUS server (or any device). &amp;nbsp;After the change, the ASA can no longer ping.&lt;/P&gt;
&lt;P&gt;* ICMP is set for inspection on the global policy.&lt;/P&gt;
&lt;P&gt;* ICMP is not explicitly granted on the inside interface.&lt;/P&gt;
&lt;P&gt;* Both networks 10.1.10.0 and 10.1.11.0 are permitted on the inside interface.&lt;/P&gt;
&lt;P&gt;* I did go into the WS 2008 server and change the IP address of the RADIUS client.&lt;/P&gt;
&lt;P&gt;* I don't think the problem is the ACL applied to the internal network. &amp;nbsp;No messages are logged when I ping from the ASA to the RADIUS server.&lt;/P&gt;
&lt;P&gt;* I did a traceroute from the ASA to the RADIUS server. The ASA sent the packet to the next IP address, but it dropped there.&lt;/P&gt;
&lt;P&gt;* The home router has firewall and NAT disabled.&lt;/P&gt;
&lt;P&gt;* Pings sent from the ASA to the router's WAN IP time out. &amp;nbsp;Can't ping from 10.1.11.1 to 10.1.11.2.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935522#M156920</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2019-03-12T08:02:05Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935523#M156922</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Check that the router is configured properly. Could be the firewall on the router is still &amp;nbsp; enabled. Also check that you ip addressing and subnet masks are configured correctly.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 00:10:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935523#M156922</guid>
      <dc:creator>johnd2310</dc:creator>
      <dc:date>2016-07-19T00:10:59Z</dc:date>
    </item>
    <item>
      <title>Hi John,</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935524#M156924</link>
      <description>&lt;P&gt;Hi John,&lt;/P&gt;
&lt;P&gt;I've already verified that the router's firewall and NAT are both disabled. &amp;nbsp;The ASA INSIDE&amp;nbsp;and the router WAN are 10.1.11.1/30 and 10.1.11.2/30. &amp;nbsp;I even get requests timed out when I ping from the ASA INSIDE interface to the router WAN. &amp;nbsp;The router is a XyZel. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normal outbound traffic is working. &amp;nbsp;It's traffic sourced from the ASA back to the INSIDE interface that is not. &amp;nbsp;I'm about to contact XyZel and see if they have any suggestions.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 14:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935524#M156924</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2016-07-19T14:21:45Z</dc:date>
    </item>
    <item>
      <title>I should also mention I've</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935525#M156925</link>
      <description>&lt;P&gt;I should also mention I've recently enabled management-interface inside on the ASA. &amp;nbsp;I don't think that is the issue, but I won't be able to tell until I get a chance to test. &amp;nbsp;Also, just for clarification, I have a static route on the ASA for inbound traffic:&lt;/P&gt;
&lt;P&gt;route inside 10.1.10.0 255.255.255.0 10.1.11.2&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2016 17:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935525#M156925</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2016-07-19T17:42:42Z</dc:date>
    </item>
    <item>
      <title>Prior to installation, we</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935526#M156927</link>
      <description>&lt;P&gt;Prior to installation, we recently upgraded to IOS 9.23 from a version 7 IOS. &amp;nbsp;The following lines were added to the startup-config. &amp;nbsp;What does this mean?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 20:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935526#M156927</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2016-07-20T20:08:45Z</dc:date>
    </item>
    <item>
      <title>Update:</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935527#M156929</link>
      <description>&lt;P&gt;Update:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;1. &amp;nbsp;The ASA could not ping the internal RADIUS server due to a NAT misconfiguration which has been fixed.&lt;/P&gt;
&lt;P&gt;2. &amp;nbsp;Next, ICMP had to be enabled through the ZyXel router. &amp;nbsp;Even though the FW was turned off, there was another tab for ICMP. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. &amp;nbsp;From there, I could ping from the ASA (through the ZyXel) to the RADIUS server. &amp;nbsp;However, RADIUS authentication from remote access VPN clients failed (ASA logged a message saying communication with the RADIUS server timed out).&lt;/P&gt;
