<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setting up VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551738#M237066</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;About two years ago I (finally) had vpn set up, but I had to nuke the setup a while back (to long ago to remember why).&lt;/P&gt;&lt;P&gt;My setup:&lt;/P&gt;&lt;P&gt;Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;Base license.&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(2)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;I have created a DMZ-zone and an inside and outside zone.&lt;/P&gt;&lt;P&gt;All servers are headless Linux-servers.&lt;/P&gt;&lt;P&gt;(I also recently had to re-create the servers because of a corrupted disk).&lt;/P&gt;&lt;P&gt;So the setup is as following:&lt;/P&gt;&lt;P&gt;One main linux-server also working as a virtualbox-host.&lt;/P&gt;&lt;P&gt;One dmz-www-server and one dmz-ftp-server.&lt;/P&gt;&lt;P&gt;I will be adding a linux-server for git and a few others.&lt;/P&gt;&lt;P&gt;My first goal is to be able to reach the main server with SSH. Secondly reaching other servers in the network.&lt;/P&gt;&lt;P&gt;I also like to use the open source cisco-vpn-client in Linux, and the cisco VPN client which I also use for connecting to other clients.&lt;/P&gt;&lt;P&gt;Here is my current configuration:&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;&amp;nbsp;switchport access vlan 300&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Vlan300&lt;BR /&gt;&amp;nbsp;no forward interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.8&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.75&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.193&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;domain-name inside-sport.no&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-net&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network dmz-webserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.100&lt;BR /&gt;&amp;nbsp;description Web Server Host Object&lt;BR /&gt;object network dmz-ftpserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.101&lt;BR /&gt;&amp;nbsp;description FTP Server Host Object&lt;/P&gt;&lt;P&gt;object network DMZ.net&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object service FTP&lt;BR /&gt;&amp;nbsp;service tcp source eq ftp&lt;BR /&gt;object service WWW&lt;BR /&gt;&amp;nbsp;service tcp source eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.101 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.100 eq www&lt;BR /&gt;access-list inside_access_dmz extended permit tcp any object DMZ.net range 1 65535&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (dmz,outside) source static dmz-webserver interface service WWW WWW&lt;BR /&gt;nat (dmz,outside) source static dmz-ftpserver interface service FTP FTP&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ.net&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_dmz in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 173.194.32.34 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa authorization exec authentication-server&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e952d491&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201&lt;BR /&gt;&amp;nbsp; &amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.1 193.75.75.75&lt;BR /&gt;dhcpd domain inside-sport.no&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.20-192.168.1.49 inside&lt;BR /&gt;dhcpd dns 192.168.1.1 interface inside&lt;BR /&gt;dhcpd domain inside-sport.no interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username foofoo password foooo encrypted privilege 15&lt;BR /&gt;username bazbaz password baaar encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:88cf7ca3aa1aa19ec0418f557cc0fedf&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:23:55 GMT</pubDate>
    <dc:creator>Trond Husoe</dc:creator>
    <dc:date>2019-03-12T04:23:55Z</dc:date>
    <item>
      <title>Setting up VPN</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551738#M237066</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;About two years ago I (finally) had vpn set up, but I had to nuke the setup a while back (to long ago to remember why).&lt;/P&gt;&lt;P&gt;My setup:&lt;/P&gt;&lt;P&gt;Cisco ASA-5505 on-board accelerator (revision 0x0)&lt;/P&gt;&lt;P&gt;Base license.&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.4(2)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;I have created a DMZ-zone and an inside and outside zone.&lt;/P&gt;&lt;P&gt;All servers are headless Linux-servers.&lt;/P&gt;&lt;P&gt;(I also recently had to re-create the servers because of a corrupted disk).&lt;/P&gt;&lt;P&gt;So the setup is as following:&lt;/P&gt;&lt;P&gt;One main linux-server also working as a virtualbox-host.&lt;/P&gt;&lt;P&gt;One dmz-www-server and one dmz-ftp-server.&lt;/P&gt;&lt;P&gt;I will be adding a linux-server for git and a few others.