<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you for your help! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881672#M157361</link>
    <description>&lt;P&gt;Thank you for your help!&lt;/P&gt;
&lt;P&gt;I added a split-tunnel-list acl and applied it to the groupolicy NWdlsx64 and i'm still unable to get to the remote network? Did I implement it incorrectly?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name nwdls.com&lt;BR /&gt;enable password qpQ5myeZ6SQpH8vX encrypted&lt;BR /&gt;passwd HUeZALO3Fgqs0XMf encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.120.30 dvr&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.120.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 96.85.6.217 255.255.255.248 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.121.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.120.25&lt;BR /&gt; name-server 75.75.75.75&lt;BR /&gt; name-server 75.75.75.76&lt;BR /&gt; domain-name nwdls.com&lt;BR /&gt;object network obj-192.168.120.248&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network obj-192.168.120.245&lt;BR /&gt; host 192.168.120.245&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; subnet 192.168.120.0 255.255.255.128&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.248_29&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description Windows Server 2008 RC2&lt;BR /&gt;object network DVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object service IPCAMS&lt;BR /&gt; service tcp source eq 5550 destination eq 5550 &lt;BR /&gt;object network newfirewall&lt;BR /&gt; host 192.168.120.108&lt;BR /&gt;object service ssh&lt;BR /&gt; service tcp source eq ssh destination eq ssh &lt;BR /&gt; description ssh&lt;BR /&gt;object network john&lt;BR /&gt; host 71.11.173.163&lt;BR /&gt;object network SVN-HTTP-INTERNET&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description access to svn on nwdls-dc&lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; host 192.168.120.209&lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; host 192.168.120.202&lt;BR /&gt;object network DVR-PORT&lt;BR /&gt;object network DVR-PORT2&lt;BR /&gt;object network obj-pool&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network NVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR&lt;BR /&gt;object network NVR1&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR2&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR3&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR4&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR5&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR6&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR6&lt;BR /&gt;object service Field&lt;BR /&gt; service tcp destination eq www &lt;BR /&gt;object service Field2&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object network WebserverPublic&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network Webserver&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network WEb&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.0_24&lt;BR /&gt; subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.240_28&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network Remote-Site-Firewall&lt;BR /&gt; host 96.91.46.9&lt;BR /&gt;object network Remote-Site-Subnet&lt;BR /&gt; subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service dvr-http tcp&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service dvr-remote tcp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service IPCAM tcp-udp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service svn-http tcp&lt;BR /&gt; description SVN Server access&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; group-object svn-http&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; group-object svn-http&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service NVRPORTS tcp&lt;BR /&gt; description NVRPORTS&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt; port-object eq rtsp&lt;BR /&gt;object-group service field tcp&lt;BR /&gt; port-object eq 10443&lt;BR /&gt; port-object eq 8180&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq 9150&lt;BR /&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list wendy_acl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq rtsp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp-data &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq www &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.233 range 10001 19999 &lt;BR /&gt;access-list outside_access_in remark Whitney&lt;BR /&gt;access-list outside_access_in extended permit udp host 99.16.64.231 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.225.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 4.79.212.236 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.203 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit 21 any host 192.168.121.2 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.9 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.10 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 192.168.120.30 object-group IPCAM &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 9150 &lt;BR /&gt;access-list outside_access_in remark node access&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9150 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9418 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object DVR object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group NVRPORTS any object-group NVRPORTS &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 eq https &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 96.85.6.217 &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_out extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any any &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq lpd &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 631 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 9100 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.251 eq 5353 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.252 eq 5355 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 137 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any any eq netbios-ns &lt;BR /&gt;access-list Comcast-Outside_access_in extended permit ip any any &lt;BR /&gt;access-list EasyVPN_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.120.0 255.255.255.0 object Remote-Site-Subnet &lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.128.0 255.255.255.0 &lt;BR /&gt;pager lines 45&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail critical&lt;BR /&gt;logging from-address ciscoasa@nwdls.com&lt;BR /&gt;logging host inside 192.168.120.203&lt;BR /&gt;logging class auth trap debugging asdm debugging &lt;BR /&gt;logging class session trap errors &lt;BR /&gt;logging class vpn trap debugging asdm debugging &lt;BR /&gt;logging class vpnc trap debugging &lt;BR /&gt;logging class vpnfo trap debugging &lt;BR /&gt;logging class webvpn trap debugging &lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool vpnpool2 192.168.120.249-192.168.120.254 mask 255.255.255.0&lt;BR /&gt;ip local pool vpnpool3 192.168.120.241-192.168.120.248 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ipv6 access-list