<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506-X Easy VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506025#M191703</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those builds are internal developers builds, not available for customers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This specific bug fix should (as in "I should be on time" &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/wink.png" /&gt;) be integrated in 9.5.2, tentatively scheduled for the end of November. If all goes well the bug should be fixed in that version. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can subscribe yourself to automatic bug notifications, so that you get an e-mail once the fixed version is added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that please go to:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/bugsearch/bug/CSCuw22886" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCuw22886&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then please click "Save Bug". There you can specify email address you would like to be notified at and the frequency of the updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Mateusz Grzesiak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Oct 2015 16:55:20 GMT</pubDate>
    <dc:creator>mgrzesia</dc:creator>
    <dc:date>2015-10-22T16:55:20Z</dc:date>
    <item>
      <title>ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506018#M191696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does anyone know if they removed the easy vpn client for the ASA 5506-X. I can make it as a server but not a client or is there a replacement?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 14:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506018#M191696</guid>
      <dc:creator>Anthony Biegacki</dc:creator>
      <dc:date>2015-05-12T14:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506019#M191697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it has been removed.&amp;nbsp; They are working on a solution, but there isn't any update on when it will happen.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 16:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506019#M191697</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2015-05-12T16:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506020#M191698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 May 2015 17:45:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506020#M191698</guid>
      <dc:creator>Anthony Biegacki</dc:creator>
      <dc:date>2015-05-12T17:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506021#M191699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although the ASA5506-X doesn't support the EasyVPN Hardware Client functionality, this same functionality--VPN Network extension with Dynamic VPN--can be implemented on the HeadEnd ASA5500X using a Site-to-Site configuration with a "Dynamic Crypto Map".&amp;nbsp;&amp;nbsp; Although the configuration isn't as simple as an EasyVPN hardware client configuration, the feature/functionality of building a tunnel with a dynamic IP address and providing access to resources at the remote site still exists.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some sample configurations that I was able to find on setting up a Dynamic Crypto Map on a LAN to LAN tunnel (L2L tunnel):&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This first url below provides a great example of using Dynamic L2L tunnels and different tunnel groups to differentiate access polices between two different spokes--one of the spokes is a router but the other spoke is an ASA5500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How to make Dynamic L2L Tunnels Fall into Different Tunnel Groups&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113573-sol-tunnels-groups.html?mdfid=284143130" rel="nofollow" target="_blank"&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113573-sol-tunnels-groups.html?mdfid=284143130&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This url provides a simple L2L Dynamic Crypto map configuration involving two locations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site-to-Site IPSEC VPN between two cisco ASA's - one with Dynamic IP&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.networkstraining.com/site-to-site-ipsec-vpn-between-two-cisco-asa/" rel="nofollow" target="_blank"&gt;http://www.networkstraining.com/site-to-site-ipsec-vpn-between-two-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate this opportunity to assist you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Nilz"&lt;/P&gt;&lt;P&gt;Nilo Noguera&lt;/P&gt;&lt;P&gt;.:|:.:|:. Security Specialist, Cisco Global Virtual Engineering - Cisco Partner Plus&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/web/partners/tools/ph.html" rel="nofollow" target="_blank"&gt;http://www.cisco.com/web/partners/tools/ph.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 May 2015 12:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506021#M191699</guid>
      <dc:creator>Nilo Noguera</dc:creator>
