<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect VPN - Cannot ping internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832317#M26607</link>
    <description>&lt;P&gt;Username : Rush Index : 35&lt;BR /&gt;Assigned IP : 10.16.1.1 Public IP : 196.33.234.23&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel&lt;BR /&gt;License : AnyConnect Essentials&lt;BR /&gt;Encryption : AES128 Hashing : none SHA1&lt;BR /&gt;Bytes Tx : 10780 Bytes Rx : 5679&lt;BR /&gt;Group Policy : GroupPolicy_Home Tunnel Group : Home&lt;BR /&gt;Login Time : 14:09:38 UTC Thu Apr 4 2019&lt;BR /&gt;Duration : 0h:01m:26s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;NAC Result : Unknown&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's the result and yes I can ping the inside GW from the client&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Apr 2019 13:59:01 GMT</pubDate>
    <dc:creator>machine23</dc:creator>
    <dc:date>2019-04-04T13:59:01Z</dc:date>
    <item>
      <title>AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832035#M26603</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi All,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; I have searched and attempted to troubleshoot the issue but still no luck , Hoping some more experienced folks can help out&lt;IMG src="https://community.cisco.com/7.0.3.0/images/emoticons/confused.png" border="0" /&gt; ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;All of this is on a Home Test network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the VPN AnyConnect to access my home network , Used Split tunnelling - got connected with the assigned pool all ok but I cannot access my internal network at home , I added the management-access inside command which enabled me to ping the inside network interface gateway but nothing else ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there anything else I am missing ? maybe I need to configure an ACL as I'm using split tunnelling? but I am unsure the right ACL to be configured?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;running config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;enable password sNVGYXTNm97n48wB encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address dhcp setroute&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.1.1 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;&amp;nbsp;shutdown&lt;/P&gt;&lt;P&gt;&amp;nbsp;no nameif&lt;/P&gt;&lt;P&gt;&amp;nbsp;no security-level&lt;/P&gt;&lt;P&gt;&amp;nbsp;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nameif Manage&lt;/P&gt;&lt;P&gt;&amp;nbsp;security-level 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;ip address 192.168.0.1 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network Permit_Lan_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.250.0_26&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.250.0 255.255.255.192&lt;/P&gt;&lt;P&gt;object network inside&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network pool&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 192.168.250.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol-object ip&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list 10 standard permit 192.168.1.0 255.255.255.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu Manage 1500&lt;/P&gt;&lt;P&gt;ip local pool pool 192.168.250.1-192.168.250.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network Permit_Lan_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.255.0 Manage&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption des&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption 3des&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption aes&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;&amp;nbsp;enrollment terminal&lt;/P&gt;&lt;P&gt;&amp;nbsp;subject-name CN=ciscoasa.null,O=Rush,C=UK&lt;/P&gt;&lt;P&gt;&amp;nbsp;crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;&amp;nbsp;enrollment self&lt;/P&gt;&lt;P&gt;&amp;nbsp;subject-name CN=ciscoasa&lt;/P&gt;&lt;P&gt;&amp;nbsp;crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;&amp;nbsp;certificate ee55a25c&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308202d4 308201bc a0030201 020204ee 55a25c30 0d06092a 864886f7 0d010105&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 86f70d01 09021608 63697363 6f617361 301e170d 31393034 30313138 32343239&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a170d32 39303332 39313832 3432395a 302c3111 300f0603 55040313 08636973&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613082&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282 010100b4&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9289c4f5 0cdc8bf1 9bce3aaa 11498b72 b603f9b9 e58a1b38 e795a300 66fd99eb&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e183a2ac 81e998d8 fd7c0333 2cd4108b 0a5ab89d e5f4a87f 827a9185 bdf689b9&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 25d877d7 35f01aae 684c58d8 cf5d8cab 9bf98a8c 9788d522 18a5b3cc 857bf695&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 103eaff8 7f022b19 4377d1e8 855734ca 994e6500 73dbd67a a6a70688 8897d18d&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0481b05b ff67f992 37e8cdb4 86da7e16 893e640e bfafb6ef 93918986 baa2e60c&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bb5120c6 e403e47b 0c78927f c25d1826 63c1c82c e7104d9e 13ae1b11 05c9b360&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d20bb25b ea4a8652 b14b7590 13394b47 778c43e7 40ac5c2a 67e3a5a4 f3fd2a2b&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d4614101 