<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic result and current config in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782382#M173702</link>
    <description>&lt;P&gt;result and current config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you help me modify the current config so that the vpn clients can ping all networks and have internet acceso from ASA&lt;/P&gt;
&lt;P&gt;Also that the User from ipsec can use SSL (Default group i think)&lt;/P&gt;
&lt;P&gt;you can edit this current config from asa&lt;/P&gt;
&lt;P&gt;make the necessary arrangements you fill fit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xca8bc6a0, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=1, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;runing conf&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;BR /&gt;enable password XXXX&amp;nbsp;encrypted&lt;BR /&gt;passwd XXXXX&amp;nbsp;encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.15.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone WEST 0&lt;BR /&gt;clock summer-time WEDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.7.254&lt;BR /&gt;object-group network net_vpnclients&lt;BR /&gt; network-object 192.168.21.0 255.255.255.0&lt;BR /&gt;access-list outside-in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside-in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list ClientVPN_ACCESS extended permit ip 192.168.21.0 255.255.255.0 192.168.15.0 255.255.255.0&lt;BR /&gt;access-list Split_ClientVPN standard permit 192.168.15.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 object-group net_vpnclients&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered notifications&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool vpnpool 192.168.21.10-192.168.21.200 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound outside&lt;BR /&gt;nat (inside) 1 192.168.15.0 255.255.255.0&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;http server enable 10443&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set AES esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map DYNAMAP 50 set transform-set AES&lt;BR /&gt;crypto map IPSEC_GW 50 ipsec-isakmp dynamic DYNAMAP&lt;BR /&gt;crypto map IPSEC_GW interface outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd dns 192.168.7.254&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.15.20-192.168.15.249 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 194.117.9.130 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-win-2.2.0133-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy SSLClient_GRP internal&lt;BR /&gt;group-policy SSLClient_GRP attributes&lt;BR /&gt; dns-server value 192.168.7.254&lt;BR /&gt; vpn-simultaneous-logins 1&lt;BR /&gt; vpn-filter value ClientVPN_ACCESS&lt;BR /&gt; vpn-tunnel-protocol svc webvpn&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; address-pools value vpnpool&lt;BR /&gt; ipv6-address-pools none&lt;BR /&gt; webvpn&lt;BR /&gt; svc keep-installer none&lt;BR /&gt; svc rekey time 30&lt;BR /&gt; svc rekey method ssl&lt;BR /&gt; svc ask none default webvpn&lt;BR /&gt;group-policy VPNClient_GRP internal&lt;BR /&gt;group-policy VPNClient_GRP attributes&lt;BR /&gt; vpn-simultaneous-logins 10&lt;BR /&gt; vpn-filter value ClientVPN_ACCESS&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_ClientVPN&lt;BR /&gt; address-pools value vpnpool&lt;BR /&gt;username admin password XXXXXXX&amp;nbsp;encrypted privilege 15&lt;BR /&gt;username USER&amp;nbsp;password XXXXXXX&amp;nbsp;encrypted&lt;BR /&gt;username&amp;nbsp;USERattributes&lt;BR /&gt; vpn-group-policy VPNClient_GRP&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username USERSSL&amp;nbsp;password XXXXX&amp;nbsp;encrypted&lt;BR /&gt;username USERSSL&amp;nbsp;attributes&lt;BR /&gt; vpn-group-policy SSLClient_GRP&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group VPNClient_CONN type remote-access&lt;BR /&gt;tunnel-group VPNClient_CONN general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy VPNClient_GRP&lt;BR /&gt;tunnel-group VPNClient_CONN ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group SSLClient_CONN type remote-access&lt;BR /&gt;tunnel-group SSLClient_CONN general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy SSLClient_GRP&lt;BR /&gt;tunnel-group SSLClient_CONN webvpn-attributes&lt;BR /&gt; group-alias SSLClient_GRP enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:XXXXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Jan 2016 22:09:29 GMT</pubDate>
    <dc:creator>johnnyboy788</dc:creator>
    <dc:date>2016-01-06T22:09:29Z</dc:date>
    <item>
      <title>Cisco ASA 5510 - VPN e Security</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782374#M173690</link>
      <description>&lt;P&gt;Hello, i'm currently trying to transform my home network into something better by adding a Cisco ASA 5510.&lt;/P&gt;
&lt;P&gt;I'm going to post my current running config.&lt;/P&gt;
&lt;P&gt;the idea is for everyone who gets in by VPN to transfer all traffic to my public IP address.&lt;/P&gt;
