<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I just saw your post on the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513956#M206443</link>
    <description>&lt;P&gt;I just saw your post on the L3 switch...and noticed this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:11px"&gt;&lt;SPAN style="font-family:courier new,courier,monospace"&gt;CISCO_VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; | Manual &amp;nbsp; &amp;nbsp; 192.168.120.1 &amp;nbsp; 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Do you have an IP on the VPN subnet configured on the switch?&amp;nbsp; if so then this is your problem.&amp;nbsp; The switch thinks it is directly connected to the network so it will not send the packets to the ASA.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Where is inter-VLAN routing happening, or where do you want it to happen?&amp;nbsp; If it is happening on the switch, then all you need is a route to the other networks via the inside VLAN1.&amp;nbsp; If the ASA is expected to do the routing then, as David mentioned, you need to get your ASA VLANs in order.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Mon, 06 Oct 2014 19:35:56 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-10-06T19:35:56Z</dc:date>
    <item>
      <title>ASA 5505 Remote Access IPsec sessions are not routed on the internal LAN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513948#M206435</link>
      <description>&lt;P style="font-size: 14px;"&gt;I have a rather complex configuration in my office network.&lt;BR /&gt;Rather compex, of course, from my perspective...&lt;BR /&gt;I have an ASA 5505 facing the internet through 2 CISCO routers under HSRP between them (10 mbps fiber optics link + copper 4 mbps SHDSL link).&lt;BR /&gt;On the internal side I have an HP 3800 L3 switch directly connected to the ASA and handling the internal routing between 5 VLANs (clients, servers, voip, mobile, site_2), where "Site_2" is a fiber optics L2 link to a remote premise of my company directly connected to a port of the L3 Switch.&lt;BR /&gt;All works fine.&lt;BR /&gt;The (so far) unresolved issue comes from the IPsec VPN remote access I am configuring on teh ASA, based on the CISCO VPN Client v5.x on the client side and on the Security Plus Bundle license on the ASA side.&lt;BR /&gt;I configured the ASA following the instructions in the firewall manuals and now I am able to successfully connect to the site from remote. I am also able to execute the ASDM from my remote client and to access the configuration options on the ASA.&lt;BR /&gt;The problem occurs when trying to browse the internal network and trying to access the servers on the inside LAN. No answers at all. No ping, no anything.&lt;BR /&gt;I suspect that the problem is on the internal routing handled by the L3 switch side-by-side to the ASA.&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;In fact, I configured the VPN local pool of IP addresses on a different subnet than the internal LAN (LAN: 192.168.1.0/24, &amp;nbsp;VPN range: 192.168.2.20-192.168.2.44).&lt;BR /&gt;The ASA is linked to the L3 switch by a single ethernet cable and the switch port where it is connected is configured to handle only the "Client_VLAN" (i.e. the 192.168.1.x subnet). Therefore I suspect that the switch simply ignores any packet coming from the ASA from the source address of the VPN pool (192.168.2.x).&lt;BR /&gt;I configured a VPN Vlan on the switch and the proper routing rules for it, but the switch can handle mixed traffic (i.e. coming from multiple VLANs) on one of its ports only if the traffic is tagged as per 802.1q spec.&lt;BR /&gt;To have the ASA forwarding traffic from both subnets on a single port (the one linked to the L3 Switch) I should configure the interface as a "trunk" and the L3 Port as "tagged" (the "untagged" ones can carry only a single VLAN traffic).&lt;BR /&gt;I made some tests but it, apparently, did not work. I was still unable to access the L3 switch from the ASA as well as -of course- the internal LAN.&lt;BR /&gt;Is it possible that 802.1q tagging is not compatible between CISCO and HP ?&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;Now I am stuck on this issue and -sincerely- without any further idea how to resolve it.&amp;nbsp;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;A last chance could be to link the ASA to the L3 switch using 2 ethernet interfaces (one for the 192.168.1.x and the second for the 192.168.2.x) and configure the related ports on the switch as "untagged" (since they handle only 1 VLAN each).&lt;BR /&gt;I will try this next week, but any advice on this matter from the community will be greatly appreciated.&lt;BR /&gt;Thank you all in advance for your help...&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513948#M206435</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2019-03-12T04:51:56Z</dc:date>
    </item>
    <item>
      <title>Ok, so what VLANS sit on your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513949#M206436</link>