&lt;/P&gt;&lt;P&gt;My first goal is to be able to reach the main server with SSH. Secondly reaching other servers in the network.&lt;/P&gt;&lt;P&gt;I also like to use the open source cisco-vpn-client in Linux, and the cisco VPN client which I also use for connecting to other clients.&lt;/P&gt;&lt;P&gt;Here is my current configuration:&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;&amp;nbsp;switchport access vlan 300&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Vlan300&lt;BR /&gt;&amp;nbsp;no forward interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;BR /&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.8&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.75&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.193&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;domain-name inside-sport.no&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-net&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network dmz-webserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.100&lt;BR /&gt;&amp;nbsp;description Web Server Host Object&lt;BR /&gt;object network dmz-ftpserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.101&lt;BR /&gt;&amp;nbsp;description FTP Server Host Object&lt;/P&gt;&lt;P&gt;object network DMZ.net&lt;BR /&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object service FTP&lt;BR /&gt;&amp;nbsp;service tcp source eq ftp&lt;BR /&gt;object service WWW&lt;BR /&gt;&amp;nbsp;service tcp source eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.101 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.100 eq www&lt;BR /&gt;access-list inside_access_dmz extended permit tcp any object DMZ.net range 1 65535&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (dmz,outside) source static dmz-webserver interface service WWW WWW&lt;BR /&gt;nat (dmz,outside) source static dmz-ftpserver interface service FTP FTP&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network inside-net&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network DMZ.net&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_dmz in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 173.194.32.34 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa authorization exec authentication-server&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e952d491&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 308205ec 308204d4 a0030201 0202106e cc7aa5a7 032009b8 cebcf4e9 52d49130&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d31&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30303230 38303030 3030305a 170d3230 30323037 32333539 35395a30 81b5310b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 74776f72 6b313b30 39060355 040b1332 5465726d 73206f66 20757365 20617420&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 68747470 733a2f2f 7777772e 76657269 7369676e 2e636f6d 2f727061 20286329&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 3130312f 302d0603 55040313 26566572 69536967 6e20436c 61737320 33205365&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63757265 20536572 76657220 4341202d 20473330 82012230 0d06092a 864886f7&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 0d010101 05000382 010f0030 82010a02 82010100 b187841f c20c45f5 bcab2597&lt;BR /&gt;&amp;nbsp; &amp;nbsp; a7ada23e 9cbaf6c1 39b88bca c2ac56c6 e5bb658e 444f4dce 6fed094a d4af4e10&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 9c688b2e 957b899b 13cae234 34c1f35b f3497b62 83488174 d188786c 0253f9bc&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7f432657 5833833b 330a17b0 d04e9124 ad867d64 12dc744a 34a11d0a ea961d0b&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 15fca34b 3bce6388 d0f82d0c 948610ca b69a3dca eb379c00 48358629 5078e845&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 63cd1941 4ff595ec 7b98d4c4 71b350be 28b38fa0 b9539cf5 ca2c23a9 fd1406e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 18b49ae8 3c6e81fd e4cd3536 b351d369 ec12ba56 6e6f9b57 c58b14e7 0ec79ced&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4a546ac9 4dc5bf11 b1ae1c67 81cb4455 33997f24 9b3f5345 7f861af3 3cfa6d7f&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 81f5b84a d3f58537 1cb5a6d0 09e4187b 384efa0f 02030100 01a38201 df308201&lt;BR /&gt;&amp;nbsp; &amp;nbsp; db303406 082b0601 05050701 01042830 26302406 082b0601 05050730 01861868&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 7474703a 2f2f6f63 73702e76 65726973 69676e2e 636f6d30 12060355 1d130101&lt;BR /&gt;&amp;nbsp; &amp;nbsp; ff040830 060101ff 02010030 70060355 1d200469 30673065 060b6086 480186f8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 45010717 03305630 2806082b 06010505 07020116 1c687474 70733a2f 2f777777&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2e766572 69736967 6e2e636f 6d2f6370 73302a06 082b0601 05050702 02301e1a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1c687474 70733a2f 2f777777 