dmz_access_ipv6_in deny ip any any &lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static any any destination static obj-pool obj-pool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.248 obj-192.168.120.248 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.245 obj-192.168.120.245 no-proxy-arp&lt;BR /&gt;nat (outside,inside) source static any any destination static interface DVR service IPCAMS IPCAMS&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static NETWORK_OBJ_192.168.120.240_28 NETWORK_OBJ_192.168.120.240_28 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static Remote-Site-Subnet Remote-Site-Subnet no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; nat (inside,dmz) static 192.168.120.0&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; nat (inside,outside) static 96.85.6.218&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; nat (inside,outside) dynamic 96.85.6.218&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; nat (dmz,outside) static interface service tcp www www &lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; nat (dmz,outside) static interface service tcp ssh ssh &lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; nat (dmz,outside) dynamic interface&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp 9150 9150 &lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp ftp-data ftp-data &lt;BR /&gt;object network NVR&lt;BR /&gt; nat (inside,outside) static interface service tcp 8000 8000 &lt;BR /&gt;object network NVR1&lt;BR /&gt; nat (inside,outside) static interface service tcp 10554 10554 &lt;BR /&gt;object network NVR2&lt;BR /&gt; nat (inside,outside) static interface service tcp rtsp rtsp &lt;BR /&gt;object network NVR3&lt;BR /&gt; nat (inside,outside) static interface service udp 8000 8000 &lt;BR /&gt;object network NVR4&lt;BR /&gt; nat (inside,outside) static interface service udp 10554 10554 &lt;BR /&gt;object network NVR5&lt;BR /&gt; nat (inside,outside) static interface service udp 554 554 &lt;BR /&gt;object network NVR6&lt;BR /&gt; nat (inside,outside) static interface service tcp 10080 10080 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic obj_any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group dmz_access_ipv6_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.85.6.222 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable 8080&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer 96.91.46.9 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable inside client-services port 8080&lt;BR /&gt;crypto ikev2 enable outside client-services port 8080&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.120.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 192.168.120.25 208.67.222.222&lt;BR /&gt;dhcpd wins 192.168.120.25&lt;BR /&gt;dhcpd lease 86400&lt;BR /&gt;dhcpd domain nwdls.com&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;dhcpd update dns &lt;BR /&gt;dhcpd option 3 ip 192.168.120.1&lt;BR /&gt;dhcpd option 66 ip 192.168.120.233&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.120.50-192.168.120.119 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 66.187.233.4 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; port 8080&lt;BR /&gt; enable outside&lt;BR /&gt; dtls port 8080&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-2.0.0343-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.5.3054-k9.pkg 2&lt;BR /&gt; anyconnect profiles nwdls1 disk0:/nwdls1.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value nwdls_splitTunnelAcl&lt;BR /&gt;group-policy EasyVPN internal&lt;BR /&gt;group-policy EasyVPN attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25 75.75.75.75&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value EasyVPN_splitTunnelAcl&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 internal&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 internal&lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value nwdls1 type user&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy nwdlsgroup internal&lt;BR /&gt;group-policy nwdlsgroup attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt; anyconnect ask enable default webvpn&lt;BR /&gt;group-policy nwdls internal&lt;BR /&gt;group-policy nwdls attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt; ipsec-udp enable&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;username deena password 1jZizDREl2QRiv7H encrypted&lt;BR /&gt;username deena attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username Test password tEw.zBkWtr5cfsmI encrypted privilege 15&lt;BR /&gt;username derek password 3TzysbBXovQgzpHA encrypted&lt;BR /&gt;username derek attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username monica password Vl3AxqOzs1FaYFP1 encrypted&lt;BR /&gt;username monica attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username jill password IsB48p5obkwE/dw9 encrypted&lt;BR /&gt;username jimhorne password /74Kfw0gqsPfF82T encrypted&lt;BR /&gt;username jimhorne attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username pete password RGOM9U0/BK5awC8Z encrypted&lt;BR /&gt;username pete attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username admin password sM/cvVSkWC3aa0kQ encrypted privilege 15&lt;BR /&gt;username john password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username john2 password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage disable&lt;BR /&gt;username remotesite1 password 0quAjW6jr7HJmZTS encrypted privilege 0&lt;BR /&gt;username remotesite1 attributes&lt;BR /&gt; vpn-group-policy EasyVPN&lt;BR /&gt;username simply password Lf/AtECdBHaWjnY6 encrypted&lt;BR /&gt;username simply attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; memberof nwdls&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username simply2 password M7ISu.T1R2QrDasU encrypted&lt;BR /&gt;username simply2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;username matt password Mv7Iy4C7Z4wN9kXv encrypted&lt;BR /&gt;username matt attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt;username matthews password X4kBHeuSkWam3waC encrypted&lt;BR /&gt;username matthews attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username theran password CW2R4MKStb7xJwgZ encrypted&lt;BR /&gt;username theran attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username root password Lm6zFIw1OvIlLNqp encrypted&lt;BR /&gt;username willie password i9HtXKw/5SwL8PXt encrypted&lt;BR /&gt;username whitney password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username whitney2 password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;tunnel-group nwdlsvpn type remote-access&lt;BR /&gt;tunnel-group nwdlsvpn general-attributes&lt;BR /&gt; address-pool vpnpool2&lt;BR /&gt; default-group-policy nwdlsgroup&lt;BR /&gt;tunnel-group nwdls type remote-access&lt;BR /&gt;tunnel-group nwdls general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy nwdls&lt;BR /&gt;tunnel-group nwdls ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group nwdls ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group Nwdlsx64 type remote-access&lt;BR /&gt;tunnel-group Nwdlsx64 general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;tunnel-group Nwdlsx64 webvpn-attributes&lt;BR /&gt; group-alias Nwdlsx64 enable&lt;BR /&gt;tunnel-group nvpn type remote-access&lt;BR /&gt;tunnel-group nvpn general-attributes&lt;BR /&gt; authentication-server-group (outside) LOCAL&lt;BR /&gt; authorization-server-group (outside) LOCAL&lt;BR /&gt;tunnel-group nvpn ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; peer-id-validate nocheck&lt;BR /&gt;tunnel-group nvpn ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group EasyVPN type remote-access&lt;BR /&gt;tunnel-group EasyVPN general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy EasyVPN&lt;BR /&gt;tunnel-group EasyVPN ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 96.91.46.9 type ipsec-l2l&lt;BR /&gt;tunnel-group 96.91.46.9 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_96.91.46.9&lt;BR /&gt;tunnel-group 96.91.46.9 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:81ca3c881d365a36e418741578ab9dfb&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jun 2016 17:07:22 GMT</pubDate>