&lt;P&gt;4. &amp;nbsp;Through finagling, I was finally able to get communication between the two. &amp;nbsp;This included enabling/disabling the firewall on the ZyXel.&lt;/P&gt;
&lt;P&gt;5. &amp;nbsp;At that point, my RA VPN client would obtain an IP address, but could not communicate with the internal network. &amp;nbsp;That was 11:00 p.m. and we reverted and went home.&lt;/P&gt;
&lt;P&gt;6. &amp;nbsp;I should have saved a copy of the config, because apparently I changed something the next morning (while adding the VPN pool to the split-tunnel ACL) that broke #5.&lt;/P&gt;
&lt;P&gt;7. &amp;nbsp;I spent all last night trying to recreate #5. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;8. &amp;nbsp;At one point, I changed VPN authentication from AAA to LOCAL. &amp;nbsp;When I did that, my VPN client obtained an IP address and could ping the internal file server, but could not connect via SMB or RDP.&lt;/P&gt;
&lt;P&gt;9. &amp;nbsp;Ran network monitor on the RADIUS server and file server. &amp;nbsp;The only packets reaching the servers are ICMP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's the ACL applied to the inside interface:&lt;/P&gt;
&lt;P&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.10.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in remark Allow primary filtering DNS server&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 host 208.67.222.222 &lt;BR /&gt;access-list inside_access_in remark Allow secondary filtering DNS server&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any4 host 208.67.220.220 &lt;BR /&gt;access-list inside_access_in remark Allow Tech to reach any DNS for troubleshooting&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 object TechComputer any4 &lt;BR /&gt;access-list inside_access_in remark Block all other DNS servers&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_3 any4 any4 &lt;BR /&gt;access-list inside_access_in remark Permit the rest of traffic&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.10.0 255.255.255.0 any4 &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 any4 &lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_4 any6 any6 &lt;BR /&gt;access-list inside_access_in remark Allow all other traffic&lt;BR /&gt;access-list inside_access_in extended permit ip any6 any6 &lt;BR /&gt;access-list inside_access_in extended permit ip any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 object Internal_FTP_Server inactive&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In addition, I tried disabling every line of this ACL and I added an IP permit any any. &amp;nbsp;Still the ASA couldn't connect with the internal RADIUS server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Now here's the entire running config of the ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.1.10.10 Internal_FTP_Server&lt;BR /&gt;name 10.1.10.63 TechComputer&lt;BR /&gt;ip local pool VPNUserPool 10.1.10.226-10.1.10.230 mask 255.255.255.0&lt;BR /&gt;ip local pool SSLUserPool 10.1.10.220-10.1.10.225 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.11.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 99.99.99.99 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;time-range WORK-HOURS&lt;BR /&gt; periodic weekdays 6:00 to 17:00&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa923-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone &lt;BR /&gt;clock summer-time recurring&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 208.67.222.222&lt;BR /&gt; name-server 208.67.220.220&lt;BR /&gt; domain-name .com&lt;BR /&gt;object network obj-10.1.10.0&lt;BR /&gt; subnet 10.1.10.0 255.255.255.0&lt;BR /&gt;object network obj-10.1.0.0&lt;BR /&gt; subnet 10.1.0.0 255.255.255.0&lt;BR /&gt;object network obj-10.1.11.0&lt;BR /&gt; subnet 10.1.11.0 255.255.255.252&lt;BR /&gt;object network obj-10.1.10.149&lt;BR /&gt; host 10.1.10.149&lt;BR /&gt;object network obj-10.1.10.149-01&lt;BR /&gt; host 10.1.10.149&lt;BR /&gt;object network Internal_FTP_Server&lt;BR /&gt; host 10.1.10.10&lt;BR /&gt;object network Internal_FTP_Server-01&lt;BR /&gt; host 10.1.10.10&lt;BR /&gt;object network obj-10.1.10.146&lt;BR /&gt; host 10.1.10.146&lt;BR /&gt;object network obj-10.1.10.146-01&lt;BR /&gt; host 10.1.10.146&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any-01&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-0.0.0.0&lt;BR /&gt; host 0.0.0.0&lt;BR /&gt;object network TechComputer&lt;BR /&gt; host 10.1.10.63&lt;BR /&gt; description Created during name migration&lt;BR /&gt;object network obj-10.1.10.30&lt;BR /&gt; host 10.1.10.30&lt;BR /&gt;object network obj-10.1.10.30-01&lt;BR /&gt; host 10.1.10.30&lt;BR /&gt;object network NETWORK_OBJ_10.1.0.0_24&lt;BR /&gt; subnet 10.1.0.