&lt;P&gt;All traffic must be passing by the outside interface.&lt;/P&gt;
&lt;P&gt;the problem is that i can conect to the VPN but cant ping anything or access any computer or even the router by VPN&lt;/P&gt;
&lt;P&gt;i get a VPN ip address but no pings or SSH connections or response.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also would like to ask if anyone see that the network and config can have more protection features, just send your sugestions for it to be saffer.&lt;/P&gt;
&lt;P&gt;I have a SDM Module if it has any use i can give at it just let me know how&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All help will be apreeciated.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;---------------------------------------------------------------------&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;Running Config&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;SPAN&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password&amp;nbsp;[password]&lt;BR /&gt;passwd&amp;nbsp;[password]&lt;BR /&gt;!&lt;BR /&gt;!Interface setup:&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&amp;nbsp;&lt;BR /&gt;no shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.15.254 255.255.255.0&lt;BR /&gt;no shutdown&lt;BR /&gt;!&lt;BR /&gt;!clock timezone&lt;BR /&gt;!&lt;BR /&gt;clock timezone WEST 0&lt;BR /&gt;clock summer-time WEST recurring last Sun Mar 1:00 last Sun Oct 1:00&lt;BR /&gt;!&lt;BR /&gt;!DNS server group&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 192.168.7.254&lt;BR /&gt;!&lt;BR /&gt;object-group network net_vpnclients&lt;BR /&gt;network-object 192.168.21.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!Acls&lt;BR /&gt;access-list outside-in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside-in extended permit icmp any any time-exceeded&lt;BR /&gt;!&lt;BR /&gt;access-list ClientVPN_ACCESS extended permit ip 192.168.21.0 255.255.255.0 192.168.15.0 255.255.255.0&lt;BR /&gt;access-list Split_ClientVPN permit 192.168.15.0 255.255.255.0 any&lt;BR /&gt;access-list nonat extended permit ip 192.168.15.0 255.255.255.0 192.168.21.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;!Logging (&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/doc...sa-00.html&lt;/A&gt;)&lt;BR /&gt;!&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered notifications&lt;BR /&gt;logging asdm informational&lt;BR /&gt;!&lt;BR /&gt;ip local pool vpnpool 192.168.21.10-192.168.21.200 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;!&lt;BR /&gt;asdm history enable&lt;BR /&gt;!&lt;BR /&gt;!NAT/PAT (&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/64758-pix70-nat-pat.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/doc...t-pat.html&lt;/A&gt;)&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;!&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 192.168.15.0 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;!&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;!&lt;BR /&gt;http server enable 10443&lt;BR /&gt;http 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;!&lt;BR /&gt;!Phase 2 Configurations&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set AES esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map DYNAMAP 50 set transform-set AES&lt;BR /&gt;crypto map IPSEC_GW 50 ipsec-isakmp dynamic DYNAMAP&lt;BR /&gt;crypto map IPSEC_GW interface outside&lt;BR /&gt;!&lt;BR /&gt;!Phase 1 Configurations&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ssh 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;!&lt;BR /&gt;!DHCP Server (&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/70391-pix-asa-dhcp-svr-client.html#server" target="_blank"&gt;http://www.cisco.com/c/en/us/support/doc...tml#server&lt;/A&gt;)&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.15.20-192.168.15.249 inside&lt;BR /&gt;dhcpd dns 192.168.7.254&lt;BR /&gt;dhcpd lease 3600&lt;BR /&gt;dhcpd ping_timeout 50&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;ntp server 194.117.9.130 source outside prefer&lt;BR /&gt;!&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;svc image disk0:/anyconnect-win-2.2.0133-k9.pkg 1&lt;BR /&gt;svc enable&lt;BR /&gt;!&lt;BR /&gt;!IPSEC VPN Client (&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100413-asavpnclient-ca.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/doc...nt-ca.html&lt;/A&gt;)&lt;BR /&gt;!Create a group policy&lt;BR /&gt;!&lt;BR /&gt;group-policy VPNClient_GRP internal&lt;BR /&gt;group-policy VPNClient_GRP attributes&lt;BR /&gt;vpn-filter value ClientVPN_ACCESS&lt;BR /&gt;vpn-tunnel-protocol IPSec&amp;nbsp;&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;vpn-simultaneous-logins 10&lt;BR /&gt;split-tunnel-network-list value Split_ClientVPN&lt;BR /&gt;acl Split_ClientVPN&lt;BR /&gt;address-pools value vpnpool&lt;BR /&gt;!&lt;BR /&gt;!Create a Tunnel Connection&lt;BR /&gt;!