<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, From the captures we can in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768242#M166751</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the captures we can see that the traffic is leaving the ASA and there is no replies from 10.34.49.1 device.&lt;/P&gt;&lt;P&gt;Probably the device is not configured to reply to ping or there is some firewall on the device which is blocking it.&lt;/P&gt;&lt;P&gt;Also check if there is any other device that might block the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;From ASA perspective you are permitting all the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Oct 2015 07:49:35 GMT</pubDate>
    <dc:creator>Rishabh Seth</dc:creator>
    <dc:date>2015-10-20T07:49:35Z</dc:date>
    <item>
      <title>Couldnt ping the inside lan network using VPN Client.</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768239#M166748</link>
      <description>&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;Hi,&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;I configured VPN Client on cisco asa and it's now connecting but I encountered some issues.&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline; min-height: 8pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;1. I can't ping the inside lan of our network (servers,host etc).&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;2. I can pint the inside interface of ASA 10.1.1.1.&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline; min-height: 8pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;please see the atttache file.&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline; min-height: 8pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin-bottom: 0px; padding: 0px; border: 0px; font-size: 14px; font-family: Arial; vertical-align: baseline;"&gt;thanks&lt;A href="https://learningnetwork.cisco.com/servlet/JiveServlet/showImage/2-513813-314907/VPN.png" style="margin: 0px; padding: 0px; border: 0px; font-weight: inherit; font-style: inherit; font-family: inherit; vertical-align: baseline; color: rgb(0, 134, 192);" target="_blank"&gt;&lt;IMG alt="VPN.png" class="jive-image image-1" height="312" src="https://learningnetwork.cisco.com/servlet/JiveServlet/downloadImage/2-513813-314907/VPN.png" style="margin: 12px; padding: 0px; font-weight: inherit; font-style: inherit; font-family: inherit; vertical-align: baseline;" width="295" /&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768239#M166748</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2019-03-12T06:46:04Z</dc:date>
    </item>
    <item>
      <title>Hi, &gt;&gt; Are you able to ping</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768240#M166749</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Are you able to ping the server from ASA?&lt;/P&gt;&lt;P&gt;command: ping &amp;lt;inside-interface-name&amp;gt; &amp;lt;server-IP&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Can you check if you have any ACL that might block the traffic.&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; Is there any NAT for this traffic? If yes then ensure you have ICMP inspection enabled&amp;nbsp;&lt;/P&gt;&lt;P&gt;command: fixup protocol icmp&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt; In case you still face the issue try to check if the traffic is actually leaving the ASA or not. Use captures to check this:&lt;/P&gt;&lt;P&gt;command:&lt;/P&gt;&lt;P&gt;cap capi interface &amp;lt;inside-interface-name&amp;gt; match icmp host &amp;lt;source-ip&amp;gt; &amp;lt;destination-ip&amp;gt;&lt;/P&gt;&lt;P&gt;To view:&lt;/P&gt;&lt;P&gt;show cap capi&lt;/P&gt;&lt;P&gt;To delete:&lt;/P&gt;&lt;P&gt;no cap capi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2015 11:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768240#M166749</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-19T11:07:26Z</dc:date>
    </item>
    <item>
      <title>Hi R. Seth,1. yes from asa</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768241#M166750</link>
      <description>&lt;P&gt;Hi R. Seth,&lt;/P&gt;&lt;P&gt;1. yes from asa ican ping all the devices.&lt;BR /&gt;3.allready add fixup protocol icmp but its still the same&lt;BR /&gt;4. Show cap capi.&lt;BR /&gt;69 packets captured&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 00:24:26.227130 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.48.122: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;2: 00:24:31.249651 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.63.254: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;3: 00:24:35.817355 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.63.254: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;4: 00:24:36.715569 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.48.122: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;5: 00:24:40.782231 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.63.254: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;6: 00:24:41.288971 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.48.122: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;7: 00:24:45.775640 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.63.254: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;8: 00:24:50.820422 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.63.254: icmp: echo request&lt;BR /&gt;&amp;nbsp; &amp;nbsp;9: 00:24:51.314528 &amp;nbsp; &amp;nbsp; &amp;nbsp; 10.34.49.1 &amp;gt; 10.34.48.122: icmp: echo request&lt;/P&gt;&lt;P&gt;Details&lt;BR /&gt;ip local pool vpnpool 10.34.49.1-10.34.49.252 mask 255.255.240.0&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;object network NETWORK_OBJ_10.34.49.0_24&lt;BR /&gt;subnet 10.34.49.