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.1.10.0_24&lt;BR /&gt; subnet 10.1.10.0 255.255.255.0&lt;BR /&gt;object network obj-10.1.99.0&lt;BR /&gt; subnet 10.1.99.0 255.255.255.0&lt;BR /&gt;object-group service port9010 tcp&lt;BR /&gt; port-object eq 9010&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt;object-group service ftp tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt; service-object tcp destination eq domain &lt;BR /&gt; service-object udp destination eq domain &lt;BR /&gt;access-list outside_access_in remark Allow inbound web connections&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq 9010 &lt;BR /&gt;access-list outside_access_in remark Allow inbound remote desktop&lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq 3389 inactive &lt;BR /&gt;access-list outside_access_in extended permit icmp any4 interface outside echo-reply &lt;BR /&gt;access-list outside_access_in extended permit icmp any4 interface outside unreachable &lt;BR /&gt;access-list outside_access_in extended permit icmp any4 interface outside time-exceeded &lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside object-group ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq ftp-data &lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq 8443 &lt;BR /&gt;access-list outside_access_in extended permit tcp any4 interface outside eq 8080 &lt;BR /&gt;access-list outside_access_in extended permit udp host 88.88.88.88 any4 eq isakmp &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 10.1.10.0 255.255.255.0 &lt;BR /&gt;access-list inside_access_in remark Allow primary filtering DNS server&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_1 any4 host 208.67.222.222 &lt;BR /&gt;access-list inside_access_in remark Allow secondary filtering DNS server&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_2 any4 host 208.67.220.220 &lt;BR /&gt;access-list inside_access_in remark Allow Tech to reach any DNS for troubleshooting&lt;BR /&gt;access-list inside_access_in extended permit object-group DM_INLINE_SERVICE_5 object TechComputer any4 &lt;BR /&gt;access-list inside_access_in remark Block all other DNS servers&lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_3 any4 any4 &lt;BR /&gt;access-list inside_access_in remark Permit the rest of traffic&lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.10.0 255.255.255.0 any4 &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 any4 &lt;BR /&gt;access-list inside_access_in extended deny object-group DM_INLINE_SERVICE_4 any6 any6 &lt;BR /&gt;access-list inside_access_in remark Allow all other traffic&lt;BR /&gt;access-list inside_access_in extended permit ip any6 any6 &lt;BR /&gt;access-list inside_access_in extended permit ip any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.11.0 255.255.255.0 object Internal_FTP_Server inactive &lt;BR /&gt;access-list remoteit_splitTunnelAcl standard permit 10.1.10.0 255.255.255.0 &lt;BR /&gt;access-list remoteit_splitTunnelAcl standard permit 10.1.99.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.10.0 255.255.255.0 10.1.10.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.10.0 255.255.255.0 10.1.0.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.11.0 255.255.255.252 any4 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.11.0 255.255.255.0 10.1.10.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap extended permit ip 10.1.10.0 255.255.255.0 10.1.0.0 255.255.255.0 &lt;BR /&gt;access-list WEB-UPLOAD-LIMIT extended permit ip 10.1.10.0 255.255.255.0 any4 time-range WORK-HOURS &lt;BR /&gt;access-list outside_access_ipv6_in extended permit icmp6 any6 any6 echo-reply &lt;BR /&gt;access-list outside_access_ipv6_in extended permit icmp6 any6 any6 unreachable &lt;BR /&gt;access-list outside_access_ipv6_in extended permit icmp6 any6 any6 time-exceeded &lt;BR /&gt;access-list outside_access_in_migration_1 remark Allow inbound web connections&lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 host 10.1.10.149 &lt;BR /&gt;access-list outside_access_in_migration_1 remark Allow inbound remote desktop&lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 host 10.1.10.149 eq &lt;BR /&gt;access-list outside_access_in_migration_1 