2c3c24a6 ae5c0084 b7b564c4 56d1ef53 eb59a718 57f6743f 3e298702&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03010001 300d0609 2a864886 f70d0101 05050003 82010100 982d21e7 18e535ce&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8b8295e5 4e99269a a8451268 dec0dbfc 7f1b5198 4af8c293 85633883 2dd03a5e&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9b9fe2aa 9c455788 de135890 6f1b9f9c 103aa30a b998c1eb 046c3ff5 85be6a6e&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5288a75a d08062d9 f4e2df2e 352d773f db4a7e57 6ca18e5f 88ccc522 1a435528&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6bafc001 ffc78294 f6e49bc1 218d697c 87e8006c 25bb1ccc 76b2df87 da3f7aac&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9d378d75 769e0760 43532a92 d7f7f0af b64f2c94 27a3c4d8 74d8181d 089c7c66&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cb8b9435 0040b8f5 e6a899f4 e1b4176e 769add02 5a7a74d3 b6ed422b c2d03ce3&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0b0aaa54 b90bd778 8b75c69c 50c58897 cb8bceac 04c50b16 cd5ec6e2 d7ddd99b&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b9328ab8 bcc5b1c6 720496b1 9da321d3 8fb5b6ad 9f29ac0e&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;encryption aes-256&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 5 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;encryption aes-192&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 5 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;encryption aes&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 5 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt;&amp;nbsp;encryption 3des&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 5 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt;&amp;nbsp;encryption des&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 5 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside client-services port 443&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;dhcpd dns 4.2.2.2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.10-192.168.1.254 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint1 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp;enable outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect-essentials&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-3.1.06079-k9.pkg 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-macos-4.4.01054-webdeploy-k9.pkg 3&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-4.4.01054-webdeploy-k9.pkg 4&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect profiles Home_client_profile disk0:/Home_client_profile.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect profiles Rush_client_profile disk0:/Rush_client_profile.xml&lt;/P&gt;&lt;P&gt;&amp;nbsp;anyconnect enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_Home internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_Home attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;wins-server none&lt;/P&gt;&lt;P&gt;&amp;nbsp;vpn-tunnel-protocol ikev2 ssl-client&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;&amp;nbsp;split-tunnel-network-list value 10&lt;/P&gt;&lt;P&gt;&amp;nbsp;default-domain none&lt;/P&gt;&lt;P&gt;&amp;nbsp;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value Home_client_profile type user&lt;/P&gt;&lt;P&gt;username Rush password wtb6igjZWtCLWRft encrypted&lt;/P&gt;&lt;P&gt;username Rush password VRA13ZzEzDp8PnFO encrypted&lt;/P&gt;&lt;P&gt;tunnel-group Home type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Home general-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;address-pool pool&lt;/P&gt;&lt;P&gt;&amp;nbsp;default-group-policy GroupPolicy_Home&lt;/P&gt;&lt;P&gt;tunnel-group Home webvpn-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;group-alias Home enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;--- More ---&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&amp;nbsp;&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;&amp;nbsp;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method httpA&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 26&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 26&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:2594791be0e41bc1bd142612ed137d88&lt;/P&gt;&lt;P&gt;: end&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 09:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832035#M26603</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-04T09:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832136#M26604</link>
      <description>&lt;P&gt;You may need a "No NAT" for the Anyconnect Pool and your internal addressing. I see there is currently a PAT setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try adding the following -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static Permit_Lan_IP Permit_Lan_IP destination static pool pool&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 11:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832136#M26604</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-04T11:05:42Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832233#M26605</link>
