<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Have you allowed the VPN pool in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566577#M202348</link>
    <description>&lt;P&gt;Have you allowed the VPN pool in the http commands that permit ASDM management?&lt;/P&gt;
&lt;P&gt;e.g.:&lt;/P&gt;

&lt;PRE&gt;
http &amp;lt;pool subnet and mask&amp;gt; inside&lt;/PRE&gt;

&lt;P&gt;...on firewall A.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2014 18:29:58 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2014-12-11T18:29:58Z</dc:date>
    <item>
      <title>anyconnect behavior</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566572#M202343</link>
      <description>&lt;P&gt;I have a strange issue that I cannot seem to figure out. We have a customer that has 2 different ASA's for 2 different environments. We have a vpn tunnel set up so that when they connect to the anyconnect client via Firewall-A, the traffic can hairpin over the tunnel and access the servers behind firewall-B. That is working fine, but the problem is when we try to access the ASDM via the inside ip address over the ssl vpn on Firewall-A we get this message:&lt;/P&gt;&lt;P&gt;Deny IP spoof from (10.200.0.6) to 10.0.193.1 on interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can access the ASDM on Firewall-B, but not on Firewall-A. I do not know why the ASA thinks this is a spoofing attack. Can someone shed some light on this for me? Thanks in advanced!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566572#M202343</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2019-03-12T05:12:26Z</dc:date>
    </item>
    <item>
      <title>I'm not quite envisioning the</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566573#M202344</link>
      <description>&lt;P&gt;I'm not quite envisioning the setup. Can you give us a simple diagram?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 00:25:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566573#M202344</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-11T00:25:22Z</dc:date>
    </item>
    <item>
      <title>I attached a simple diagram</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566574#M202345</link>
      <description>&lt;P&gt;I attached a simple diagram hopefully explaining it a little better. While connected to the ssl vpn on Firewall A, they are able to access all the servers behind Firewall A and Firewall B, can access the asdm on Firewall B, but cannot access the ASDM on Firewall A, that's when I see the spoofing messages in the logs. Let me know if this makes sense now. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 15:51:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566574#M202345</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2014-12-11T15:51:27Z</dc:date>
    </item>
    <item>
      <title>From Cisco documentation:If</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566575#M202346</link>
      <description>&lt;P&gt;From Cisco documentation:&lt;/P&gt;&lt;P&gt;If traffic enters the outside interface from an address that is known to the routing table, but is associated with the inside interface, then the ASA drops the packet. Similarly, if traffic enters the inside interface from an unknown source address, the ASA drops the packet because the matching route (the default route) indicates the outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not sure how you could prevent the ASA from having this error short of disabling Anti-Spoofing on the outside interface.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 17:07:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566575#M202346</guid>
      <dc:creator>Ryan S</dc:creator>
      <dc:date>2014-12-11T17:07:03Z</dc:date>
    </item>
    <item>
      <title>Hi Ryan,Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566576#M202347</link>
      <description>&lt;P&gt;Hi Ryan,&lt;/P&gt;&lt;P&gt;Thanks for the comment. We are not able to pull up the asdm (which is access by using the inisde interface's ip address), but we can still access servers that are on the same network. For example, we can ping x.x.x.2 and x.x.x.3, but cannot access the asdm on &lt;A href="https://x.x.x.1/admin" target="_blank"&gt;https://x.x.x.1/admin&lt;/A&gt; and cannot ping it either. If what you said was true, wouldn't all traffic going to the inside interface be dropped? Sorry if I misunderstood your explanation.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 17:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566576#M202347</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2014-12-11T17:18:10Z</dc:date>
    </item>
    <item>
      <title>Have you allowed the VPN pool</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566577#M202348</link>
      <description>&lt;P&gt;Have you allowed the VPN pool in the http commands that permit ASDM management?&lt;/P&gt;
&lt;P&gt;e.g.:&lt;/P&gt;

&lt;PRE&gt;
http &amp;lt;pool subnet and mask&amp;gt; inside&lt;/PRE&gt;

&lt;P&gt;...on firewall A.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 18:29:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566577#M202348</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-12-11T18:29:58Z</dc:date>
    </item>
    <item>
      <title>Yes, that has been configured</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566578#M202349</link>
      <description>&lt;P&gt;Yes, that has been configured.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2014 20:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-behavior/m-p/2566578#M202349</guid>
      <dc:creator>Benjamin Saito</dc:creator>
      <dc:date>2014-12-11T20:15:43Z</dc:date>
    </item>
  </channel>
</rss>