remark Migration, ACE (line 9) expanded: permit tcp any4 interface outside object-group &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 object Internal_FTP_Server eq &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 object Internal_FTP_Server eq &lt;BR /&gt;access-list outside_access_in_migration_1 remark Migration: End of expansion&lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 host 10.1.10.146 eq &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 host 10.1.10.146 eq &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit udp host 88.88.88.88 any4 eq isakmp &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit icmp6 any6 any6 &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 object obj-10.1.10.30 eq &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit tcp any4 object obj-10.1.10.30-01 eq &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit icmp any interface outside echo-reply &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit icmp any interface outside unreachable &lt;BR /&gt;access-list outside_access_in_migration_1 extended permit icmp any interface outside time-exceeded &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm notifications&lt;BR /&gt;logging class vpn asdm informational &lt;BR /&gt;logging class vpnc asdm informational &lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-761.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;arp permit-nonconnected&lt;BR /&gt;nat (inside,any) source static obj-10.1.10.0 obj-10.1.10.0 destination static obj-10.1.10.0 obj-10.1.10.0 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static obj-10.1.10.0 obj-10.1.10.0 destination static obj-10.1.0.0 obj-10.1.0.0 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static obj-10.1.99.0 obj-10.1.99.0 destination static obj-10.1.10.0 obj-10.1.10.0 no-proxy-arp route-lookup inactive&lt;BR /&gt;nat (inside,any) source static obj-10.1.10.0 obj-10.1.10.0 destination static obj-10.1.99.0 obj-10.1.99.0 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-10.1.10.149&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network obj-10.1.10.149-01&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network Internal_FTP_Server&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network Internal_FTP_Server-01&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network obj-10.1.10.146&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network obj-10.1.10.146-01&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj_any-01&lt;BR /&gt; nat (inside,outside) dynamic obj-0.0.0.0&lt;BR /&gt;object network obj-10.1.10.30&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;object network obj-10.1.10.30-01&lt;BR /&gt; nat (inside,outside) static interface service tcp &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in_migration_1 in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 99.99.99.99 1&lt;BR /&gt;route inside 10.1.10.0 255.255.255.0 10.1.11.2 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server dc1 protocol radius&lt;BR /&gt;aaa-server dc1 (inside) host Internal_FTP_Server&lt;BR /&gt; timeout 5&lt;BR /&gt; key &lt;BR /&gt; authentication-port 1812&lt;BR /&gt; accounting-port 1813&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.255.0 inside&lt;BR /&gt;http 10.1.10.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set peer 88.88.88.88 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt; enrollment terminal&lt;BR /&gt; subject-name CN=fw..internal,O=,C=US&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpoint self&lt;BR /&gt; enrollment self&lt;BR /&gt; fqdn ..com&lt;BR /&gt; subject-name CN=..com&lt;BR /&gt; keypair sslvpnkeypair&lt;BR /&gt; crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;/P&gt;
&lt;P&gt;quit&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.1.10.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;vpn-sessiondb max-other-vpn-limit 10&lt;BR /&gt;vpn-sessiondb max-anyconnect-premium-or-essentials-limit 25&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 96.226.242.9 source outside prefer&lt;BR /&gt;ntp server 216.171.120.36 source outside&lt;BR /&gt;ssl trust-point self outside&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-4.3.00748-k9.pkg 1&lt;BR /&gt; anyconnect profiles acremoteit disk0:/acremoteit.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec &lt;BR /&gt;group-policy GroupPolicy2 internal&lt;BR /&gt;group-policy GroupPolicy2 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 208.67.222.222 208.67.220.220&lt;BR /&gt; vpn-tunnel-protocol ssl-client &lt;BR /&gt; default-domain value .internal&lt;BR /&gt;group-policy remoteit internal&lt;BR /&gt;group-policy remoteit attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 208.67.222.222 208.67.220.220&lt;BR /&gt; vpn-idle-timeout 180&lt;BR /&gt; vpn-session-timeout 720&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value remoteit_splitTunnelAcl&lt;BR /&gt; default-domain value .internal&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value acremoteit type user&lt;/P&gt;