2e766572 69736967 6e2e636f 6d2f7270 61303406&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 03551d1f 042d302b 3029a027 a0258623 68747470 3a2f2f63 726c2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 70636133 2d67352e 63726c30 0e060355 1d0f0101 ff040403&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 02010630 6d06082b 06010505 07010c04 61305fa1 5da05b30 59305730 55160969&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6d616765 2f676966 3021301f 30070605 2b0e0302 1a04148f e5d31a86 ac8d8e6b&lt;BR /&gt;&amp;nbsp; &amp;nbsp; c3cf806a d448182c 7b192e30 25162368 7474703a 2f2f6c6f 676f2e76 65726973&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 69676e2e 636f6d2f 76736c6f 676f2e67 69663028 0603551d 11042130 1fa41d30&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1b311930 17060355 04031310 56657269 5369676e 4d504b49 2d322d36 301d0603&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 551d0e04 1604140d 445c1653 44c1827e 1d20ab25 f40163d8 be79a530 1f060355&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1d230418 30168014 7fd365a7 c2ddecbb f03009f3 4339fa02 af333133 300d0609&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 2a864886 f70d0101 05050003 82010100 0c8324ef ddc30cd9 589cfe36 b6eb8a80&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 4bd1a3f7 9df3cc53 ef829ea3 a1e697c1 589d756c e01d1b4c fad1c12d 05c0ea6e&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b2227055 d9203340 3307c265 83fa8f43 379bea0e 9a6c70ee f69c803b d937f47a&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6decd018 7d494aca 99c71928 a2bed877 24f78526 866d8705 404167d1 273aeddc&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 481d22cd 0b0b8bbc f4b17bfd b499a8e9 762ae11a 2d876e74 d388dd1e 22c6df16&lt;BR /&gt;&amp;nbsp; &amp;nbsp; b62b8214 0a945cf2 50ecafce ff62370d ad65d306 4153ed02 14c8b558 28a1ace0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 5becb37f 954afb03 c8ad26db e6667812 4ad99f42 fbe198e6 42839b8f 8f6724e8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6119b5dd cdb50b26 058ec36e c4c875b8 46cfe218 065ea9ae a8819a47 16de0c28&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 6c2527b9 deb78458 c61f381e a4c4cb66&lt;BR /&gt;&amp;nbsp; quit&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.1 193.75.75.75&lt;BR /&gt;dhcpd domain inside-sport.no&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.20-192.168.1.49 inside&lt;BR /&gt;dhcpd dns 192.168.1.1 interface inside&lt;BR /&gt;dhcpd domain inside-sport.no interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username foofoo password foooo encrypted privilege 15&lt;BR /&gt;username bazbaz password baaar encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:88cf7ca3aa1aa19ec0418f557cc0fedf&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:23:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551738#M237066</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2019-03-12T04:23:55Z</dc:date>
    </item>
    <item>
      <title>If you are just looking for a</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551739#M237077</link>
      <description>&lt;P&gt;If you are just looking for a remote access VPN setup, you could do something like the following just change the names and IPs as needed:&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 10.10.10.1-10.10.10.10&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 5&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption aes&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set VPNSET esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map DYNMAP 65535 set ikev1 transform-set VPNSET&lt;BR /&gt;crypto dynamic-map DYNMAP 65535 set reverse-route&lt;BR /&gt;crypto map VPNMAP 65535 ipsec-isakmp dynamic DYNMAP&lt;BR /&gt;crypto map VPNMAP interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;tunnel-group VPNGROUP type remote-access&lt;BR /&gt;tunnel-group VPNGROUP ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key PASSWORD&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 29 Jun 2014 10:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551739#M237077</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-29T10:11:36Z</dc:date>
    </item>
    <item>
      <title>Thank you for the rating</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551740#M237079</link>
      <description>&lt;P&gt;Thank you for the rating &lt;IMG alt="smiley" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/regular_smile.png" title="smiley" width="23" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2014 10:30:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551740#M237079</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-06-30T10:30:36Z</dc:date>
    </item>
    <item>
      <title>Dear Magnus,Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551741#M237080</link>