&lt;BR /&gt;tunnel-group VPNClient_CONN type remote-access&lt;BR /&gt;tunnel-group VPNClient_CONN general-attributes&lt;BR /&gt;address-pool vpnpool&lt;BR /&gt;default-group-policy VPNClient_GRP&lt;BR /&gt;tunnel-group VPNClient_CONN ipsec-attributes&lt;BR /&gt;pre-shared-key&amp;nbsp;[PRE KEY]&lt;BR /&gt;!&lt;BR /&gt;!SSL VPN&lt;BR /&gt;!&lt;BR /&gt;group-policy SSLClient_GRP internal&lt;BR /&gt;group-policy SSLClient_GRP attributes&lt;BR /&gt;dns-server value 192.168.7.254&lt;BR /&gt;vpn-simultaneous-logins 1&lt;BR /&gt;vpn-filter value ClientVPN_ACCESS&lt;BR /&gt;vpn-tunnel-protocol svc webvpn&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Split_ClientVPN&lt;BR /&gt;webvpn&lt;BR /&gt;svc keep-installer none&lt;BR /&gt;svc rekey time 30&lt;BR /&gt;svc rekey method ssl&lt;BR /&gt;svc ask none default webvpn&lt;BR /&gt;!customization value VPN&lt;BR /&gt;!&lt;BR /&gt;tunnel-group SSLClient_CONN type remote-access&lt;BR /&gt;tunnel-group SSLClient_CONN general-attributes&lt;BR /&gt;address-pool vpnpool&lt;BR /&gt;default-group-policy SSLClient_GRP&lt;BR /&gt;tunnel-group SSLClient_CONN webvpn-attributes&lt;BR /&gt;!customization VPN&lt;BR /&gt;group-alias SSLClient_GRP enable&lt;BR /&gt;!&lt;BR /&gt;!user admin&lt;BR /&gt;username admin password [Password]&amp;nbsp;privilege 15&lt;BR /&gt;!&lt;BR /&gt;!user VPNIPSEC&lt;BR /&gt;username vpnuser&amp;nbsp;password&amp;nbsp;[Password]&lt;BR /&gt;username vpnuser&amp;nbsp;attributes&lt;BR /&gt;vpn-group-policy VPNClient_GRP&lt;BR /&gt;!&lt;BR /&gt;!user VPNSSL&lt;BR /&gt;username ssluser&amp;nbsp;password&amp;nbsp;[Password]&lt;BR /&gt;username ssluser&amp;nbsp;attributes&lt;BR /&gt;vpn-group-policy SSLClient_GRP&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782374#M173690</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2019-03-12T07:05:25Z</dc:date>
    </item>
    <item>
      <title>Hi johnnyboy788, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782375#M173692</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN class="fullname" itemprop="author"&gt;&lt;A href="https://supportforums.cisco.com/users/johnnyboy788" title="View user profile." class="username" lang="" about="/users/johnnyboy788" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;johnnyboy788&lt;/A&gt;,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;The configuration looks fine, &amp;nbsp;please run &amp;nbsp;a packet-tracer to verify the ASA is behaving &amp;nbsp;properly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;packet-tracer inside icmp &amp;nbsp;192.168.15.10 8 0 192.168.21.10 detailed. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;Hope it helps&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="fullname" itemprop="author"&gt;-Randy-&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 00:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782375#M173692</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-01-05T00:45:35Z</dc:date>
    </item>
    <item>
      <title>This is whith local computer</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782376#M173695</link>
      <description>&lt;P&gt;This is whith local computer and VPN connected&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.21.10 255.255.255.255 outside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 20:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782376#M173695</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-05T20:50:15Z</dc:date>
    </item>
    <item>
      <title>ciscoasa(config)# packet</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782377#M173697</link>
      <description>&lt;P&gt;This is with local client and no vpnclient&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa(config)# packet-tracer input inside icmp 192.168.15.0 8 0 192.168.21.$&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xca8bc6b0, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=28412, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 outside&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 20:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782377#M173697</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-05T20:50:56Z</dc:date>
    </item>
    <item>
      <title>From eth 0/1, console or vpn</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782378#M173698</link>
      <description>&lt;P style="text-align: left;"&gt;My ideias is for all traffic to pass through the vpn tunnel also any vpn client can get out with my public IP&lt;/P&gt;
&lt;P style="text-align: left;"&gt;Also i would like that&amp;nbsp;the same user that uses the IPSEC login can also use the IPSEC login on SSL anyconnect, so that i only create one user instead of 2&lt;/P&gt;
&lt;P style="text-align: left;"&gt;Can you show me that&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 20:53:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782378#M173698</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-05T20:53:18Z</dc:date>
    </item>
    <item>