      <description>&lt;P&gt;Ok, so what VLANS sit on your L3 switch?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i.e.,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 10&lt;/P&gt;&lt;P&gt;ip address 192.168.10.254 255.255.255.0&lt;/P&gt;&lt;P&gt;description MGMT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;ip address 192.168.20.254 255.255.255.0&lt;/P&gt;&lt;P&gt;description UserData&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 30&lt;/P&gt;&lt;P&gt;ip address 192.168.30.254 255.255.255.0&lt;/P&gt;&lt;P&gt;description Voice&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;L3 Switch --- L2 Access Port VLAN 10 --- ASA 5505 Eth0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Eth0/1&lt;/P&gt;&lt;P&gt;switchport access vlan 10&lt;/P&gt;&lt;P&gt;description Connection to L3 Switch&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;int vlan 10&lt;/P&gt;&lt;P&gt;ip address 192.168.10.253 255.255.255.0&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now you want your RA-VPN clients to communicate with internal resources. Have you configured your NAT exemption for this? Something like&lt;/P&gt;&lt;P&gt;object network Inside_Network&lt;/P&gt;&lt;P&gt;subnet 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network UserData&lt;/P&gt;&lt;P&gt;subnet 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network LAN_Segments&lt;/P&gt;&lt;P&gt;network-object object Inside_Network&lt;/P&gt;&lt;P&gt;network-object object UserData&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network VPN&lt;/P&gt;&lt;P&gt;subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside)&amp;nbsp;static LAN_Segments LAN_Segments&amp;nbsp;destination static VPN VPN no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So with that, take a look but keep it simple. Run some connectivity checks, can your VPN client ping any SVI's on the L3 switch etc?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Oct 2014 16:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513949#M206436</guid>
      <dc:creator>david-swope</dc:creator>
      <dc:date>2014-10-04T16:17:17Z</dc:date>
    </item>
    <item>
      <title>The 802.1q is an IEEE</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513950#M206437</link>
      <description>&lt;P&gt;The 802.1q is an IEEE standard and supported on both Cisco and HP devices, so this should not be&amp;nbsp; the issue.&lt;/P&gt;&lt;P&gt;It is quite possible, as David has mentioned, that the identity NAT / no NAT is configured incorrectly.&lt;/P&gt;&lt;P&gt;Would you be able to post your ASA configuration (sanitised)?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sat, 04 Oct 2014 17:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513950#M206437</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-04T17:29:25Z</dc:date>
    </item>
    <item>
      <title> Hi David-Swope,a simple</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513951#M206438</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi David-Swope,&lt;/P&gt;&lt;P&gt;a simple extraction of the L3 Switch configuration follows (hope it's enough to let you understand):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;VLAN ID Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Status &amp;nbsp; &amp;nbsp; Voice Jumbo&lt;BR /&gt;&amp;nbsp; ------- -------------------------------- + ---------- ----- -----&lt;BR /&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp; &amp;nbsp; DEFAULT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; 10 &amp;nbsp; &amp;nbsp; &amp;nbsp;CLIENT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; 20 &amp;nbsp; &amp;nbsp; &amp;nbsp;CISCO_VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; 31 &amp;nbsp; &amp;nbsp; &amp;nbsp;VOIP_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; 90 &amp;nbsp; &amp;nbsp; &amp;nbsp;SERVER_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; 99 &amp;nbsp; &amp;nbsp; &amp;nbsp;VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | IP Config &amp;nbsp;IP Address &amp;nbsp; &amp;nbsp; &amp;nbsp;Subnet Mask &amp;nbsp; &amp;nbsp; Std &amp;nbsp;Local&lt;BR /&gt;&amp;nbsp; -------------------- + ---------- --------------- --------------- ----------&lt;BR /&gt;&amp;nbsp; DEFAULT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Manual &amp;nbsp; &amp;nbsp; 192.168.191.1 &amp;nbsp; 255.255.255.0 &amp;nbsp; &amp;nbsp;No &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; CLIENT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Manual &amp;nbsp; &amp;nbsp; 192.168.110.240 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; &amp;nbsp;No&lt;BR /&gt;&amp;nbsp; CISCO_VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; | Manual &amp;nbsp; &amp;nbsp; 192.168.120.1 &amp;nbsp; 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;BR /&gt;&amp;nbsp; VOIP_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Manual &amp;nbsp; &amp;nbsp; 192.168.2.250 &amp;nbsp; 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;BR /&gt;&amp;nbsp; SERVER_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Manual &amp;nbsp; &amp;nbsp; 192.168.190.1 &amp;nbsp; 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;BR /&gt;&amp;nbsp; VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Manual &amp;nbsp; &amp;nbsp; 192.168.100.250 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="font-size:14px;"&gt;Best Regards,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family:arial,helvetica,sans-serif;"&gt;&lt;SPAN style="font-size:14px;"&gt;Cristiano&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 14:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513951#M206438</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-06T14:13:35Z</dc:date>
    </item>
    <item>
      <title>Hi Marius Gunnerud,the ASA</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513952#M206439</link>