      <description>&lt;P&gt;Dear Magnus,&lt;/P&gt;&lt;P&gt;Thanks for the assistance,.&lt;/P&gt;&lt;P&gt;I ended up with this setup:&lt;/P&gt;&lt;P&gt;ip local pool VPNPOOL 10.10.10.1-10.10.10.10&lt;/P&gt;&lt;P&gt;access-list split_tunnel_acl standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;This part here is important. What it does, as far as I could understand, is that it routes/connects the network you come from through the tunnel (10.10.10.x) to the internal network (192.168.1.0).&lt;/P&gt;&lt;P&gt;&lt;S&gt;object-group network obj_10.10.10.1_255&lt;BR /&gt;network-object 10.10.10.1 255.255.255.255&lt;/S&gt;&lt;/P&gt;&lt;P&gt;The above line must be changed to&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#008080;"&gt;object-group network obj_10.10.10.1_255 (just so you don't have to fix the nat-line below)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#008080;"&gt;network-object 10.10.10.0 255.255.255.248 &lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network obj_192.168.1.0_24&lt;BR /&gt;network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj_192.168.1.0_24 obj_192.168.1.0_24 destination static obj_10.10.10.1_248 obj_10.10.10.1_248 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set set1 esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map dyn_map 65535 set ikev1 transform-set set1&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside crypto ikev1 policy 65535&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;group-policy ipsec_ra_policy internal&lt;BR /&gt;group-policy ipsec_ra_policy attributes&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value split_tunnel_acl&lt;/P&gt;&lt;P&gt;tunnel-group NAME-OF-VPN-TUNNEL type remote-access&lt;BR /&gt;tunnel-group NAME-OF-VPN-TUNNEL general-attributes&lt;BR /&gt;address-pool client_pool&lt;BR /&gt;default-group-policy ipsec_ra_policy&lt;BR /&gt;tunnel-group NAME-OF-VPN-TUNNEL ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;This setup makes it possible for me to connect to the server at the office, and also run SSH to it.&lt;/P&gt;&lt;P&gt;I am giving you correct answer, as it pointed me in the right direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-- EDIT --&lt;/P&gt;&lt;P&gt;The green lines are edited because the initial setup only worked if you got the 10.10.10.1 address when connecting to the network over VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 07:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551741#M237080</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2014-07-01T07:25:31Z</dc:date>
    </item>
    <item>
      <title>When coming into the office,</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551742#M237082</link>
      <description>&lt;P&gt;When coming into the office, any computer connecting to the network has no access to the internet. I have access to the servers in the network, but the computer connected (just recently) has no access outside.&lt;/P&gt;&lt;P&gt;the server has access, but I believe they have kept access because they have stayed online during the whole process.&lt;/P&gt;&lt;P&gt;Any suggestions on how to fix this is more than welcomed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 09:09:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551742#M237082</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2014-07-01T09:09:39Z</dc:date>
    </item>
    <item>
      <title>We would need to see the</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551743#M237085</link>
      <description>&lt;P&gt;We would need to see the configuration of your ASA, also let us know the source IP which is having issues.&lt;/P&gt;&lt;P&gt;How many PC's are on the network?&lt;/P&gt;&lt;P&gt;This almost sounds like there is a NAT issue, do you have your dynamic NAT statements in place?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 09:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551743#M237085</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T09:13:57Z</dc:date>
    </item>
    <item>
      <title>Below is the current running</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551744#M237087</link>
      <description>&lt;P&gt;Below is the current running configuration.&lt;/P&gt;&lt;P&gt;There are three laptops and two internal servers. Two dmz-servers.&lt;/P&gt;&lt;P&gt;(I also notice that I cannot get to the www-server in the dmz, but I have another thread for that issue)&lt;/P&gt;&lt;P&gt;hostname fw&lt;BR /&gt;domain-name inside-sport.no&lt;BR /&gt;enable password ******** encrypted&lt;BR /&gt;passwd ********** encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;switchport access vlan 300&lt;/P&gt;&lt;P&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address dhcp&lt;BR /&gt;!