      <title>Hi, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782379#M173699</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In order to have the vpn client to get out to the internet with the ASA public IP, you need to configure a U-Turn policy, you can find the example below:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100918-asa-sslvpn-00.html" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100918-asa-sslvpn-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the username is created locally on the ASA, can be used for both IPSEC and SSL connections by default, if the username is created on an external server, the server must be specified under the &amp;nbsp;tunnel-group of the connection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2016 23:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782379#M173699</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-01-05T23:40:36Z</dc:date>
    </item>
    <item>
      <title>Randy thanks for the time you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782380#M173700</link>
      <description>&lt;P&gt;Randy thanks for the time you are spending with me. But the VPN packet Tracer is abouve and packets are dropped still cand ping or connect to anything&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 06:27:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782380#M173700</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-06T06:27:14Z</dc:date>
    </item>
    <item>
      <title>Hi Johnny, </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782381#M173701</link>
      <description>&lt;P&gt;Hi Johnny,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is the configuration still the same as the one posted? Looks like this log might be caused by a security feature of the ASA, but the configuration posted looks fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you grab a recent config file, also try the packet-tracer with TCP and advise if we have the same results.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;packet-tracer inside tcp &amp;nbsp;192.168.15.10 22&amp;nbsp;192.168.21.10 22 detailed&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;-Randy-&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 21:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782381#M173701</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-01-06T21:44:13Z</dc:date>
    </item>
    <item>
      <title>result and current config</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782382#M173702</link>
      <description>&lt;P&gt;result and current config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you help me modify the current config so that the vpn clients can ping all networks and have internet acceso from ASA&lt;/P&gt;
&lt;P&gt;Also that the User from ipsec can use SSL (Default group i think)&lt;/P&gt;
&lt;P&gt;you can edit this current config from asa&lt;/P&gt;
&lt;P&gt;make the necessary arrangements you fill fit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xca8bc6a0, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=1, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;runing conf&lt;/P&gt;
&lt;P&gt;hostname ciscoasa&lt;BR /&gt;enable password XXXX&amp;nbsp;encrypted&lt;BR /&gt;passwd XXXXX&amp;nbsp;encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.15.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone WEST 0&lt;BR /&gt;clock summer-time WEDT recurring last Sun Mar 1:00 last Sun Oct 2:00&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server 192.168.7.254&lt;BR /&gt;object-group network net_vpnclients&lt;BR /&gt; network-object 192.168.21.0 255.255.255.0&lt;BR /&gt;access-list outside-in extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside-in extended permit icmp any any time-exceeded&lt;BR /&gt;access-list ClientVPN_ACCESS extended permit ip 192.168.21.0 255.255.255.0 192.168.15.0 255.255.255.0&lt;BR /&gt;access-list Split_ClientVPN standard permit 192.168.15.0 255.255.255.0&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 object-group net_vpnclients&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging buffered notifications&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool vpnpool 192.168.21.10-192.168.21.200 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound outside&lt;BR /&gt;nat (inside) 1 192.168.15.0 255.255.255.0&lt;BR /&gt;access-group outside-in in interface outside&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;http server enable 10443&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set AES esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map DYNAMAP 50 set transform-set AES&lt;BR /&gt;crypto map IPSEC_GW 50 ipsec-isakmp dynamic DYNAMAP&lt;BR /&gt;crypto map IPSEC_GW interface outside&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 65535&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.21.0 255.255.255.0 outside&lt;BR /&gt;ssh 192.168.15.