      <description>&lt;P&gt;Hi Marius Gunnerud,&lt;/P&gt;&lt;P&gt;the ASA running config follows.&lt;/P&gt;&lt;P&gt;I won't forget to correctly rate your helpful replies...&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Cristiano&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;:&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt; Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(4)&lt;BR /&gt;!&lt;BR /&gt;terminal width 160&lt;BR /&gt;hostname fw01&lt;BR /&gt;domain-name domainname.com&lt;BR /&gt;enable password xxxxxxxxxxxxxxxxxxxxx encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd yyyyyyyyyyyyyyyyyy encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.110.30 FTPServer_HYDRO&lt;BR /&gt;name 192.168.110.6 Server_SCC&lt;BR /&gt;name 192.168.110.9 Server_CRM&lt;BR /&gt;name 192.168.110.10 Server_SIU&lt;BR /&gt;ip local pool VPN_Pool 192.168.120.20-192.168.120.50 mask 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;switchport access vlan 20&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.110.252 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 93.51.248.100 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.210.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;banner exec Welcome to CISCO ASA 5505&lt;BR /&gt;banner login Please insert Username/Password&lt;BR /&gt;boot system disk0:/asa914-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name domainname.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network Server_SCC&lt;BR /&gt;&amp;nbsp;host 192.168.110.6&lt;BR /&gt;object network Server_SCC-01&lt;BR /&gt;&amp;nbsp;host 192.168.110.6&lt;BR /&gt;object network Server_SCC-02&lt;BR /&gt;&amp;nbsp;host 192.168.110.6&lt;BR /&gt;object network Server_SIU&lt;BR /&gt;&amp;nbsp;host 192.168.110.10&lt;BR /&gt;object network FTPServer_HYDRO&lt;BR /&gt;&amp;nbsp;host 192.168.110.30&lt;BR /&gt;object network FTPServer_HYDRO-01&lt;BR /&gt;&amp;nbsp;host 192.168.110.30&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Inbound&lt;BR /&gt;&amp;nbsp;host aaa.bbb.ccc.ddd&lt;BR /&gt;object network vpn_range&lt;BR /&gt;&amp;nbsp;range 192.168.120.20 192.168.120.50&lt;BR /&gt;&amp;nbsp;description IP Addresses reserved for VPN Clients&lt;BR /&gt;object network LOCAL_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.110.0 255.255.255.0&lt;BR /&gt;object network VPN_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.120.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.120.0_26&lt;BR /&gt;&amp;nbsp;subnet 192.168.120.0 255.255.255.192&lt;BR /&gt;object network SERVER_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.190.0 255.255.255.0&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group service http-8080 tcp&lt;BR /&gt;&amp;nbsp;description HTTP on Port 8080&lt;BR /&gt;&amp;nbsp;port-object eq 8080&lt;BR /&gt;object-group service http-8082 tcp&lt;BR /&gt;&amp;nbsp;description HTTP on Port 8082&lt;BR /&gt;&amp;nbsp;port-object eq 8082&lt;BR /&gt;object-group service ftp-2100 tcp&lt;BR /&gt;&amp;nbsp;description FTP on Port 2100&lt;BR /&gt;&amp;nbsp;port-object eq 2100&lt;BR /&gt;object-group service fwdports&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq 8080&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq 8082&lt;BR /&gt;&amp;nbsp;service-object tcp-udp destination eq 2100&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pptp&lt;BR /&gt;object-group service DM_INLINE_TCP_0 tcp&lt;BR /&gt;&amp;nbsp;group-object ftp-2100&lt;BR /&gt;&amp;nbsp;group-object http-8080&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;object-group service ftp-pasv tcp&lt;BR /&gt;&amp;nbsp;description Passive FTP Range 5000-5999, 50000-59999&lt;BR /&gt;&amp;nbsp;port-object range 5000 5999&lt;BR /&gt;&amp;nbsp;port-object range 50000 59999&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;group-object ftp-2100&lt;BR /&gt;&amp;nbsp;group-object http-8080&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;object-group service DM_INLINE_TCP_3 tcp&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ftp-data&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;&amp;nbsp;service-object gre&lt;BR /&gt;&amp;nbsp;service-object tcp destination eq pptp&lt;BR /&gt;object-group service Internet-udp udp&lt;BR /&gt;&amp;nbsp;description UDP Standard Internet Services&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;port-object eq ntp&lt;BR /&gt;&amp;nbsp;port-object eq isakmp&lt;BR /&gt;&amp;nbsp;port-object eq 4500&lt;BR /&gt;&amp;nbsp;port-object range 131 139&lt;BR /&gt;object-group service IMAPSSL-Mail tcp&lt;BR /&gt;&amp;nbsp;port-object eq 993&lt;BR /&gt;object-group service ftp-ssl tcp&lt;BR /&gt;&amp;nbsp;description Default port for FTP over SSL&lt;BR /&gt;&amp;nbsp;port-object eq 990&lt;BR /&gt;object-group service Internet-tcp tcp&lt;BR /&gt;&amp;nbsp;description IMAPSSL-Mail&lt;BR /&gt;&amp;nbsp;port-object eq www&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq 465&lt;BR /&gt;&amp;nbsp;port-object eq pop3&lt;BR /&gt;&amp;nbsp;port-object eq 995&lt;BR /&gt;&amp;nbsp;port-object eq ftp&lt;BR /&gt;&amp;nbsp;port-object eq ftp-data&lt;BR /&gt;&amp;nbsp;port-object eq domain&lt;BR /&gt;&amp;nbsp;port-object eq ssh&lt;BR /&gt;&amp;nbsp;port-object eq telnet&lt;BR /&gt;&amp;nbsp;port-object eq 8080&lt;BR /&gt;&amp;nbsp;port-object eq 2100&lt;BR /&gt;&amp;nbsp;port-object eq 8082&lt;BR /&gt;&amp;nbsp;port-object range 50500 50599&lt;BR /&gt;&amp;nbsp;port-object eq imap4&lt;BR /&gt;&amp;nbsp;group-object IMAPSSL-Mail&lt;BR /&gt;&amp;nbsp;group-object ftp-ssl&lt;BR /&gt;object-group service Zarafa-Mail tcp&lt;BR /&gt;&amp;nbsp;port-object eq 237&lt;BR /&gt;object-group service WebPlay-SSL tcp&lt;BR /&gt;&amp;nbsp;port-object eq 8443&lt;BR /&gt;object-group service remote-desktop tcp-udp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_4 tcp&lt;BR /&gt;&amp;nbsp;group-object Internet-tcp&lt;BR /&gt;&amp;nbsp;group-object Zarafa-Mail&lt;BR /&gt;&amp;nbsp;group-object WebPlay-SSL&lt;BR /&gt;&amp;nbsp;group-object ftp-pasv&lt;BR /&gt;&amp;nbsp;group-object remote-desktop&lt;BR /&gt;object-group service ftp-Illumia tcp&lt;BR /&gt;&amp;nbsp;port-object eq 990&lt;BR /&gt;&amp;nbsp;port-object range 5000 5050&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object LOCAL_LAN&lt;BR /&gt;&amp;nbsp;network-object object SERVER_LAN&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list acl_inside_in remark -=[Access Lists For Outgoing Packets from Inside interface]=-&lt;BR /&gt;access-list acl_inside_in extended permit icmp 192.168.110.0 255.255.255.0 any4&lt;BR /&gt;access-list acl_inside_in extended permit udp 192.168.110.0 255.255.255.0 any4 object-group Internet-udp&lt;BR /&gt;access-list acl_inside_in extended permit tcp 192.168.110.0 255.255.255.0 any4 object-group DM_INLINE_TCP_4&lt;BR /&gt;access-list acl_outside_in remark Migration, ACE (line 1) expanded: permit tcp any host Inbound object-group DM_INLINE_TCP_0&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object Server_SCC eq 2100&lt;BR /&gt;access-list acl_outside_in remark FTP Passive on Server_SCC&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object Server_SCC object-group ftp-pasv&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object Server_SCC eq 8080&lt;BR /&gt;access-list acl_outside_in remark Migration: End of expansion&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object Server_SCC eq www&lt;BR /&gt;access-list acl_outside_in remark Migration, ACE (line 2) expanded: permit tcp any host Inbound object-group DM_INLINE_TCP_1&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object FTPServer_HYDRO eq ftp&lt;BR /&gt;access-list acl_outside_in remark Migration: End of expansion&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object FTPServer_HYDRO eq ftp-data&lt;BR /&gt;access-list acl_outside_in remark Migration, ACE (line 3) expanded: permit tcp any host Inbound object-group ftp-pasv&lt;BR /&gt;access-list acl_outside_in remark Migration: End of expansion&lt;BR /&gt;access-list acl_outside_in remark Migration, ACE (line 4) expanded: permit object-group DM_INLINE_SERVICE_1 any host Inbound&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 object Server_SIU eq pptp&lt;BR /&gt;access-list acl_outside_in remark Migration: End of expansion&lt;BR /&gt;access-list acl_outside_in extended permit gre xxx.yyy.zzz.kkk 255.255.255.224 object Server_SIU&lt;BR /&gt;access-list acl_outside_in extended permit tcp xxx.yyy.zzz.kkk 255.255.255.224 object Server_SIU eq pptp&lt;BR /&gt;access-list acl_outside_in extended permit tcp object Inbound object Server_SCC object-group DM_INLINE_TCP_2 inactive&lt;BR /&gt;access-list acl_outside_in extended permit tcp xxx.yyy.zzz.kkk 255.255.255.224 object FTPServer_HYDRO object-group DM_INLINE_TCP_3 inactive&lt;BR /&gt;access-list acl_outside_in extended permit icmp any4 any4 echo-reply&lt;BR /&gt;access-list acl_outside_in extended permit gre any4 192.168.110.0 255.255.255.0&lt;BR /&gt;access-list acl_outside_in extended permit tcp any4 192.168.110.0 255.255.255.0 range 50500 50599&lt;BR /&gt;access-list ftp_inspect extended permit tcp any any eq ftp&lt;BR /&gt;access-list ftp_inspect extended permit tcp any any eq 2100&lt;BR /&gt;access-list ftp-nonstandard extended permit tcp any any eq 990&lt;BR /&gt;access-list KKKKK_VPN_splitTunnelAcl standard permit 192.168.110.0 255.255.255.0&lt;BR /&gt;access-list KKKKK_VPN_splitTunnelAcl standard permit 192.168.190.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 50000&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-715.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static NETWORK_OBJ_192.168.120.0_26 NETWORK_OBJ_192.168.120.0_26 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Server_SCC&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 2100 2100&lt;BR /&gt;object network Server_SCC-01&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 8080 8080&lt;BR /&gt;object network Server_SCC-02&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp www www&lt;BR /&gt;object network Server_SIU&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp pptp pptp&lt;BR /&gt;object network FTPServer_HYDRO&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp ftp ftp&lt;BR /&gt;object network FTPServer_HYDRO-01&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp ftp-data ftp-data&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group acl_inside_in in interface inside&lt;BR /&gt;access-group acl_outside_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 93.51.248.97 1&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 192.168.110.240 tunneled&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.110.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.120.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec ikev1 transform-set strong-des esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca&amp;nbsp;&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp;......................................................&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;crypto isakmp identity address&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 11&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.110.0 255.255.255.0 inside&lt;BR /&gt;ssh 192.168.120.