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.34.49.0_24 NETWORK_OBJ_10.34.49.0_24 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any 10.34.48.0 255.255.240.0&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list inside_access_in extended permit icmp 10.0.0.0 255.0.0.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.34.63.254 tunneled&lt;/P&gt;&lt;P&gt;Still doesn't work.&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 07:34:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768241#M166750</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2015-10-20T07:34:29Z</dc:date>
    </item>
    <item>
      <title>Hi, From the captures we can</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768242#M166751</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the captures we can see that the traffic is leaving the ASA and there is no replies from 10.34.49.1 device.&lt;/P&gt;&lt;P&gt;Probably the device is not configured to reply to ping or there is some firewall on the device which is blocking it.&lt;/P&gt;&lt;P&gt;Also check if there is any other device that might block the traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;From ASA perspective you are permitting all the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Share your findings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;R.Seth&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 07:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768242#M166751</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-10-20T07:49:35Z</dc:date>
    </item>
    <item>
      <title>Hi,I have configure firepower</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768243#M166752</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have configure firepower and the following command.&lt;/P&gt;&lt;P&gt;access-list ACL_ANY extended permit ip any anyclass-map SFR&lt;BR /&gt;&amp;nbsp;match access-list ACL_ANY&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;class SFR&lt;BR /&gt;&amp;nbsp; sfr fail-close&lt;/P&gt;&lt;P&gt;ive tried to remove the command but its still the same&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think i already permit all address on out acl.&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any 10.34.48.0 255.255.240.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 08:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768243#M166752</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2015-10-20T08:26:35Z</dc:date>
    </item>
    <item>
      <title># sh run: Saved:: Serial</title>
      <link>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768244#M166753</link>
      <description>&lt;P&gt;# sh run&lt;BR /&gt;ASA Version 9.2(2)4&lt;BR /&gt;!&lt;BR /&gt;hostname CBK-KAL-FW&lt;BR /&gt;domain-name test.com&lt;BR /&gt;enable password CPvrcBKnyVPXs2g6 encrypted&lt;BR /&gt;passwd SwuuYThZAkyq4HXA encrypted&lt;BR /&gt;names&lt;BR /&gt;ip local pool vpnpool 10.34.49.1-10.34.49.252 mask 255.255.240.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.34.63.252 255.255.240.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 122.X.X.X 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa922-4-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 10.34.63.239&lt;BR /&gt;&amp;nbsp;name-server 10.34.63.238&lt;BR /&gt;&amp;nbsp;domain-name test.com&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network lotusnotes&lt;BR /&gt;&amp;nbsp;host 10.34.63.221&lt;BR /&gt;object network cbk-wstation&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Host-10.34.48.26&lt;BR /&gt;&amp;nbsp;host 10.34.48.26&lt;BR /&gt;object network CITRIX&lt;BR /&gt;&amp;nbsp;host 10.34.63.223&lt;BR /&gt;object network SOFTRAK&lt;BR /&gt;&amp;nbsp;host 10.34.62.40&lt;BR /&gt;object network SAP&lt;BR /&gt;&amp;nbsp;host 10.34.61.1&lt;BR /&gt;object network NETWORK_OBJ_10.34.49.0_24&lt;BR /&gt;&amp;nbsp;subnet 10.34.49.0 255.255.255.0&lt;BR /&gt;object service citrix-1604&lt;BR /&gt;&amp;nbsp;service tcp destination eq 1604&lt;BR /&gt;object service sap-3200&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3200&lt;BR /&gt;object service sap-3299&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3299&lt;BR /&gt;object service sap-3300&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3300&lt;BR /&gt;object service sap-3389&lt;BR /&gt;&amp;nbsp;service tcp destination eq 3389&lt;BR /&gt;object network Host-10.34.63.240&lt;BR /&gt;&amp;nbsp;host 10.34.63.240&lt;BR /&gt;object network Test-network&lt;BR /&gt;&amp;nbsp;subnet 10.230.230.