      <description>&lt;P&gt;Hi Sorry I had made some changes on the config .. just the vpn pool ip changed to avoid some confusion ..&amp;nbsp;&lt;/P&gt;&lt;P&gt;but when I issued your command it said doesn't match an existing object or object-group ... here is the new config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA Version 8.6(1)2&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password sNVGYXTNm97n48wB encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif Manage&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.1 255.255.255.0&lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network Permit_Lan_IP&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network inside&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_10.16.1.0_27&lt;BR /&gt;subnet 10.16.1.0 255.255.255.224&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;BR /&gt;protocol-object ip&lt;BR /&gt;protocol-object icmp&lt;BR /&gt;access-list Internal standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list NONAT extended permit ip 192.168.1.0 255.255.255.0 192.168.250.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu Manage 1500&lt;BR /&gt;ip local pool pool 10.16.1.1-10.16.1.20 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; nat (inside,outside) source static any any destination static NETWORK_OBJ_10.16.1.0_27 NETWORK_OBJ_10.16.1.0_27 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network Permit_Lan_IP&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.0.0 255.255.255.0 Manage&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; enrollment terminal&lt;BR /&gt;subject-name CN=ciscoasa.null,O=Rush,C=UK&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint1&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=ciscoasa&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint1&lt;BR /&gt;certificate ee55a25c&lt;BR /&gt;308202d4 308201bc a0030201 020204ee 55a25c30 0d06092a 864886f7 0d010105&lt;BR /&gt;0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&lt;BR /&gt;86f70d01 09021608 63697363 6f617361 301e170d 31393034 30313138 32343239&lt;BR /&gt;5a170d32 39303332 39313832 3432395a 302c3111 300f0603 55040313 08636973&lt;BR /&gt;636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613082&lt;BR /&gt;0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282 010100b4&lt;BR /&gt;9289c4f5 0cdc8bf1 9bce3aaa 11498b72 b603f9b9 e58a1b38 e795a300 66fd99eb&lt;BR /&gt;e183a2ac 81e998d8 fd7c0333 2cd4108b 0a5ab89d e5f4a87f 827a9185 bdf689b9&lt;BR /&gt;25d877d7 35f01aae 684c58d8 cf5d8cab 9bf98a8c 9788d522 18a5b3cc 857bf695&lt;BR /&gt;103eaff8 7f022b19 4377d1e8 855734ca 994e6500 73dbd67a a6a70688 8897d18d&lt;BR /&gt;0481b05b ff67f992 37e8cdb4 86da7e16 893e640e bfafb6ef 93918986 baa2e60c&lt;BR /&gt;bb5120c6 e403e47b 0c78927f c25d1826 63c1c82c e7104d9e 13ae1b11 05c9b360&lt;BR /&gt;d20bb25b ea4a8652 b14b7590 13394b47 778c43e7 40ac5c2a 67e3a5a4 f3fd2a2b&lt;BR /&gt;d4614101 2c3c24a6 ae5c0084 b7b564c4 56d1ef53 eb59a718 57f6743f 3e298702&lt;BR /&gt;03010001 300d0609 2a864886 f70d0101 05050003 82010100 982d21e7 18e535ce&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; 8b8295e5 4e99269a a8451268 dec0dbfc 7f1b5198 4af8c293 85633883 2dd03a5e&lt;BR /&gt;9b9fe2aa 9c455788 de135890 6f1b9f9c 103aa30a b998c1eb 046c3ff5 85be6a6e&lt;BR /&gt;5288a75a d08062d9 f4e2df2e 352d773f db4a7e57 6ca18e5f 88ccc522 1a435528&lt;BR /&gt;6bafc001 ffc78294 f6e49bc1 218d697c 87e8006c 25bb1ccc 76b2df87 da3f7aac&lt;BR /&gt;9d378d75 769e0760 43532a92 d7f7f0af b64f2c94 27a3c4d8 74d8181d 089c7c66&lt;BR /&gt;cb8b9435 0040b8f5 e6a899f4 e1b4176e 769add02 5a7a74d3 b6ed422b c2d03ce3&lt;BR /&gt;0b0aaa54 b90bd778 8b75c69c 50c58897 cb8bceac 04c50b16 cd5ec6e2 d7ddd99b&lt;BR /&gt;b9328ab8 bcc5b1c6 720496b1 9da321d3 8fb5b6ad 9f29ac0e&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint1&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; crypto ikev1 policy 60&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; crypto ikev1 policy 100&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd dns 4.2.2.2&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.10-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; ssl trust-point ASDM_TrustPoint1 outside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-3.1.06079-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macosx-i386-2.5.2014-k9.pkg 2&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.4.01054-webdeploy-k9.pkg 3&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.4.01054-webdeploy-k9.pkg 4&lt;BR /&gt;anyconnect profiles Home_client_profile disk0:/Home_client_profile.xml&lt;BR /&gt;anyconnect profiles Rush_client_profile disk0:/Rush_client_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;split-tunnel-network-list value NONAT&lt;BR /&gt;group-policy GroupPolicy_Home internal&lt;BR /&gt;group-policy GroupPolicy_Home attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 8.8.8.8&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value Internal&lt;BR /&gt;default-domain none&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value Home_client_profile type user&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; username Rush password wtb6igjZWtCLWRft encrypted&lt;BR /&gt;username Rushmach password VRA13ZzEzDp8PnFO encrypted&lt;BR /&gt;tunnel-group Home type remote-access&lt;BR /&gt;tunnel-group Home general-attributes&lt;BR /&gt;address-pool pool&lt;BR /&gt;default-group-policy GroupPolicy_Home&lt;BR /&gt;tunnel-group Home webvpn-attributes&lt;BR /&gt;group-alias Home enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect ip-options&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; inspect netbios&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;profile CiscoTAC-1&lt;BR /&gt;no active&lt;BR /&gt;destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank" rel="noopener"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;destination address email callhome@cisco.com&lt;BR /&gt;destination transport-method http&lt;BR /&gt;subscribe-to-alert-group diagnostic&lt;BR /&gt;subscribe-to-alert-group environment&lt;BR /&gt;subscribe-to-alert-group inventory periodic monthly 26&lt;BR /&gt;subscribe-to-alert-group configuration periodic monthly 26&lt;BR /&gt;&amp;lt;--- More ---&amp;gt; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:6b09bd746e4908adff634726c98d8b94&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 12:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832233#M26605</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-04T12:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832286#M26606</link>