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;no vpn-addr-assign aaa&lt;BR /&gt;no vpn-addr-assign dhcp&lt;BR /&gt;vpn-addr-assign local reuse-delay 15&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd dns 8.8.8.8 8.8.4.4 interface inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 193.204.114.232 source outside prefer&lt;BR /&gt;group-policy KKKKK_VPN internal&lt;BR /&gt;group-policy KKKKK_VPN attributes&lt;BR /&gt;&amp;nbsp;dns-server value 8.8.8.8 208.67.222.222&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value KKKKK_VPN_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;default-domain value ondaenergia.com&lt;BR /&gt;username user1 password hjhgywegfllkkjushgdfj encrypted privilege 15&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool VPN_Pool&lt;BR /&gt;tunnel-group KKKKK_VPN type remote-access&lt;BR /&gt;tunnel-group KKKKK_VPN general-attributes&lt;BR /&gt;&amp;nbsp;address-pool VPN_Pool&lt;BR /&gt;&amp;nbsp;default-group-policy KKKKK_VPN&lt;BR /&gt;tunnel-group KKKKK_VPN ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection-default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;class-map ftp-nonstandard-class&lt;BR /&gt;&amp;nbsp;match access-list ftp-nonstandard&lt;BR /&gt;class-map new_inspection&lt;BR /&gt;&amp;nbsp;match access-list ftp_inspect&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect ftp FTP_Inspect_Map&lt;BR /&gt;&amp;nbsp;description Custom FTP Inspect Map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp;match request-command appe help site&lt;BR /&gt;&amp;nbsp; reset log&lt;BR /&gt;policy-map global-policy&lt;BR /&gt;&amp;nbsp;class inspection-default&lt;BR /&gt;&amp;nbsp; inspect dns&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp;class new_inspection&lt;BR /&gt;&amp;nbsp; inspect ftp strict FTP_Inspect_Map&lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:hdfkhskjdhfgkjhsgdfkhsgdfjkhg&lt;BR /&gt;: end&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 14:17:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513952#M206439</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-06T14:17:24Z</dc:date>
    </item>
    <item>
      <title>Hi,concerning your other 2</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513953#M206440</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;concerning your other 2 questions, my answers follow:&lt;/P&gt;&lt;P&gt;1) Current ASA NAT Exemption rules are (from&amp;nbsp;running config):&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network LOCAL_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.110.0 255.255.255.0&lt;BR /&gt;object network SERVER_LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.190.0 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network NETWORK_OBJ_192.168.120.0_26&lt;BR /&gt;subnet 192.168.120.0 255.255.255.192&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object network VPN_LAN&lt;BR /&gt;subnet 192.168.120.0 255.255.255.0&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-size:11px;"&gt;&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object object LOCAL_LAN&lt;BR /&gt;&amp;nbsp;network-object object SERVER_LAN&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static NETWORK_OBJ_192.168.120.0_26 NETWORK_OBJ_192.168.120.0_26 no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) I tried pinging all L3 Switch VLAN IPs after successful connection to the ASA through Cisco VPN Client v5.x.&lt;/P&gt;&lt;P&gt;No answer from any VLAN IPs. Of course, the ASA answers on its assigned IP.&lt;/P&gt;&lt;P&gt;I keep thinking that the problem is with&amp;nbsp;the 802.1q tagging of the packets that are exchanged between the ASA and the HP3800.&lt;BR /&gt;&lt;BR /&gt;I connect to the ASA through the VPN&amp;nbsp;Client. The ASA assigns me an IP in the range 192.168.120.x then it routes my packets towards the L3 Switch by using the one and only interface available, that is connected to the Switch on a port belonging to the VLAN #10 (192.168.110.x).&lt;BR /&gt;Of course, the Switch discards the packets because they do not belong to the expected VLAN.&lt;BR /&gt;On my opinion, the only way to get that packets routed is to define the port on the L3 Switch&amp;nbsp;as VLAN_10 + VLAN_20 enabled, but this can be done only if I define the port as "tagged".&lt;BR /&gt;This means that the ASA should send both packet families (192.168.110.x + 192.168.120.x) through the same interface by tagging each packet with the proper VLAN tag.&lt;BR /&gt;As far I understood I can have this&amp;nbsp;behavior only by defining the interface on the ASA as a "trunk" interface.&lt;BR /&gt;What I don't know (I never did such a configuration so far) is if a "trunk" interface works in the same or similar way as a 'standard' or a 'switchport' interface, thus leaving all the other features configured on the&amp;nbsp;ASA in a correct working state exactly as now.&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Cristiano&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 16:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513953#M206440</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-06T16:58:05Z</dc:date>
    </item>
    <item>
      <title>Ok, first things first, why</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513954#M206441</link>