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.34.48.0_20&lt;BR /&gt;&amp;nbsp;subnet 10.34.48.0 255.255.240.0&lt;BR /&gt;object network 10.34.0.0&lt;BR /&gt;&amp;nbsp;subnet 10.34.0.0 255.255.0.0&lt;BR /&gt;object network Host-10.34.48.150&lt;BR /&gt;&amp;nbsp;host 10.34.48.150&lt;BR /&gt;object network Host-10.34.63.249&lt;BR /&gt;&amp;nbsp;host 10.34.63.249&lt;BR /&gt;&amp;nbsp;description CBK-FS1&lt;BR /&gt;object network Host-10.34.63.59&lt;BR /&gt;&amp;nbsp;host 10.34.63.59&lt;BR /&gt;object network Host-10.34.48.31&lt;BR /&gt;&amp;nbsp;host 10.34.48.31&lt;BR /&gt;&amp;nbsp;description Glen Ernas&lt;BR /&gt;object network Host-10.1.1.3&lt;BR /&gt;&amp;nbsp;host 10.1.1.3&lt;BR /&gt;object network Host-10.34.48.165&lt;BR /&gt;&amp;nbsp;host 10.34.48.165&lt;BR /&gt;&amp;nbsp;description Citrix&lt;BR /&gt;object network Host-10.34.63.57&lt;BR /&gt;&amp;nbsp;host 10.34.63.57&lt;BR /&gt;object network Site-A-Subnet&lt;BR /&gt;&amp;nbsp;subnet 10.34.48.0 255.255.240.0&lt;BR /&gt;&amp;nbsp;description Site A&lt;BR /&gt;object network Site-B-Subnet&lt;BR /&gt;&amp;nbsp;subnet 10.34.16.0 255.255.240.0&lt;BR /&gt;object network Host-10.34.61.12&lt;BR /&gt;&amp;nbsp;host 10.34.61.12&lt;BR /&gt;&amp;nbsp;description SAP PROD&lt;BR /&gt;object network Host-10.34.63.233&lt;BR /&gt;&amp;nbsp;host 10.34.63.233&lt;BR /&gt;&amp;nbsp;description New Server&lt;BR /&gt;object network Host-10.34.48.195&lt;BR /&gt;&amp;nbsp;host 10.34.48.195&lt;BR /&gt;&amp;nbsp;description PC-NPIE&lt;BR /&gt;object network Host-10.34.48.69&lt;BR /&gt;&amp;nbsp;host 10.34.48.69&lt;BR /&gt;object network Host-10.34.48.41&lt;BR /&gt;&amp;nbsp;host 10.34.48.41&lt;BR /&gt;&amp;nbsp;description Req-by mam Zink temp&lt;BR /&gt;object network Host-10.34.48.118&lt;BR /&gt;&amp;nbsp;host 10.34.48.118&lt;BR /&gt;&amp;nbsp;description TEMPORAR&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service LN_SERVICE&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq https&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq imap4&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq lotusnotes&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pop3&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq smtp&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;object-group network Allowed_Host&lt;BR /&gt;&amp;nbsp;description 10.34.48.69&lt;BR /&gt;&amp;nbsp;network-object object CITRIX&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.112.70&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.126&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.145&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.173&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.177&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.180&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.183&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.200&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.235&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.236&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.238&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.243&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.249&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.250&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.252&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.26&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.79&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.92&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.50.103&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.50.204&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.210&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.211&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.220&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.222&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.224&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.225&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.237&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.238&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.239&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.64.10&lt;BR /&gt;&amp;nbsp;network-object object SAP&lt;BR /&gt;&amp;nbsp;network-object object SOFTRAK&lt;BR /&gt;&amp;nbsp;network-object object lotusnotes&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.240&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.150&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.115&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.249&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.62&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.59&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.251&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.31&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.165&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.57&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.61.12&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.63.233&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.195&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.69&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.41&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.122&lt;BR /&gt;&amp;nbsp;network-object object Host-10.34.48.118&lt;BR /&gt;object-group service CITRIX_SERVICE&lt;BR /&gt;&amp;nbsp;service-object object citrix-1604&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq citrix-ica&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq www&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object CITRIX&lt;BR /&gt;&amp;nbsp;network-object object SAP&lt;BR /&gt;&amp;nbsp;network-object object SOFTRAK&lt;BR /&gt;&amp;nbsp;network-object object lotusnotes&lt;BR /&gt;access-list outside_access_in_2 extended permit object-group LN_SERVICE any object lotusnotes&lt;BR /&gt;access-list outside extended permit object-group LN_SERVICE any object lotusnotes&lt;BR /&gt;access-list outside extended permit object-group SAP_SERVICE any object SAP&lt;BR /&gt;access-list outside extended permit object-group CITRIX_SERVICE any object CITRIX&lt;BR /&gt;access-list outside extended permit object-group Softrak_Service any object SOFTRAK&lt;BR /&gt;access-list outside extended deny ip any object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list outside extended permit ip any 10.34.48.0 255.255.240.0&lt;BR /&gt;access-list inside_access_in extended permit object-group TCPUDP 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list inside_access_in extended permit icmp 10.0.0.0 255.0.0.0 any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip object lotusnotes any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip object CITRIX any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip object SAP any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip object SOFTRAK any&lt;BR /&gt;access-list inside_access_in_1 extended permit ip object-group Allowed_Host any&lt;BR /&gt;access-list inside_access_in_1 extended deny ip 10.34.48.0 255.255.240.0 any&lt;BR /&gt;access-list ACL_ANY extended permit ip any any&lt;BR /&gt;access-list outside2_access_in extended permit ip any 10.34.48.0 255.255.240.0 inactive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu outside2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-7221.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.34.49.0_24 NETWORK_OBJ_10.34.49.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic Allowed_Host interface dns&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;!&lt;BR /&gt;prefix-list anyconnect description VPNConnection&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;route-map anyconnect permit 11&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 122.X.X.X 1&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 10.34.63.254 tunneled&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh 10.34.48.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-4.0.00061-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect profiles AnyConnect_client_profile disk0:/AnyConnect_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect profiles anyconnect_client_profile disk0:/anyconnect_client_profile.xml&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;BR /&gt;&amp;nbsp;tunnel-group-list enable&lt;BR /&gt;group-policy SSL-VPN internal&lt;BR /&gt;group-policy SSL-VPN attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server none&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client ssl-clientless&lt;BR /&gt;&amp;nbsp;default-domain value test.com&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; anyconnect ask enable default webvpn timeout 20&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt;&amp;nbsp;dns-server value 10.34.63.239 10.34.63.238&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value testpower.com&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;BR /&gt;group-policy GroupPolicy_anyconnect internal&lt;BR /&gt;group-policy GroupPolicy_anyconnect attributes&lt;BR /&gt;&amp;nbsp;wins-server none&lt;BR /&gt;&amp;nbsp;dns-server value 10.34.63.239 10.34.63.238&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;&amp;nbsp;default-domain value test.com&lt;BR /&gt;&amp;nbsp;webvpn&lt;BR /&gt;&amp;nbsp; anyconnect profiles value AnyConnect_client_profile type user&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;username robert password s2AH/eaJdUkt6QnP encrypted&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt;&amp;nbsp;no authentication chap&lt;BR /&gt;&amp;nbsp;authentication ms-chap-v2&lt;BR /&gt;tunnel-group anyconnect type remote-access&lt;BR /&gt;tunnel-group anyconnect general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;authentication-server-group RADIUSSERVERS LOCAL&lt;BR /&gt;&amp;nbsp;default-group-policy GroupPolicy_anyconnect&lt;BR /&gt;tunnel-group anyconnect webvpn-attributes&lt;BR /&gt;&amp;nbsp;group-alias CBK-KAL-VPN enable&lt;BR /&gt;&amp;nbsp;group-alias anyconnect disable&lt;BR /&gt;tunnel-group SSL-VPN type remote-access&lt;BR /&gt;tunnel-group SSL-VPN general-attributes&lt;BR /&gt;&amp;nbsp;address-pool vpnpool&lt;BR /&gt;&amp;nbsp;authentication-server-group RADIUSSERVERS LOCAL&lt;BR /&gt;&amp;nbsp;default-group-policy SSL-VPN&lt;BR /&gt;!&lt;BR /&gt;class-map SFR&lt;BR /&gt;&amp;nbsp;match access-list ACL_ANY&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map policy&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect icmp error&lt;BR /&gt;&amp;nbsp;class SFR&lt;BR /&gt;&amp;nbsp; sfr fail-close&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:2e5b98f4ad7e8236305e711c7b5aef88&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2015 09:28:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/couldnt-ping-the-inside-lan-network-using-vpn-client/m-p/2768244#M166753</guid>
      <dc:creator>Lost &amp; Found</dc:creator>
      <dc:date>2015-10-20T09:28:10Z</dc:date>
    </item>
  </channel>
</rss>