&lt;P&gt;{Usernames Omitted}&lt;BR /&gt; &lt;BR /&gt;tunnel-group remoteit type remote-access&lt;BR /&gt;tunnel-group remoteit general-attributes&lt;BR /&gt; address-pool SSLUserPool&lt;BR /&gt; authentication-server-group dc1&lt;BR /&gt; default-group-policy remoteit&lt;BR /&gt; dhcp-server Internal_FTP_Server&lt;BR /&gt;tunnel-group remoteit webvpn-attributes&lt;BR /&gt; group-url &lt;A href="https://99.99.99.99" target="_blank"&gt;https://99.99.99.99&lt;/A&gt; enable&lt;BR /&gt;tunnel-group remoteit ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 88.88.88.88 type ipsec-l2l&lt;BR /&gt;tunnel-group 88.88.88.88 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy2&lt;BR /&gt;tunnel-group 88.88.88.88 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;class-map CLASS-UPLOAD-LIMIT&lt;BR /&gt; match access-list WEB-UPLOAD-LIMIT&lt;BR /&gt;class-map DM_INLINE_Child-Class&lt;BR /&gt; match dscp ef &lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map DM_INLINE_Child-Policy&lt;BR /&gt; class DM_INLINE_Child-Class&lt;BR /&gt; priority&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect pptp &lt;BR /&gt; inspect icmp &lt;BR /&gt;policy-map POLICY-UPLOAD-LIMIT&lt;BR /&gt; class CLASS-UPLOAD-LIMIT&lt;BR /&gt; police input 2500000 2000&lt;BR /&gt;policy-map qos-outside-policy&lt;BR /&gt; class class-default&lt;BR /&gt; shape average 4496000&lt;BR /&gt; service-policy DM_INLINE_Child-Policy&lt;BR /&gt;policy-map global-policy&lt;BR /&gt; class global-class&lt;BR /&gt; inspect ftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;service-policy qos-outside-policy interface outside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:&lt;BR /&gt;: end&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2016 15:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935527#M156929</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2016-07-29T15:09:59Z</dc:date>
    </item>
    <item>
      <title>Is there some piece of</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935528#M156931</link>
      <description>&lt;P&gt;Is there some piece of information that I need to share in order to get&amp;nbsp;&lt;EM&gt;anyone&lt;/EM&gt; to reply? &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Aug 2016 20:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935528#M156931</guid>
      <dc:creator>procopius1980</dc:creator>
      <dc:date>2016-08-04T20:24:03Z</dc:date>
    </item>
    <item>
      <title>This is, to my understanding</title>
      <link>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935529#M156934</link>
      <description>&lt;P&gt;This is, to my understanding the old way of handling pat (sub 9.x).&lt;/P&gt;
&lt;P&gt;This is most likely converted into new configuration to not break anything prior to upgrade.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The default in 9.x onward&amp;nbsp;is enabled.&lt;/P&gt;
&lt;PRE class="pEx1_Example1 prettyprint"&gt;&lt;SPAN&gt;xlate per-session permit tcp any4 any4&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit tcp any4 any6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit tcp any6 any4&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit tcp any6 any6&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit udp any4 any4 eq domain&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit udp any4 any6 eq domain&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit udp any6 any4 eq domain&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;xlate per-session permit udp any6 any6 eq domain&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html#69674&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;//Cristian&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2016 06:34:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-connect-to-radius-server-or-anything-on-inside-interface/m-p/2935529#M156934</guid>
      <dc:creator>Cristian Nilsson</dc:creator>
      <dc:date>2016-08-05T06:34:48Z</dc:date>
    </item>
  </channel>
</rss>