      <description>&lt;P&gt;Ok, first things first, why have you created different VLANs on the ASA? These need to match as you will be assigning access vlans to the ASA ports.&lt;/P&gt;&lt;P&gt;Your switch has&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;1 &amp;nbsp; &amp;nbsp; &amp;nbsp; DEFAULT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp; 10 &amp;nbsp; &amp;nbsp; &amp;nbsp;CLIENT_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp; 20 &amp;nbsp; &amp;nbsp; &amp;nbsp;CISCO_VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp; 31 &amp;nbsp; &amp;nbsp; &amp;nbsp;VOIP_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp; 90 &amp;nbsp; &amp;nbsp; &amp;nbsp;SERVER_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;| Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp; 99 &amp;nbsp; &amp;nbsp; &amp;nbsp;VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | Port-based No &amp;nbsp; &amp;nbsp;No&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your ASA has&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;interface Vlan1&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp;nameif inside&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp;security-level 100&lt;/SPAN&gt;&lt;BR style="font-family: 'courier new', courier, monospace; font-size: 11px;" /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace; font-size: 11px;"&gt;&amp;nbsp;ip address 192.168.110.252 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;This should be "interface vlan 10" since the 192.168.110.x is your VLAN 10 on your switch. Then configure the port on the ASA to match, switchport access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try after that&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 17:28:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513954#M206441</guid>
      <dc:creator>david-swope</dc:creator>
      <dc:date>2014-10-06T17:28:20Z</dc:date>
    </item>
    <item>
      <title>Your configuration looks fine</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513955#M206442</link>
      <description>&lt;P&gt;Your configuration looks fine. If you add a static route to the SERVER_LAN are you able to get connectivity then?&amp;nbsp; Are you able to reach the LOCAL_LAN subnet?&amp;nbsp; I am thinking that the tunneled default gateway might not be working as expected.&lt;/P&gt;&lt;P&gt;If you are trying to ping when testing, have you made sure you have turned off the firewall on the servers? (ie. windows firewall, or any other software firewall that may be installed)&lt;/P&gt;&lt;P&gt;What are the default gateways configured on the servers and local LAN PCs?&amp;nbsp; Is the the ASA itself or are there routers / L3 switches inbetween?&amp;nbsp; Would you be able to post a diagram of your network?&lt;/P&gt;&lt;P&gt;You could set up a packet capture on the inside interface and or the DMZ interface and then see if you see the VPN traffic leaving and entering the interface.&amp;nbsp; Keep in mind that if you set this up on the outside interface you will not see anything as the traffic will be encrypted.&lt;/P&gt;&lt;P&gt;You can setup the following just change the IP addresses and capture interface as needed:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list capin extended permit ip host 192.168.120.20 host 192.168.110.20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list capin extended permit ip host 192.168.110.20 host 192.168.120.20 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture CAP interface inside access-list capin&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture CAP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you see traffic leaving the interface but you see no return traffic then there is a routing problem from the servers to the ASA, perhaps there is asynchronous routing happening.&amp;nbsp; If you do see the traffic return, then the ASA is not encrypting the traffic for some reason.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 19:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513955#M206442</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-06T19:27:19Z</dc:date>
    </item>
    <item>
      <title>I just saw your post on the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513956#M206443</link>
      <description>&lt;P&gt;I just saw your post on the L3 switch...and noticed this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size:11px"&gt;&lt;SPAN style="font-family:courier new,courier,monospace"&gt;CISCO_VPN_VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; | Manual &amp;nbsp; &amp;nbsp; 192.168.120.1 &amp;nbsp; 255.255.255.0 &amp;nbsp; Yes &amp;nbsp; Yes&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:16px;"&gt;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;Do you have an IP on the VPN subnet configured on the switch?&amp;nbsp; if so then this is your problem.&amp;nbsp; The switch thinks it is directly connected to the network so it will not send the packets to the ASA.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Where is inter-VLAN routing happening, or where do you want it to happen?&amp;nbsp; If it is happening on the switch, then all you need is a route to the other networks via the inside VLAN1.&amp;nbsp; If the ASA is expected to do the routing then, as David mentioned, you need to get your ASA VLANs in order.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2014 19:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513956#M206443</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-06T19:35:56Z</dc:date>
    </item>
    <item>
      <title>Interesting comment.1) I</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513957#M206444</link>
      <description>&lt;P&gt;&lt;BR /&gt;Interesting comment.&lt;/P&gt;&lt;P&gt;1) I created a dedicated VLAN on the L3 Switch because I expect that the Cisco VPN remote clients will access the internal LAN by using the 192.168.120.x address pool.&lt;BR /&gt;Without such a VLAN on the L3 Switch (and the related routes properly set) those packets couldn't be routed on the internal LAN.&lt;/P&gt;&lt;P&gt;Unfortunately, the L3 Switch requires that an IP address is set on it for each VLAN that you create. So I had to create and assign to the CISCO_VPN_VLAN the IP address 192.168.120.1&lt;/P&gt;&lt;P&gt;2) I definitely would like that every inter-VLAN routing is done at Switch level, while the external routing (internet access) is done by the ASA.&lt;/P&gt;&lt;P&gt;Hope the above clarifies my requirements.&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Cristiano&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 11:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513957#M206444</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-11T11:37:02Z</dc:date>