    <dc:creator>nwdls8725</dc:creator>
    <dc:date>2016-06-21T17:07:22Z</dc:date>
    <item>
      <title>Routing to remote site through VPN</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881670#M157359</link>
      <description>&lt;P&gt;I set up a Site to Site VPN and everything is working fine where, I can access resources from both locations. However, when I connect to the VPN with cisco any connect client I can only access the resources on the 192.168.120.x subnet and not the remote's site subnet of 192.168.128.x. Any help on this would be greatly appreciated!&lt;/P&gt;
&lt;P&gt;This is the run file of the VPN router at the main location&lt;/P&gt;
&lt;P&gt;Result of the command: "show run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name nwdls.com&lt;BR /&gt;enable password qpQ5myeZ6SQpH8vX encrypted&lt;BR /&gt;passwd HUeZALO3Fgqs0XMf encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.120.30 dvr&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.120.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 96.85.6.217 255.255.255.248 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.121.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.120.25&lt;BR /&gt; name-server 75.75.75.75&lt;BR /&gt; name-server 75.75.75.76&lt;BR /&gt; domain-name nwdls.com&lt;BR /&gt;object network obj-192.168.120.248&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network obj-192.168.120.245&lt;BR /&gt; host 192.168.120.245&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; subnet 192.168.120.0 255.255.255.128&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.248_29&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description Windows Server 2008 RC2&lt;BR /&gt;object network DVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object service IPCAMS&lt;BR /&gt; service tcp source eq 5550 destination eq 5550 &lt;BR /&gt;object network newfirewall&lt;BR /&gt; host 192.168.120.108&lt;BR /&gt;object service ssh&lt;BR /&gt; service tcp source eq ssh destination eq ssh &lt;BR /&gt; description ssh&lt;BR /&gt;object network john&lt;BR /&gt; host 71.11.173.163&lt;BR /&gt;object network SVN-HTTP-INTERNET&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description access to svn on nwdls-dc&lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; host 192.168.120.209&lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; host 192.168.120.202&lt;BR /&gt;object network DVR-PORT&lt;BR /&gt;object network DVR-PORT2&lt;BR /&gt;object network obj-pool&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network NVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR&lt;BR /&gt;object network NVR1&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR2&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR3&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR4&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR5&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR6&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR6&lt;BR /&gt;object service Field&lt;BR /&gt; service tcp destination eq www &lt;BR /&gt;object service Field2&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object network WebserverPublic&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network Webserver&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network WEb&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.0_24&lt;BR /&gt; subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.240_28&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network Remote-Site-Firewall&lt;BR /&gt; host 96.91.46.9&lt;BR /&gt;object network Remote-Site-Subnet&lt;BR /&gt; subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service dvr-http tcp&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service dvr-remote tcp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service IPCAM tcp-udp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service svn-http tcp&lt;BR /&gt; description SVN Server access&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; group-object svn-http&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; group-object svn-http&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service NVRPORTS tcp&lt;BR /&gt; description NVRPORTS&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt; port-object eq rtsp&lt;BR /&gt;object-group service field tcp&lt;BR /&gt; port-object eq 10443&lt;BR /&gt; port-object eq 8180&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq 9150&lt;BR /&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list wendy_acl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq rtsp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp-data &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq www &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.233 range 10001 19999 &lt;BR /&gt;access-list outside_access_in remark Whitney&lt;BR /&gt;access-list outside_access_in extended permit udp host 99.16.64.231 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.225.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 4.79.212.236 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.203 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit 21 any host 192.168.121.2 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.9 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.10 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 192.168.120.30 object-group IPCAM &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 9150 &lt;BR /&gt;access-list outside_access_in remark node access&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9150 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9418 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object DVR object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group NVRPORTS any object-group NVRPORTS &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 eq https &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 96.85.6.217 &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_out extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any any &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq lpd &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 631 