      <dc:date>2015-05-21T12:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506022#M191700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px;"&gt;ASA 9.5.1 added Easy VPN client. Please check the following release note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px;"&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html" title="http://www.cisco.com/c/en/us/td/docs/security/asa/asa95/release/notes/asarn95.html"&gt;Release Notes for the Cisco ASA Series, 9.5(x) - Cisco&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px;"&gt;"This release supports Cisco Easy VPN on the ASA 5506-X series and for the ASA 5508-X. The ASA acts as a VPN hardware client when connecting to the VPN headend. Any devices (computers, printers, and so on) behind the ASA on the Easy VPN port can communicate over the VPN; they do not have to run VPN clients individually. Note that only one ASA interface can act as the Easy VPN port; to connect multiple devices to that port, you need to place a Layer 2 switch on the port, and then connect your devices to the switch."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #525252; font-family: arial, helvetica, 'Helvetica Neue', HelveticaNeue, 'Lucida Grande', sans-serif; font-size: 14px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Sep 2015 22:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506022#M191700</guid>
      <dc:creator>kjchen</dc:creator>
      <dc:date>2015-09-11T22:26:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506023#M191701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Although they did add EZvpn Client in 9.5.1, I don't suggest buying a 5506 for the purpose of using it as an EZvpn Client right now. I've spent a lot of hours trying to set this up for a customer only to run into CSCuw22886. Split tunneling does not work and it looks like Cisco is not making it a priority to fix the issue...&lt;A href="https://tools.cisco.com/bugsearch/bug/CSCuw22886/?reffering_site=dumpcr" title="https://tools.cisco.com/bugsearch/bug/CSCuw22886/?reffering_site=dumpcr"&gt;https://tools.cisco.com/bugsearch/bug/CSCuw22886/?reffering_site=dumpcr&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Sep 2015 14:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506023#M191701</guid>
      <dc:creator>Joshua Schroth</dc:creator>
      <dc:date>2015-09-15T14:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506024#M191702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're also hitting this bug, annoying as we bought the X-series when we finally saw the statement "Easy VPN added".&lt;/P&gt;&lt;P&gt;A real show stopper for us&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please explain this, are these some kind of interim versions? Can they be downloaded?&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;TABLE cellpadding="0" cellspacing="0" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class="mouseOverTooltip fixedVersionsHelp" style="padding-left: 2px;"&gt;Known Fixed Releases:&lt;/TD&gt;&lt;TD&gt;&lt;P class="fixedInCount"&gt;(8)&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV class="jspPane"&gt;&lt;DIV class="whiteRow"&gt;100.14(0.76)&lt;P&gt;&lt;/P&gt;&lt;P class="greyRow"&gt;100.15(0.34)&lt;/P&gt;&lt;P class="whiteRow"&gt;100.15(16.8)&lt;/P&gt;&lt;P class="greyRow"&gt;100.15(17.12)&lt;/P&gt;&lt;P class="whiteRow"&gt;100.15(3.60)&lt;/P&gt;&lt;P class="greyRow"&gt;100.15(8.15)&lt;/P&gt;&lt;P class="whiteRow"&gt;100.16(0.2)&lt;/P&gt;&lt;P class="greyRow"&gt;100.16(1.2)"&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Oct 2015 11:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506024#M191702</guid>
      <dc:creator>Martin Burman</dc:creator>
      <dc:date>2015-10-09T11:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506025#M191703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those builds are internal developers builds, not available for customers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This specific bug fix should (as in "I should be on time" &lt;IMG src="https://community.cisco.com/legacyfs/online/emoticons/wink.png" /&gt;) be integrated in 9.5.2, tentatively scheduled for the end of November. If all goes well the bug should be fixed in that version. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can subscribe yourself to automatic bug notifications, so that you get an e-mail once the fixed version is added.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that please go to:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/bugsearch/bug/CSCuw22886" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/bugsearch/bug/CSCuw22886&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then please click "Save Bug". There you can specify email address you would like to be notified at and the frequency of the updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Mateusz Grzesiak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Oct 2015 16:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506025#M191703</guid>
      <dc:creator>mgrzesia</dc:creator>
      <dc:date>2015-10-22T16:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506026#M191704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I downloaded and installed 9.5.2 and indeed the split tunneling seems to work but there is one weird problem (I think):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using four "inside" interfaces on the 5506-X and as far as I can read this is kind of supported, the interface with the highest security-level can utilize the tunnel, the others can not. This scenario is fine.&lt;/P&gt;&lt;P&gt;Devices connected to vlan67 works fine tested so far.&lt;/P&gt;&lt;P&gt;A device connected to vlan68 works as long as it doesn't connect to any address in the tunnel list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is bad since there are some services at the home end with public addresses where clients at vlan67 act as "data feeders" for the public computers while clients at vlan68 acts as "data consumers" for the public computers.