    </item>
    <item>
      <title>Thanks a lot for your</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513958#M206445</link>
      <description>&lt;P&gt;Thanks a lot for your suggestions.&lt;/P&gt;&lt;P&gt;I'll work on them in the following days (next week&amp;nbsp;I'll be on-site) and let you know the rest of information and the results of my captures.&lt;/P&gt;&lt;P&gt;Best regards;&lt;BR /&gt;Cristiano&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 11:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513958#M206445</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-11T11:40:08Z</dc:date>
    </item>
    <item>
      <title>I'll do it as soon as again</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513959#M206446</link>
      <description>&lt;P&gt;I'll do it as soon as again on site (next week) and let you know.&lt;BR /&gt;I definitely prefer not to make changes to the&amp;nbsp;ASA config from remote, since it's working on a production network...&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;BR /&gt;Cristiano&lt;/P&gt;</description>
      <pubDate>Sat, 11 Oct 2014 11:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513959#M206446</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-11T11:42:56Z</dc:date>
    </item>
    <item>
      <title>1) I created a dedicated VLAN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513960#M206447</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;1) I created a dedicated VLAN on the L3 Switch because I expect that the Cisco VPN remote clients will access the internal LAN by using the 192.168.120.x address pool.&amp;nbsp; Without such a VLAN on the L3 Switch (and the related routes properly set) those packets couldn't be routed on the internal LAN.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This is incorrect.&amp;nbsp; As I mentioned earlier if the L3 switch has an interface for the 192.168.120.x network it thinks it is directly connected to the network and will check its own CAM table to see which interface the IP is located off of.&amp;nbsp; The ASA can use proxy ARP to answer requests for these IPs but this type of setup can result in unstable connections and can be difficult in troubleshooting.&amp;nbsp; I suggest setting the VPN IP pool to a subnet that is not in use on any of your internal networks.&lt;/P&gt;&lt;P&gt;The way to set this up is to have your PCs use the IPs of the L3 switch as their default gateway.&amp;nbsp; Then the switch will have a default route pointing to the ASA.&amp;nbsp; The ASA will have a route for each network connected to the L3 switch which again points to the directly connected IP of the L3 switch (the IP on the ASA which is on the same subnet as an IP on the L3 switch).&amp;nbsp; The ASA will also have a default route pointing to your ISP.&lt;/P&gt;&lt;P&gt;This setup will provide inter-VLAN routing on the L3 switch while external routing is done by the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So your network should look something like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; ------ Network 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; /&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; /&lt;BR /&gt;ISP ----- ASA ----- L3 switch ------ Network 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; \&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; \&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; ------ Network 3&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;2) I definitely would like that every inter-VLAN routing is done at Switch level, while the external routing (internet access) is done by the ASA&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;My above comment covers this.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 12 Oct 2014 08:56:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513960#M206447</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-12T08:56:41Z</dc:date>
    </item>
    <item>
      <title>Hello,please find below my</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513961#M206448</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;please find below my comments on your last post.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;1)&amp;nbsp;&lt;STRONG&gt;I suggest setting the VPN IP pool to a subnet that is not in use on any of your internal networks&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;That is exactly what I did. My internal LAN uses the 192.168.110.x, 192.168.131.x and 192.168.190.x subnets.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;I added the 192.168.120.x only at ASA level in order to provide a suitable range of addresses to the incoming Cisco VPN remote accesses.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;2)&amp;nbsp;&lt;STRONG&gt;This is incorrect.&amp;nbsp; As I mentioned earlier if the L3 switch has an interface for the 192.168.120.x network it thinks it is directly connected to the network and will check its own CAM table to see which interface the IP is located off of.