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 9100 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.251 eq 5353 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.252 eq 5355 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 137 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any any eq netbios-ns &lt;BR /&gt;access-list Comcast-Outside_access_in extended permit ip any any &lt;BR /&gt;access-list EasyVPN_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.120.0 255.255.255.0 object Remote-Site-Subnet &lt;BR /&gt;pager lines 45&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail critical&lt;BR /&gt;logging from-address ciscoasa@nwdls.com&lt;BR /&gt;logging host inside 192.168.120.203&lt;BR /&gt;logging class auth trap debugging asdm debugging &lt;BR /&gt;logging class session trap errors &lt;BR /&gt;logging class vpn trap debugging asdm debugging &lt;BR /&gt;logging class vpnc trap debugging &lt;BR /&gt;logging class vpnfo trap debugging &lt;BR /&gt;logging class webvpn trap debugging &lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool vpnpool2 192.168.120.249-192.168.120.254 mask 255.255.255.0&lt;BR /&gt;ip local pool vpnpool3 192.168.120.241-192.168.120.248 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ipv6 access-list dmz_access_ipv6_in deny ip any any &lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static any any destination static obj-pool obj-pool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.248 obj-192.168.120.248 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.245 obj-192.168.120.245 no-proxy-arp&lt;BR /&gt;nat (outside,inside) source static any any destination static interface DVR service IPCAMS IPCAMS&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static NETWORK_OBJ_192.168.120.240_28 NETWORK_OBJ_192.168.120.240_28 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static Remote-Site-Subnet Remote-Site-Subnet no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; nat (inside,dmz) static 192.168.120.0&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; nat (inside,outside) static 96.85.6.218&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; nat (inside,outside) dynamic 96.85.6.218&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; nat (dmz,outside) static interface service tcp www www &lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; nat (dmz,outside) static interface service tcp ssh ssh &lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; nat (dmz,outside) dynamic interface&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp 9150 9150 &lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp ftp-data ftp-data &lt;BR /&gt;object network NVR&lt;BR /&gt; nat (inside,outside) static interface service tcp 8000 8000 &lt;BR /&gt;object network NVR1&lt;BR /&gt; nat (inside,outside) static interface service tcp 10554 10554 &lt;BR /&gt;object network NVR2&lt;BR /&gt; nat (inside,outside) static interface service tcp rtsp rtsp &lt;BR /&gt;object network NVR3&lt;BR /&gt; nat (inside,outside) static interface service udp 8000 8000 &lt;BR /&gt;object network NVR4&lt;BR /&gt; nat (inside,outside) static interface service udp 10554 10554 &lt;BR /&gt;object network NVR5&lt;BR /&gt; nat (inside,outside) static interface service udp 554 554 &lt;BR /&gt;object network NVR6&lt;BR /&gt; nat (inside,outside) static interface service tcp 10080 10080 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic obj_any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group dmz_access_ipv6_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.85.6.222 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable 8080&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer 96.91.46.9 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable inside client-services port 8080&lt;BR /&gt;crypto ikev2 enable outside client-services port 8080&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.120.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 192.168.120.25 208.67.222.222&lt;BR /&gt;dhcpd wins 192.168.120.25&lt;BR /&gt;dhcpd lease 86400&lt;BR /&gt;dhcpd domain nwdls.com&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;dhcpd update dns &lt;BR /&gt;dhcpd option 3 ip 192.168.120.1&lt;BR /&gt;dhcpd option 66 ip 192.168.120.233&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.120.50-192.168.120.119 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 66.187.233.4 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; port 8080&lt;BR /&gt; enable outside&lt;BR /&gt; dtls port 8080&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-2.0.0343-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.5.3054-k9.pkg 2&lt;BR /&gt; anyconnect profiles nwdls1 disk0:/nwdls1.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value nwdls_splitTunnelAcl&lt;BR /&gt;group-policy EasyVPN internal&lt;BR /&gt;group-policy EasyVPN attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25 75.75.75.75&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value EasyVPN_splitTunnelAcl&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 internal&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 internal&lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value nwdls1 type user&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy nwdlsgroup internal&lt;BR /&gt;group-policy nwdlsgroup attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt; anyconnect ask enable default webvpn&lt;BR /&gt;group-policy nwdls internal&lt;BR /&gt;group-policy nwdls attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt; ipsec-udp enable&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;username deena password 1jZizDREl2QRiv7H encrypted&lt;BR /&gt;username deena attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username Test password tEw.zBkWtr5cfsmI encrypted privilege 15&lt;BR /&gt;username derek password 3TzysbBXovQgzpHA encrypted&lt;BR /&gt;username derek attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username monica password Vl3AxqOzs1FaYFP1 encrypted&lt;BR /&gt;username monica attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username jill password IsB48p5obkwE/dw9 encrypted&lt;BR /&gt;username jimhorne password /74Kfw0gqsPfF82T encrypted&lt;BR /&gt;username jimhorne attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username pete password RGOM9U0/BK5awC8Z encrypted&lt;BR /&gt;username pete attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username admin password sM/cvVSkWC3aa0kQ encrypted privilege 15&lt;BR /&gt;username john password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username john2 password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage disable&lt;BR /&gt;username remotesite1 password 0quAjW6jr7HJmZTS encrypted privilege 0&lt;BR /&gt;username remotesite1 attributes&lt;BR /&gt; vpn-group-policy EasyVPN&lt;BR /&gt;username simply password Lf/AtECdBHaWjnY6 encrypted&lt;BR /&gt;username simply attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; memberof nwdls&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username simply2 password M7ISu.T1R2QrDasU encrypted&lt;BR /&gt;username simply2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;username matt password