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd dns 192.168.7.254&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.15.20-192.168.15.249 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 194.117.9.130 source outside prefer&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-win-2.2.0133-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt; tunnel-group-list enable&lt;BR /&gt;group-policy SSLClient_GRP internal&lt;BR /&gt;group-policy SSLClient_GRP attributes&lt;BR /&gt; dns-server value 192.168.7.254&lt;BR /&gt; vpn-simultaneous-logins 1&lt;BR /&gt; vpn-filter value ClientVPN_ACCESS&lt;BR /&gt; vpn-tunnel-protocol svc webvpn&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; address-pools value vpnpool&lt;BR /&gt; ipv6-address-pools none&lt;BR /&gt; webvpn&lt;BR /&gt; svc keep-installer none&lt;BR /&gt; svc rekey time 30&lt;BR /&gt; svc rekey method ssl&lt;BR /&gt; svc ask none default webvpn&lt;BR /&gt;group-policy VPNClient_GRP internal&lt;BR /&gt;group-policy VPNClient_GRP attributes&lt;BR /&gt; vpn-simultaneous-logins 10&lt;BR /&gt; vpn-filter value ClientVPN_ACCESS&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value Split_ClientVPN&lt;BR /&gt; address-pools value vpnpool&lt;BR /&gt;username admin password XXXXXXX&amp;nbsp;encrypted privilege 15&lt;BR /&gt;username USER&amp;nbsp;password XXXXXXX&amp;nbsp;encrypted&lt;BR /&gt;username&amp;nbsp;USERattributes&lt;BR /&gt; vpn-group-policy VPNClient_GRP&lt;BR /&gt; service-type remote-access&lt;BR /&gt;username USERSSL&amp;nbsp;password XXXXX&amp;nbsp;encrypted&lt;BR /&gt;username USERSSL&amp;nbsp;attributes&lt;BR /&gt; vpn-group-policy SSLClient_GRP&lt;BR /&gt; service-type remote-access&lt;BR /&gt;tunnel-group VPNClient_CONN type remote-access&lt;BR /&gt;tunnel-group VPNClient_CONN general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy VPNClient_GRP&lt;BR /&gt;tunnel-group VPNClient_CONN ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;tunnel-group SSLClient_CONN type remote-access&lt;BR /&gt;tunnel-group SSLClient_CONN general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy SSLClient_GRP&lt;BR /&gt;tunnel-group SSLClient_CONN webvpn-attributes&lt;BR /&gt; group-alias SSLClient_GRP enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map&lt;BR /&gt; inspect ftp&lt;BR /&gt; inspect h323 h225&lt;BR /&gt; inspect h323 ras&lt;BR /&gt; inspect rsh&lt;BR /&gt; inspect rtsp&lt;BR /&gt; inspect esmtp&lt;BR /&gt; inspect sqlnet&lt;BR /&gt; inspect skinny&lt;BR /&gt; inspect sunrpc&lt;BR /&gt; inspect xdmcp&lt;BR /&gt; inspect sip&lt;BR /&gt; inspect netbios&lt;BR /&gt; inspect tftp&lt;BR /&gt; inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:XXXXXXXXXXXXX&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 22:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782382#M173702</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-06T22:09:29Z</dc:date>
    </item>
    <item>
      <title>Yes same config as posted</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782383#M173703</link>
      <description>&lt;P&gt;P&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2016 22:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782383#M173703</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-06T22:39:46Z</dc:date>
    </item>
    <item>
      <title>The routing seems to be the</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782384#M173704</link>
      <description>&lt;P&gt;The routing seems to be the problem at this point, you need to add a default route or specific route to the ASA in order to be capable to route the traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;route outside 0 0 1.1.1.1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Where "1.1.1.1" is the IP of the next hop. The rest of the configuration looks fine.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers, &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2016 04:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782384#M173704</guid>
      <dc:creator>rvarelac</dc:creator>
      <dc:date>2016-01-08T04:26:22Z</dc:date>
    </item>
    <item>
      <title>Randy, thanks for all help</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782385#M173705</link>
      <description>&lt;P&gt;Randy, thanks for all help but nothing yet&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;After doing that correction, i have the ACLs and the tcp and icmp they give packed drop by rule, after checking asdm i see the the default deny implicit rules are taking affect, even if i create one for each adapter saying allow any any the deny is always used.&lt;/P&gt;
&lt;P&gt;I had to create a virtual adapter ethernet0/1.101 with vpn address&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you help?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you re-write a new config step by step to see whats wrong my Asa is 8.2 or 8.3 version&lt;/P&gt;</description>
      <pubDate>Mon, 11 Jan 2016 22:29:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5510-vpn-e-security/m-p/2782385#M173705</guid>
      <dc:creator>johnnyboy788</dc:creator>
      <dc:date>2016-01-11T22:29:04Z</dc:date>
    </item>
  </channel>
</rss>