&lt;BR /&gt;interface Vlan300&lt;BR /&gt;&amp;nbsp;no forward interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;BR /&gt;clock summer-time CEDT recurring&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 192.168.1.8&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.75&lt;BR /&gt;&amp;nbsp;name-server 193.75.75.193&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;domain-name inside-sport.no&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network inside-net&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network dmz-webserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.100&lt;BR /&gt;&amp;nbsp;description Web Server Host Object&lt;BR /&gt;object network dmz-ftpserver&lt;BR /&gt;&amp;nbsp;host 192.168.2.101&lt;BR /&gt;&amp;nbsp;description FTP Server Host Object&lt;BR /&gt;object network DMZ.net&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object service FTP&lt;BR /&gt;&amp;nbsp;service tcp source eq ftp&lt;BR /&gt;object service WWW&lt;BR /&gt;&amp;nbsp;service tcp source eq www&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object-group network obj_10.10.10.0_16&lt;BR /&gt;&amp;nbsp;network-object 10.10.10.0 255.255.255.248&lt;BR /&gt;object-group network obj_192.168.1.0_24&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.101 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 192.168.2.100 eq www&lt;BR /&gt;access-list inside_access_dmz extended permit tcp any object DMZ.net range 1 65535&lt;BR /&gt;access-list split_tunnel_acl standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool client_pool 10.10.10.1-10.10.10.10 mask 255.255.255.248&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;BR /&gt;nat (dmz,outside) source static dmz-webserver interface service WWW WWW&lt;BR /&gt;nat (dmz,outside) source static dmz-ftpserver interface service FTP FTP&lt;BR /&gt;nat (inside,outside) source static obj_192.168.1.0_24 obj_192.168.1.0_24 destination static obj_10.10.10.0_16 obj_10.10.10.0_16 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network inside-net&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_dmz in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 173.194.32.34 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authorization command LOCAL&lt;BR /&gt;aaa authorization exec authentication-server&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set set1 esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map dyn_map 65535 set ikev1 transform-set set1&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;crl configure&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;&amp;nbsp;certificate ca 6ecc7aa5a7032009b8cebcf4e952d491&lt;/P&gt;&lt;P&gt;(dropping the rest of this long block. I believe it is related to the call home service for the cisco firewall)&lt;/P&gt;&lt;P&gt;quit&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 65535&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.1.1 193.75.75.75&lt;BR /&gt;dhcpd domain inside-sport.no&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.50-192.168.1.79 inside&lt;BR /&gt;dhcpd dns 192.168.1.1 interface inside&lt;BR /&gt;dhcpd domain inside-sport.no interface inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy ipsec_ra_policy internal&lt;BR /&gt;group-policy ipsec_ra_policy attributes&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value split_tunnel_acl&lt;BR /&gt;username foooo password ************* encrypted privilege 15&lt;/P&gt;&lt;P&gt;username trond password ************** encrypted privilege 15&lt;BR /&gt;tunnel-group VPN-INSIDE-SPORT type remote-access&lt;BR /&gt;tunnel-group VPN-INSIDE-SPORT general-attributes&lt;BR /&gt;&amp;nbsp;address-pool client_pool&lt;BR /&gt;&amp;nbsp;default-group-policy ipsec_ra_policy&lt;BR /&gt;tunnel-group VPN-INSIDE-SPORT ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:*********************************&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 09:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551744#M237087</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2014-07-01T09:25:56Z</dc:date>
    </item>
    <item>
      <title>Ah ok so the users connecting</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551745#M237088</link>
      <description>&lt;P&gt;Ah ok so the users connecting to the VPN do not have internet access?&lt;/P&gt;&lt;P&gt;You need to do hairpinning. So you need add a NAT statement that translates the VPN IPs to the outside interface and permit intra interface traffic (which you already have configured).&amp;nbsp; somthing like the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPNUSERS&lt;BR /&gt;&amp;nbsp; range 10.10.10.1 10.10.10.10&lt;BR /&gt;&amp;nbsp; nat (outside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 09:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551745#M237088</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T09:32:45Z</dc:date>
    </item>
    <item>
      <title>When I access the system</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551746#M237089</link>