Mv7Iy4C7Z4wN9kXv encrypted&lt;BR /&gt;username matt attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt;username matthews password X4kBHeuSkWam3waC encrypted&lt;BR /&gt;username matthews attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username theran password CW2R4MKStb7xJwgZ encrypted&lt;BR /&gt;username theran attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username root password Lm6zFIw1OvIlLNqp encrypted&lt;BR /&gt;username willie password i9HtXKw/5SwL8PXt encrypted&lt;BR /&gt;username whitney password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username whitney2 password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;tunnel-group nwdlsvpn type remote-access&lt;BR /&gt;tunnel-group nwdlsvpn general-attributes&lt;BR /&gt; address-pool vpnpool2&lt;BR /&gt; default-group-policy nwdlsgroup&lt;BR /&gt;tunnel-group nwdls type remote-access&lt;BR /&gt;tunnel-group nwdls general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy nwdls&lt;BR /&gt;tunnel-group nwdls ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group nwdls ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group Nwdlsx64 type remote-access&lt;BR /&gt;tunnel-group Nwdlsx64 general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;tunnel-group Nwdlsx64 webvpn-attributes&lt;BR /&gt; group-alias Nwdlsx64 enable&lt;BR /&gt;tunnel-group nvpn type remote-access&lt;BR /&gt;tunnel-group nvpn general-attributes&lt;BR /&gt; authentication-server-group (outside) LOCAL&lt;BR /&gt; authorization-server-group (outside) LOCAL&lt;BR /&gt;tunnel-group nvpn ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; peer-id-validate nocheck&lt;BR /&gt;tunnel-group nvpn ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group EasyVPN type remote-access&lt;BR /&gt;tunnel-group EasyVPN general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy EasyVPN&lt;BR /&gt;tunnel-group EasyVPN ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 96.91.46.9 type ipsec-l2l&lt;BR /&gt;tunnel-group 96.91.46.9 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_96.91.46.9&lt;BR /&gt;tunnel-group 96.91.46.9 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:17fc5d963ace89c9be02359f7988bb09&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:55:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881670#M157359</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2019-03-12T07:55:34Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881671#M157360</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I do not see 192.168.128.x subnet a part of the split tunnel ACL.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please add it to the split tunnel ACL and test again with the Anyconnect client&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Make sure you &lt;G class="gr_ gr_207 gr-alert gr_spell gr_run_anim ContextualSpelling" id="207" data-gr-id="207"&gt;logoff&lt;/G&gt; from the client and &lt;G class="gr_ gr_225 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="225" data-gr-id="225"&gt;relogin&lt;/G&gt; to the client after making this change.,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 15:47:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881671#M157360</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-21T15:47:50Z</dc:date>
    </item>
    <item>
      <title>Thank you for your help!</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881672#M157361</link>
      <description>&lt;P&gt;Thank you for your help!&lt;/P&gt;
&lt;P&gt;I added a split-tunnel-list acl and applied it to the groupolicy NWdlsx64 and i'm still unable to get to the remote network? Did I implement it incorrectly?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result of the command: "show run"&lt;/P&gt;
&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.4(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name nwdls.com&lt;BR /&gt;enable password qpQ5myeZ6SQpH8vX encrypted&lt;BR /&gt;passwd HUeZALO3Fgqs0XMf encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.120.30 dvr&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; switchport access vlan 15&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.120.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 96.85.6.217 255.255.255.248 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.121.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa842-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CST -6&lt;BR /&gt;clock summer-time CDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.120.25&lt;BR /&gt; name-server 75.75.75.75&lt;BR /&gt; name-server 75.75.75.76&lt;BR /&gt; domain-name nwdls.com&lt;BR /&gt;object network obj-192.168.120.248&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network obj-192.168.120.245&lt;BR /&gt; host 192.168.120.245&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; subnet 192.168.120.0 255.255.255.128&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; host 192.168.120.233&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; host 192.168.121.2&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.248_29&lt;BR /&gt; subnet 192.168.120.248 255.255.255.248&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description Windows Server 2008 RC2&lt;BR /&gt;object network DVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object service IPCAMS&lt;BR /&gt; service tcp source eq 5550 destination eq 5550 &lt;BR /&gt;object network newfirewall&lt;BR /&gt; host 192.168.120.108&lt;BR /&gt;object service ssh&lt;BR /&gt; service tcp source eq ssh destination eq ssh &lt;BR /&gt; description ssh&lt;BR /&gt;object network john&lt;BR /&gt; host 71.11.173.163&lt;BR /&gt;object network SVN-HTTP-INTERNET&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt; description access to svn on nwdls-dc&lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; host 192.168.120.209&lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; host 192.168.120.202&lt;BR /&gt;object network DVR-PORT&lt;BR /&gt;object network DVR-PORT2&lt;BR /&gt;object network obj-pool&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network NVR&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR&lt;BR /&gt;object network NVR1&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR2&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR3&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR4&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR5&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt;object network NVR6&lt;BR /&gt; host 192.168.120.30&lt;BR /&gt; description NVR6&lt;BR /&gt;object service Field&lt;BR /&gt; service tcp destination eq www &lt;BR /&gt;object service Field2&lt;BR /&gt; service tcp destination eq https &lt;BR /&gt;object network WebserverPublic&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network Webserver&lt;BR /&gt; host 207.70.142.9&lt;BR /&gt;object network WEb&lt;BR /&gt; host 192.168.120.25&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.0_24&lt;BR /&gt; subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.240_28&lt;BR /&gt; subnet 192.168.120.240 255.255.255.240&lt;BR /&gt;object network Remote-Site-Firewall&lt;BR /&gt; host 96.91.46.9&lt;BR /&gt;object network Remote-Site-Subnet&lt;BR /&gt; subnet 192.168.128.