&lt;/P&gt;&lt;P&gt;From what I could understand the clients at vlan67 should (and does) use the tunnel for access while clients at vlan68 would go straight out from the 5506-X, get their source address changed to the 5506-X's outside address and reach the public addresses as normal clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 5506-X says the expected "Built dynamic translation" while connecting to google.com while it says "Built localhost outside:W.X.Y.Z" while trying to connect to the public address from vlan68&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ip range B is in a completely different range from ip range A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this supposed behaviour or is it a bug?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2.67&lt;/P&gt;&lt;P&gt;vlan 67&lt;/P&gt;&lt;P&gt;nameif sixtyseven&lt;/P&gt;&lt;P&gt;security-level 100&amp;nbsp;&amp;nbsp; &amp;lt;-- easy vpn tunnel works as expected from here, W.X.Y.Z reached by tunnel&lt;/P&gt;&lt;P&gt;ip address A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2.68&lt;/P&gt;&lt;P&gt;vlan 68&lt;/P&gt;&lt;P&gt;nameif sixtyeight&lt;/P&gt;&lt;P&gt;security-level 90&amp;nbsp; &amp;lt;-- clients here reaches addresses NOT in the tunnel list, W.X.Y.Z not reached at all&lt;/P&gt;&lt;P&gt;ip address B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2.69&lt;/P&gt;&lt;P&gt;vlan 69&lt;/P&gt;&lt;P&gt;nameif sixtynine&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;ip address C&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2.70&lt;/P&gt;&lt;P&gt;vlan 70&lt;/P&gt;&lt;P&gt;nameif sixtyten&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;ip address D&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Dec 2015 14:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506026#M191704</guid>
      <dc:creator>Martin Burman</dc:creator>
      <dc:date>2015-12-01T14:23:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X Easy VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506027#M191705</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Works:&lt;/P&gt;&lt;P&gt;asa5506# packet-tracer input insamling tcp VLAN68.2 12345 8.8.8.8 80 detail$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: Resolve Egress Interface&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop OUTSIDESUBNET.1 using egress ifc&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj_insamling&lt;/P&gt;&lt;P&gt; nat (insamling,outside) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate VLAN68.2/12345 to OUTSIDESUBNET.150/12345&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e158aba20, priority=6, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1296, user_data=0x7f6e15870dc0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=VLAN68.0, mask=255.255.255.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=insamling, output_ifc=outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e140865c0, priority=0, domain=nat-per-session, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4343, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e14baedb0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2034, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=insamling, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e140865c0, priority=0, domain=nat-per-session, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4345, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e14ad7ba0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4958, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 5910, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_tcp_normalizer&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;Doesn't work:&lt;/P&gt;&lt;P&gt;asa5506# packet-tracer input insamling tcp vlan68.2 12345 ATHOME.5 80 det&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e14ba68f0, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=7148, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=insamling, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: Resolve Egress Interface&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop OUTSIDESUBNET.1 using egress ifc&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj_insamling&lt;/P&gt;&lt;P&gt; nat (insamling,outside) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate vlan68.2/12345 to OUTSIDESUBNET.150/12345&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e158aba20, priority=6, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1290, user_data=0x7f6e15870dc0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=vlan68.0, mask=255.255.255.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=insamling, output_ifc=outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e140865c0, priority=0, domain=nat-per-session, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4340, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e14baedb0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2028, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=insamling, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Reverse Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0x7f6e14c7b3e0, priority=70, domain=ipsec-tunnel-flow, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=171, user_data=0x18a9c, cs_id=0x7f6e14c9b750, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=ATHOME.5, mask=255.255.255.255, port=0, tag=any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=OUTSIDESUBNET.150, mask=255.255.255.255, port=0, tag=any, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: insamling&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Dec 2015 14:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-easy-vpn/m-p/3506027#M191705</guid>
      <dc:creator>Martin Burman</dc:creator>
      <dc:date>2015-12-01T14:41:27Z</dc:date>
    </item>
  </channel>
</rss>

