<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic As your inside LAN traffic is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462759#M238601</link>
    <description>&lt;P&gt;As your inside LAN traffic is nated to outside interface ip address, you have to nat-exempt this VPN traffic.&lt;/P&gt;</description>
    <pubDate>Fri, 09 May 2014 13:45:21 GMT</pubDate>
    <dc:creator>Poonam Garg</dc:creator>
    <dc:date>2014-05-09T13:45:21Z</dc:date>
    <item>
      <title>Unable to ping  or access any LAN hosts via Remote Access VPN from ASA 5505</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462758#M238600</link>
      <description>&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i had configured the remote access VPN on ASA 5505 with local User, i'm able to connect to remoteaccess VPN but i can ping to any host which allowed in the Split-tunnel ACL &amp;amp; also i can't see any his on the Split-tunnel ACL, can any one please help with this issue, below is the running configuration,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Running Config&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;hostname Corp-OOB-FW&lt;BR /&gt;&lt;BR /&gt;enable password YcharrMW83oGrE38 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;&amp;nbsp;switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;ip address 192.168.2.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.40.1 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;access-list Corp_OOB_splitTunnelAcl standard permit 192.168.40.0 255.255.255.248&lt;BR /&gt;access-list outside_access_in extended permit icmp any any echo-reply&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip local pool Corp-OOBVPN-POOL 192.168.49.10-192.168.49.30 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.40.0 255.255.255.248&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set esp-3des-sha esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map remote-access 65535 set transform-set esp-3des-sha&lt;BR /&gt;crypto map outside_map 65335 ipsec-isakmp dynamic remote-access&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash md5&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy Corp-OOB internal&lt;BR /&gt;group-policy Corp-OOB attributes&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol IPSec&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value Corp_OOB_splitTunnelAcl&lt;BR /&gt;&amp;nbsp;address-pools value Corp-OOBVPN-POOL&lt;BR /&gt;username Vpntest password 1dlPvfWVI/yAilYC encrypted privilege 0&lt;BR /&gt;username Vpntest attributes&lt;BR /&gt;&amp;nbsp;vpn-group-policy Corp-OOB&lt;BR /&gt;tunnel-group Corp-OOB type remote-access&lt;BR /&gt;tunnel-group Corp-OOB general-attributes&lt;BR /&gt;&amp;nbsp;address-pool Corp-OOBVPN-POOL&lt;BR /&gt;&amp;nbsp;default-group-policy Corp-OOB&lt;BR /&gt;tunnel-group Corp-OOB ipsec-attributes&lt;BR /&gt;&amp;nbsp;pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:f80e13ca5e1d7e72e1d28d563d38bda8&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:10:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462758#M238600</guid>
      <dc:creator>williamchitla</dc:creator>
      <dc:date>2019-03-12T04:10:44Z</dc:date>
    </item>
    <item>
      <title>As your inside LAN traffic is</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462759#M238601</link>
      <description>&lt;P&gt;As your inside LAN traffic is nated to outside interface ip address, you have to nat-exempt this VPN traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 13:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462759#M238601</guid>
      <dc:creator>Poonam Garg</dc:creator>
      <dc:date>2014-05-09T13:45:21Z</dc:date>
    </item>
    <item>
      <title>It doesn't look like your</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462760#M238602</link>
      <description>&lt;P&gt;It doesn't look like you exempted your return traffic to the remote clients from NAT.&lt;/P&gt;&lt;P&gt;Have a look at &lt;A href="http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/100936-asa8x-split-tunnel-anyconnect-config.html"&gt;this document&lt;/A&gt; (step 10) and add a nat 0 statement and access-list like they specify there.&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 14:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462760#M238602</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2014-05-09T14:29:06Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin sincere thanks to</title>
      <link>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462761#M238603</link>
      <description>&lt;P&gt;Hi &lt;SPAN class="fullname"&gt;&lt;SPAN rel="sioc:has_creator"&gt;&lt;A class="username" href="https://supportforums.cisco.com/users/mrhoads-cco" title="View user profile."&gt;Marvin&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="st"&gt;sincere &lt;EM&gt;thanks&lt;/EM&gt; to &lt;EM&gt;you&lt;/EM&gt; for all &lt;EM&gt;your very much valued assistance,&lt;/EM&gt;&lt;/SPAN&gt; it solved the problem,&lt;/P&gt;</description>
      <pubDate>Fri, 09 May 2014 14:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/unable-to-ping-or-access-any-lan-hosts-via-remote-access-vpn/m-p/2462761#M238603</guid>
      <dc:creator>williamchitla</dc:creator>
      <dc:date>2014-05-09T14:29:07Z</dc:date>
    </item>
  </channel>
</rss>