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service dvr-http tcp&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service dvr-remote tcp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service IPCAM tcp-udp&lt;BR /&gt; port-object eq 5550&lt;BR /&gt;object-group service svn-http tcp&lt;BR /&gt; description SVN Server access&lt;BR /&gt; port-object eq 8080&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; group-object svn-http&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt; group-object svn-http&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service NVRPORTS tcp&lt;BR /&gt; description NVRPORTS&lt;BR /&gt; port-object eq 10554&lt;BR /&gt; port-object eq 8000&lt;BR /&gt; port-object eq rtsp&lt;BR /&gt;object-group service field tcp&lt;BR /&gt; port-object eq 10443&lt;BR /&gt; port-object eq 8180&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt; port-object eq 8080&lt;BR /&gt; port-object eq 9150&lt;BR /&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list wendy_acl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq rtsp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10554 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 8000 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp-data &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq www &lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.233 range 10001 19999 &lt;BR /&gt;access-list outside_access_in remark Whitney&lt;BR /&gt;access-list outside_access_in extended permit udp host 99.16.64.231 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.225.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 4.79.212.236 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.203 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.202 host 192.168.120.233 eq sip &lt;BR /&gt;access-list outside_access_in extended permit 21 any host 192.168.121.2 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.9 &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.10 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 192.168.120.30 object-group IPCAM &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 object-group DM_INLINE_TCP_2 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 9150 &lt;BR /&gt;access-list outside_access_in remark node access&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9150 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9418 &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object DVR object-group dvr-http &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group NVRPORTS any object-group NVRPORTS &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10080 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 eq https &lt;BR /&gt;access-list outside_access_in extended permit icmp any host 96.85.6.217 &lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.120.0 255.255.255.0 any &lt;BR /&gt;access-list inside_access_out extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_3 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any any &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq lpd &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 631 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 9100 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.251 eq 5353 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.252 eq 5355 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 137 &lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any any eq netbios-ns &lt;BR /&gt;access-list Comcast-Outside_access_in extended permit ip any any &lt;BR /&gt;access-list EasyVPN_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0 &lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.120.0 255.255.255.0 object Remote-Site-Subnet &lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.128.0 255.255.255.0 &lt;BR /&gt;pager lines 45&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging asdm-buffer-size 512&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging mail critical&lt;BR /&gt;logging from-address ciscoasa@nwdls.com&lt;BR /&gt;logging host inside 192.168.120.203&lt;BR /&gt;logging class auth trap debugging asdm debugging &lt;BR /&gt;logging class session trap errors &lt;BR /&gt;logging class vpn trap debugging asdm debugging &lt;BR /&gt;logging class vpnc trap debugging &lt;BR /&gt;logging class vpnfo trap debugging &lt;BR /&gt;logging class webvpn trap debugging &lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 305012&lt;BR /&gt;no logging message 305011&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 106100&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool vpnpool2 192.168.120.249-192.168.120.254 mask 255.255.255.0&lt;BR /&gt;ip local pool vpnpool3 192.168.120.241-192.168.120.248 mask 255.255.255.0&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;ipv6 access-list dmz_access_ipv6_in deny ip any any &lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-645.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static any any destination static obj-pool obj-pool no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.248 obj-192.168.120.248 no-proxy-arp&lt;BR /&gt;nat (inside,any) source static any any destination static obj-192.168.120.245 obj-192.168.120.245 no-proxy-arp&lt;BR /&gt;nat (outside,inside) source static any any destination static interface DVR service IPCAMS IPCAMS&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static NETWORK_OBJ_192.168.120.240_28 NETWORK_OBJ_192.168.120.240_28 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_192.168.120.0_24 NETWORK_OBJ_192.168.120.0_24 destination static Remote-Site-Subnet Remote-Site-Subnet no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.120.0&lt;BR /&gt; nat (inside,dmz) static 192.168.120.0&lt;BR /&gt;object network obj-192.168.120.233&lt;BR /&gt; nat (inside,outside) static 96.85.6.218&lt;BR /&gt;object network obj-192.168.120.233-01&lt;BR /&gt; nat (inside,outside) dynamic 96.85.6.218&lt;BR /&gt;object network obj-192.168.121.2&lt;BR /&gt; nat (dmz,outside) static interface service tcp www www &lt;BR /&gt;object network obj-192.168.121.2-01&lt;BR /&gt; nat (dmz,outside) static interface service tcp ssh ssh &lt;BR /&gt;object network obj-192.168.121.2-02&lt;BR /&gt; nat (dmz,outside) dynamic interface&lt;BR /&gt;object network nwdls-dc&lt;BR /&gt; nat (inside,outside) static interface service tcp https https &lt;BR /&gt;object network JOSHUA9-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp 9150 9150 &lt;BR /&gt;object network JOSHUA2-PORT&lt;BR /&gt; nat (inside,outside) static interface service tcp ftp-data ftp-data &lt;BR /&gt;object network NVR&lt;BR /&gt; nat (inside,outside) static interface service tcp 8000 8000 &lt;BR /&gt;object network NVR1&lt;BR /&gt; nat (inside,outside) static interface service tcp 10554 10554 &lt;BR /&gt;object network NVR2&lt;BR /&gt; nat (inside,outside) static interface service tcp rtsp rtsp &lt;BR /&gt;object network NVR3&lt;BR /&gt; nat (inside,outside) static interface service udp 8000 8000 &lt;BR /&gt;object network NVR4&lt;BR /&gt; nat (inside,outside) static interface service udp 10554 10554 &lt;BR /&gt;object network NVR5&lt;BR /&gt; nat (inside,outside) static interface service udp 554 554 &lt;BR /&gt;object network NVR6&lt;BR /&gt; nat (inside,outside) static interface service tcp 10080 10080 &lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic obj_any interface&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group inside_access_out out interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group dmz_access_ipv6_in in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.85.6.222 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable 8080&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer 96.91.46.9 &lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt; encryption aes-192&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt; encryption aes&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt; encryption 3des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt; encryption des&lt;BR /&gt; integrity sha&lt;BR /&gt; group 5 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable inside client-services port 8080&lt;BR /&gt;crypto ikev2 enable outside client-services port 8080&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.120.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 192.168.120.25 208.67.222.222&lt;BR /&gt;dhcpd wins 192.168.120.25&lt;BR /&gt;dhcpd lease 86400&lt;BR /&gt;dhcpd domain nwdls.com&lt;BR /&gt;dhcpd auto_config inside&lt;BR /&gt;dhcpd update dns &lt;BR /&gt;dhcpd option 3 ip 192.168.120.1&lt;BR /&gt;dhcpd option 66 ip 192.168.120.233&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.120.50-192.168.120.119 inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 66.187.233.4 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; port 8080&lt;BR /&gt; enable outside&lt;BR /&gt; dtls port 8080&lt;BR /&gt; anyconnect image disk0:/anyconnect-win-2.0.0343-k9.pkg 1&lt;BR /&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.5.3054-k9.pkg 2&lt;BR /&gt; anyconnect profiles nwdls1 disk0:/nwdls1.xml&lt;BR /&gt; anyconnect enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value nwdls_splitTunnelAcl&lt;BR /&gt;group-policy EasyVPN internal&lt;BR /&gt;group-policy EasyVPN attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25 75.75.75.75&lt;BR /&gt; vpn-tunnel-protocol ikev1 &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value EasyVPN_splitTunnelAcl&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 internal&lt;BR /&gt;group-policy GroupPolicy_96.91.46.9 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 internal&lt;BR /&gt;group-policy GroupPolicy_Nwdlsx64 attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_Tunnel_List&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; anyconnect profiles value nwdls1 type user&lt;BR /&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;BR /&gt;group-policy nwdlsgroup internal&lt;BR /&gt;group-policy nwdlsgroup attributes&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt; webvpn&lt;BR /&gt; url-list none&lt;BR /&gt; anyconnect ask enable default webvpn&lt;BR /&gt;group-policy nwdls internal&lt;BR /&gt;group-policy nwdls attributes&lt;BR /&gt; wins-server value 192.168.120.25&lt;BR /&gt; dns-server value 192.168.120.25&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt; ipsec-udp enable&lt;BR /&gt; default-domain value nwdls.com&lt;BR /&gt;username deena password 1jZizDREl2QRiv7H encrypted&lt;BR /&gt;username deena attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username Test password tEw.zBkWtr5cfsmI encrypted privilege 15&lt;BR /&gt;username derek password 3TzysbBXovQgzpHA encrypted&lt;BR /&gt;username derek attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username monica password Vl3AxqOzs1FaYFP1 encrypted&lt;BR /&gt;username monica attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username jill password IsB48p5obkwE/dw9 encrypted&lt;BR /&gt;username jimhorne password /74Kfw0gqsPfF82T encrypted&lt;BR /&gt;username jimhorne attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username pete password RGOM9U0/BK5awC8Z encrypted&lt;BR /&gt;username pete attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username admin password sM/cvVSkWC3aa0kQ encrypted privilege 15&lt;BR /&gt;username john password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username john2 password .Ay30EFU56VufM4C encrypted&lt;BR /&gt;username john2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage disable&lt;BR /&gt;username remotesite1 password 0quAjW6jr7HJmZTS encrypted privilege 0&lt;BR /&gt;username remotesite1 attributes&lt;BR /&gt; vpn-group-policy EasyVPN&lt;BR /&gt;username simply password Lf/AtECdBHaWjnY6 encrypted&lt;BR /&gt;username simply attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; memberof nwdls&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted&lt;BR /&gt;username simply2 password M7ISu.T1R2QrDasU encrypted&lt;BR /&gt;username simply2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;username matt password Mv7Iy4C7Z4wN9kXv encrypted&lt;BR /&gt;username matt attributes&lt;BR /&gt; vpn-group-policy nwdls&lt;BR /&gt;username matthews password X4kBHeuSkWam3waC encrypted&lt;BR /&gt;username matthews attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username theran password CW2R4MKStb7xJwgZ encrypted&lt;BR /&gt;username theran attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;username root password Lm6zFIw1OvIlLNqp encrypted&lt;BR /&gt;username willie password i9HtXKw/5SwL8PXt encrypted&lt;BR /&gt;username whitney password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout 30&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;username whitney2 password bWAWSJFGmo8Y59O4 encrypted&lt;BR /&gt;username whitney2 attributes&lt;BR /&gt; vpn-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt; vpn-simultaneous-logins 100&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt; password-storage enable&lt;BR /&gt;tunnel-group nwdlsvpn type remote-access&lt;BR /&gt;tunnel-group nwdlsvpn general-attributes&lt;BR /&gt; address-pool vpnpool2&lt;BR /&gt; default-group-policy nwdlsgroup&lt;BR /&gt;tunnel-group nwdls type remote-access&lt;BR /&gt;tunnel-group nwdls general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy nwdls&lt;BR /&gt;tunnel-group nwdls ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group nwdls ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group Nwdlsx64 type remote-access&lt;BR /&gt;tunnel-group Nwdlsx64 general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy GroupPolicy_Nwdlsx64&lt;BR /&gt;tunnel-group Nwdlsx64 webvpn-attributes&lt;BR /&gt; group-alias Nwdlsx64 enable&lt;BR /&gt;tunnel-group nvpn type remote-access&lt;BR /&gt;tunnel-group nvpn general-attributes&lt;BR /&gt; authentication-server-group (outside) LOCAL&lt;BR /&gt; authorization-server-group (outside) LOCAL&lt;BR /&gt;tunnel-group nvpn ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; peer-id-validate nocheck&lt;BR /&gt;tunnel-group nvpn ppp-attributes&lt;BR /&gt; authentication ms-chap-v2&lt;BR /&gt;tunnel-group EasyVPN type remote-access&lt;BR /&gt;tunnel-group EasyVPN general-attributes&lt;BR /&gt; address-pool vpnpool3&lt;BR /&gt; default-group-policy EasyVPN&lt;BR /&gt;tunnel-group EasyVPN ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group 96.91.46.9 type ipsec-l2l&lt;BR /&gt;tunnel-group 96.91.46.9 general-attributes&lt;BR /&gt; default-group-policy GroupPolicy_96.91.46.9&lt;BR /&gt;tunnel-group 96.91.46.9 ipsec-attributes&lt;BR /&gt; ikev1 pre-shared-key *****&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt; no active&lt;BR /&gt; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt; destination address email callhome@cisco.com&lt;BR /&gt; destination transport-method http&lt;BR /&gt; subscribe-to-alert-group diagnostic&lt;BR /&gt; subscribe-to-alert-group environment&lt;BR /&gt; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:81ca3c881d365a36e418741578ab9dfb&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 17:07:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881672#M157361</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2016-06-21T17:07:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881673#M157362</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please check this link for doing this configuration:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/discussion/10914361/anyconnect-client-site-site-destination&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This would help you to perform the same configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 17:37:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881673#M157362</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-21T17:37:08Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881674#M157363</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;from the configuration i do see that your problem caused by split tunnel specified on the group policy.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;group-policy &lt;STRONG&gt;DfltGrpPolicy&lt;/STRONG&gt; attributes&lt;BR /&gt;&amp;nbsp; split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp; split-tunnel-network-list value &lt;STRONG&gt;nwdls_splitTunnelAcl&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;as your acl only allow you to subnet 192.168.120.0/24, so you will not be able to access another subnet through your vpn tunnel. All you need is add new entry on your acl for subnet 192.168.128.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.128.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;for detail about split tunnel, pls check on this http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/configuration/guide/asa_84_cli_config/vpn_groups.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;ak&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 22:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881674#M157363</guid>
      <dc:creator>adam kalabadzi</dc:creator>
      <dc:date>2016-06-21T22:53:32Z</dc:date>
    </item>
    <item>
      <title>Thank you Adam, I forgot it</title>
      <link>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881675#M157364</link>
      <description>&lt;P&gt;Thank you Adam, I forgot it was inheriting from that default group policy. I added in the remote subnet to the nwdls_splitTunnelAcl and I still am unable to access the remote subnet? Anything else I might want to look at?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# show run access-list&lt;BR /&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0&lt;BR /&gt;access-list nwdls_splitTunnelAcl remark Remote Site&lt;BR /&gt;access-list nwdls_splitTunnelAcl standard permit 192.168.128.0 255.255.255.0&lt;BR /&gt;access-list wendy_acl standard permit 192.168.120.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30&lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 554&lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 10554&lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.30 eq 8000&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq rtsp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10554&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 8000&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp-data&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.202 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq www&lt;BR /&gt;access-list outside_access_in extended permit udp any host 192.168.120.233 range 10001 19999&lt;BR /&gt;access-list outside_access_in remark Whitney&lt;BR /&gt;access-list outside_access_in extended permit udp host 99.16.64.231 host 192.168.120.233 eq sip&lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.225.202 host 192.168.120.233 eq sip&lt;BR /&gt;access-list outside_access_in extended permit udp host 4.79.212.236 host 192.168.120.233 eq sip&lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.203 host 192.168.120.233 eq sip&lt;BR /&gt;access-list outside_access_in extended permit udp host 216.82.224.202 host 192.168.120.233 eq sip&lt;BR /&gt;access-list outside_access_in extended permit 21 any host 192.168.121.2&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.9&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 207.70.142.10 inactive&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any host 192.168.120.30 object-group IPCAM&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 8080&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 object-group DM_INLINE_TCP_2&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 9150&lt;BR /&gt;access-list outside_access_in remark node access&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9150&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.209 eq 9418&lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside object-group dvr-http&lt;BR /&gt;access-list outside_access_in extended permit tcp any object DVR object-group dvr-http&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group NVRPORTS any object-group NVRPORTS&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.30 eq 10080&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 207.70.142.9 eq https&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.120.25 eq https&lt;BR /&gt;access-list outside_access_in extended permit icmp any host 96.85.6.217&lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.120.0 255.255.255.0 any&lt;BR /&gt;access-list inside_access_in extended permit icmp 192.168.120.0 255.255.255.0 any&lt;BR /&gt;access-list inside_access_out extended permit ip any any&lt;BR /&gt;access-list dmz_access_in extended permit tcp any host 192.168.121.2 object-group DM_INLINE_TCP_3&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any any&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any any eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any any eq netbios-ns&lt;BR /&gt;access-list Comcast-Outside_access_in extended permit ip any any&lt;BR /&gt;access-list EasyVPN_splitTunnelAcl standard permit 192.168.120.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.120.0 255.255.255.0 object Remote-Site-Subnet&lt;BR /&gt;access-list Split_Tunnel_List standard permit 192.168.128.0 255.255.255.0&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2016 13:27:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-to-remote-site-through-vpn/m-p/2881675#M157364</guid>
      <dc:creator>nwdls8725</dc:creator>
      <dc:date>2016-06-22T13:27:57Z</dc:date>
    </item>
  </channel>
</rss>