      <description>When you connect can you run the following command on the ASA -&lt;BR /&gt;show vpn-sessiondb anyconnect&lt;BR /&gt;&lt;BR /&gt;Did you say you can ping the Inside GW from the anyconnect client?</description>
      <pubDate>Thu, 04 Apr 2019 13:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832286#M26606</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-04T13:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832317#M26607</link>
      <description>&lt;P&gt;Username : Rush Index : 35&lt;BR /&gt;Assigned IP : 10.16.1.1 Public IP : 196.33.234.23&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel&lt;BR /&gt;License : AnyConnect Essentials&lt;BR /&gt;Encryption : AES128 Hashing : none SHA1&lt;BR /&gt;Bytes Tx : 10780 Bytes Rx : 5679&lt;BR /&gt;Group Policy : GroupPolicy_Home Tunnel Group : Home&lt;BR /&gt;Login Time : 14:09:38 UTC Thu Apr 4 2019&lt;BR /&gt;Duration : 0h:01m:26s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;NAC Result : Unknown&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's the result and yes I can ping the inside GW from the client&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 13:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832317#M26607</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-04T13:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832353#M26608</link>
      <description>&lt;P&gt;Is the ASA the GW for the Inside traffic or is there another layer 3 device in between? Do your inside hosts know how to get back to the VPN Subnet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How are you testing connectivity between the Anyconnect client and your inside network? Just ICMP?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832353#M26608</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-04T14:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832357#M26609</link>
      <description>&lt;P&gt;Hi Yes one port is configured to be the GW inside interface on the ASA and no other layer3 devices just an unmanaged SW to go to my inside network server/PC ( which iam trying to get to -192.168.1.11)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I am just trying to ping the GW from the AnyConnect client and that is successful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Do your inside hosts know how to get back to the VPN Subnet?&amp;nbsp; --&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;I don't think so .. should I create a NAT rule for that?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;thanks a lot for you input so far &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 14:53:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832357#M26609</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-04T14:53:05Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832377#M26610</link>
      <description>Try adding the following on the FW under the global policy, currently you are not inspecting ICMP;&lt;BR /&gt;&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp</description>
      <pubDate>Thu, 04 Apr 2019 15:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832377#M26610</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-04T15:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832493#M26611</link>
      <description>That did not help I’m afraid &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 04 Apr 2019 18:07:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832493#M26611</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-04T18:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832506#M26612</link>
      <description>Are you sure the server is not receiving the icmp and just not replying / dropping it? I would run Wireshark on the server and test your pings to it. See if they reach the server.&lt;BR /&gt;You can also run the embedded packet-tracer command on firewall to mimic traffic from anyconnect client to the server. I would check server first as if you can ping the GW I'd expect you be able to hit anything behind it.</description>
      <pubDate>Thu, 04 Apr 2019 18:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832506#M26612</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2019-04-04T18:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN - Cannot ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832764#M26613</link>
      <description>&lt;P&gt;Hi Grant , late last night I added Access rule outside access in , ip,icmp service and re configured the VPN from scratch and its all working now … Really appreciate your time and it definitely helped me troubleshoot thanks a lot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Apr 2019 07:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-cannot-ping-internal-network/m-p/3832764#M26613</guid>
      <dc:creator>machine23</dc:creator>
      <dc:date>2019-04-05T07:19:08Z</dc:date>
    </item>
  </channel>
</rss>