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;As far as I know, the L3 Switch can route packets between subnets only if each subnet has been previously&amp;nbsp;associated to a dedicated VLAN. Therefore, I created the VLAN 10 for subnet 192.168.110.x, VLAN 90 for 192.168.190.x and VLAN 31 for 192.168.131.x. With this setting the intra-LAN routing works, so far, flawlessly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Since the packets coming from the VPN Clients are in the&amp;nbsp;192.168.120.x subnet, how can they be routed by the L3 Switch if they appear on an interface (coming from the ASA)&amp;nbsp;identified as "VLAN 10" on the L3 Switch&amp;nbsp;?&amp;nbsp;&lt;BR /&gt;In fact, the Switch port to which the Ethernet cable coming from the ASA is connected, has been configured on the routing switch as pertaining to "VLAN 10".&lt;BR /&gt;If packets belonging to 192.168.120.x are sent through that interface, the&amp;nbsp;L3 Switch discards them because it does not recognise them in the expected&amp;nbsp;VLAN ID.&lt;BR /&gt;As far as I know, the only way to get those packets (the ones coming&amp;nbsp;from VPN Clients) routed by the L3 Switch is to define a further VLAN on it (VLAN 20 in my case) and configure the switch port as "TAGGED", i.e. able to accept packets from both subnets (192.168.110.x + 192.168.120.x) at the same time.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;By definition, all "UNTAGGED" ports may accept packets from only one single VLAN (i.e. subnet).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Anyway, I'll perform some testing this week to explore the possible solutions you suggested.&lt;BR /&gt;I'll keep you updated about&amp;nbsp;the testing results.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:12px;"&gt;Thank you very much&amp;nbsp;for your support.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513961#M206448</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-14T16:30:33Z</dc:date>
    </item>
    <item>
      <title>Just one more question that</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513962#M206449</link>
      <description>&lt;P&gt;Just one more question that could be useful to clarify my understanding of the matter:&lt;BR /&gt;A VPN Client connects (using IPsec)&amp;nbsp;from remote to the ASA and is assigned an IP address in the 192.168.120.20 ...&amp;nbsp;50 range.&lt;BR /&gt;Does it maintain this address when it accesses the intenal LAN or does the ASA NAT it by using its own address in the main VLAN (e.g. 192.168.110.252) ???&lt;/P&gt;&lt;P&gt;In the former case I need to define a specific VLAN in the L3 Switch otherwise no any packets will be forwarded to the LAN.&lt;/P&gt;&lt;P&gt;In the latter case, the specific VLAN is not needed at all and the routing is made by using the rules set for the main VLAN (VLAN 10).&lt;/P&gt;&lt;P&gt;Please advice...&lt;/P&gt;</description>
      <pubDate>Tue, 14 Oct 2014 16:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513962#M206449</guid>
      <dc:creator>cristiano.radicchi</dc:creator>
      <dc:date>2014-10-14T16:42:21Z</dc:date>
    </item>
    <item>
      <title>Since the packets coming from</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513963#M206450</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="font-size: 12px;"&gt;Since the packets coming from the VPN Clients are in the&amp;nbsp;192.168.120.x subnet, how can they be routed by the L3 Switch if they appear on an interface (coming from the ASA)&amp;nbsp;identified as "VLAN 10" on the L3 Switch&amp;nbsp;?&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;As I mentioned earlier, if the switch has an IP configured on it within the same subnet as the VPN users then it thinks it is directly connected and will not forward the packets to the ASA (by default).&amp;nbsp; So you would either need to configure the ASA with subinterfaces that connect to the L3 switch and place each subinterface in their respective VLANs.&amp;nbsp; then the ASA will be doing the routing for the VPN traffic.&amp;nbsp; Or, you would need to configure a L3 link between the ASA and the L3 switch and add routes to each subnet on the ASA pointing to the L3 IP which is configured for this link. That way VPN traffic enters the ASA, the ASA routes it to the L3 switch and the L3 switch routes it again to its appropriate destination...&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does it maintain this address when it accesses the intenal LAN or does the ASA NAT it by using its own address in the main VLAN (e.g. 192.168.110.252) ???&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is the IP that will be the source address when accessing the LAN.&amp;nbsp; Of course this is assuming you have configured NAT exemption.&amp;nbsp; If you do not have NAT exemption configured (or identity NAT as it is called now) VPN traffic will be NATed to the first matched NAT rule...this will normally be the dynamic NAT.&amp;nbsp; When this happens VPN traffic will fail.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In the former case I need to define a specific VLAN in the L3 Switch otherwise no any packets will be forwarded to the LAN.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;you do not have to define a VPN VLAN on the L3 switch to route VPN traffic, and in my opinion you should not set up your network like this.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In the latter case, the specific VLAN is not needed at all and the routing is made by using the rules set for the main VLAN (VLAN 10).&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Not exactly sure what you are trying to get at here.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2014 07:15:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-remote-access-ipsec-sessions-are-not-routed-on-the/m-p/2513963#M206450</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-10-16T07:15:05Z</dc:date>
    </item>
  </channel>
</rss>