      <description>&lt;P&gt;When I access the system remotely with vpn I have access to the internet and also to all servers in the network.&lt;/P&gt;&lt;P&gt;And the servers have access to the internet. So everything seems just nice and dandy.&lt;/P&gt;&lt;P&gt;When I am at the office how ever, I cannot access the internet. I can access the servers and all computers in the network.&lt;/P&gt;&lt;P&gt;I can still add the VPNUSERS Network object. Seems like a good idea to have&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface &amp;lt;- is present already&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When running this:&lt;/P&gt;&lt;P&gt;object network VPNUSERS&lt;/P&gt;&lt;P&gt;range 10.10.10.1 10.10.10.10&lt;/P&gt;&lt;P&gt;I get a message telling me this:&lt;/P&gt;&lt;P&gt;Addresses overlap with existing localpool range&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 09:40:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551746#M237089</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2014-07-01T09:40:51Z</dc:date>
    </item>
    <item>
      <title>first of all I noticed this</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551747#M237090</link>
      <description>&lt;P&gt;first of all I noticed this:&lt;/P&gt;&lt;P&gt;ip local pool client_pool 10.10.10.1-10.10.10.10 mask 255.255.255.248&lt;/P&gt;&lt;P&gt;That subnet mask will only include IPs in the range 10.10.10.1 to 10.10.10.7.&amp;nbsp; I suggest either changing the mask or the IP pool IP range.&lt;/P&gt;&lt;P&gt;As for the error you get use a subnet keyword instead&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPNUSERS&lt;BR /&gt;&amp;nbsp; subnet 10.10.10.0 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;What IP is your PC receiving from the DHCP server?&lt;/P&gt;&lt;P&gt;I also noticed you do not have dhcp enabled on the inside interface or is that a copy paste error?&amp;nbsp; &lt;STRONG&gt;dhcpd enable inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;could you also run a packet tracer on the ASA&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.1.50 12345 4.2.2.2 80 detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 10:24:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551747#M237090</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T10:24:03Z</dc:date>
    </item>
    <item>
      <title>Changed the VPNUSERS network</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551748#M237091</link>
      <description>&lt;P&gt;Changed the VPNUSERS network object to use subnet instead. Added back the ip local pool client_pool&lt;/P&gt;&lt;P&gt;I then also added the dhcpd enable inside.&lt;/P&gt;&lt;P&gt;Output of packet-tracer command:&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcb2e15a8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1380614, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcb3453f0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23454, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network inside-net&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.50/12345 to 193.91.175.82/6856&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcbe94388, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22984, user_data=0xcb3d84d0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: HOST-LIMIT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcb3b29b0, priority=0, domain=host-limit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22747, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Reverse Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xcb36f638, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=70090, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 31191, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;---&lt;/P&gt;&lt;P&gt;I now see on my laptops that I am back on the network. So one of those things seemed to work.&lt;/P&gt;&lt;P&gt;I am now not testing the vpn, I'll be doing that this evening just to be sure things are working OK.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 10:59:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551748#M237091</guid>
      <dc:creator>Trond Husoe</dc:creator>
      <dc:date>2014-07-01T10:59:11Z</dc:date>
    </item>
    <item>
      <title>Good stuff that you are back</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551749#M237092</link>
      <description>&lt;P&gt;Good stuff that you are back online! &lt;IMG alt="yes" height="23" src="https://supportforums.cisco.com/profiles/commons/libraries/ckeditor/plugins/smiley/images/thumbs_up.png" title="yes" width="23" /&gt;&lt;/P&gt;&lt;P&gt;As per the packet tracer all from the inside to the internet should be fine now.&lt;/P&gt;&lt;P&gt;Let us know how it goes with the VPN test.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2014 11:01:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-vpn/m-p/2551749#M237092</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-07-01T11:01:42Z</dc:date>
    </item>
  </channel>
</rss>

