<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Your NAT statements overlap in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479484#M267547</link>
    <description>&lt;P&gt;Your NAT statements overlap with each other.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;nat (inside,any) source static obj-172.16.0.0-nonat obj-172.16.0.0-nonat destination static obj-192.168.0.0-nonat obj-192.168.0.0-nonat no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;nat (inside,outside) source static inside-subnet-source inside-subnet-source destination static NETWORK_OBJ_192.168.210.224_27 NETWORK_OBJ_192.168.210.224_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;change&amp;nbsp;&lt;STRONG&gt;any&lt;/STRONG&gt;&amp;nbsp;on your NAT statements to a more specific interface, in this case it should be&amp;nbsp;&lt;STRONG&gt;outside&amp;nbsp;&lt;/STRONG&gt;and add the route-lookup on it. Then remove the bottom NAT statement as you don't need it because the top NAT statement is doing the same thing.&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;please post the output of&amp;nbsp;&lt;STRONG&gt;show run nat, show nat, show access-list &lt;/STRONG&gt;and&lt;STRONG&gt; show ipsec sa&amp;nbsp;&lt;/STRONG&gt;commands if above steps hasn't solved your issue.&lt;/P&gt;</description>
    <pubDate>Wed, 16 Apr 2014 10:09:58 GMT</pubDate>
    <dc:creator>Rudy Sanjoko</dc:creator>
    <dc:date>2014-04-16T10:09:58Z</dc:date>
    <item>
      <title>VPN Connection Problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479475#M267536</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The user can login with their valid AD account. The remote laptop receives a correct IP address from the ASA IP DHCP pool (192.168.210.231-192.168.210.250). However, the remote laptop CANNOT communicate with other internal networks (i.e.: PING).&amp;nbsp;The remote laptop CAN PING the VPN interface (outside) of the ASA.&amp;nbsp;There is a VPN remote connection established (IKEv1) when logging into the ASA (see codes below).&lt;/P&gt;&lt;P&gt;Note: The ASA configuration code is attached &amp;nbsp;(Most of the configuration codes were configured with ADSM). I will really appreciate if any one could please have a look at it and let me know what I am doing wrong.&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 200.190.70.66 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.210.224_27&lt;/P&gt;&lt;P&gt;subnet 192.168.210.224 255.255.255.224&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list SYSTEM_DEFAULT_CRYPTO_MAP extended permit ip any object NETWORK_OBJ_192.168.210.224_27&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-subnet-source inside-subnet-source destination static NETWORK_OBJ_192.168.210.224_27 NETWORK_OBJ_192.168.210.224_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside 192.168.210.224 255.255.255.224 200.190.70.65 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.16.5.31 172.16.5.32&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value splittunnel&lt;/P&gt;&lt;P&gt;default-domain value zzzzzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;username user1 password zzzzzz encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool remote-vpn-pool&lt;/P&gt;&lt;P&gt;default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt;no authentication chap&lt;/P&gt;&lt;P&gt;authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:04:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479475#M267536</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2019-03-12T04:04:40Z</dc:date>
    </item>
    <item>
      <title>Hi, is ping the only thing</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479476#M267537</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi, is ping the only thing that is not working? if you can, post/attach the whole config here.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;If it's only ping that is not working then couple things to check are:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;- if you have enabled&lt;STRONG&gt; inspect icmp &lt;/STRONG&gt;command&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;- if you have configured&amp;nbsp;&lt;STRONG&gt;management-access inside&lt;/STRONG&gt; command&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Apr 2014 08:47:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479476#M267537</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-15T08:47:12Z</dc:date>
    </item>
    <item>
      <title>Hi Rudy,Thanks for your reply</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479477#M267538</link>
      <description>&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;Thanks for your reply but I already have these commands in my ASA and it is still the same. I cannot ping the inside interface of ASA 5525 while connected to vpn and cannot ping from inside network to connected vpn. Any suggestion would be really appreciated.&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 02:45:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479477#M267538</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2014-04-16T02:45:42Z</dc:date>
    </item>
    <item>
      <title>Hi, so is ping the only thing</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479478#M267539</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;Hi, so is ping the only thing that is not working? are others protocol work fine? try checking the ACL, make sure that the VPN pool ip address are allowed to access the inside network.&amp;nbsp;&lt;SPAN style="background-color: rgb(247, 247, 247);"&gt;If you can, post/attach the whole config here.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 07:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479478#M267539</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T07:26:35Z</dc:date>
    </item>
    <item>
      <title>Hi Rudy,Thanks for you reply.</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479479#M267540</link>
      <description>&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;Thanks for you reply. I can not access internal network at all. Please see the attached code below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;speed 1000&lt;/P&gt;&lt;P&gt;duplex full&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 200.190.70.66 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.210.224_27&lt;/P&gt;&lt;P&gt;subnet 192.168.210.224 255.255.255.224&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list SYSTEM_DEFAULT_CRYPTO_MAP extended permit ip any object NETWORK_OBJ_192.168.210.224_27&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-subnet-source inside-subnet-source destination static NETWORK_OBJ_192.168.210.224_27 NETWORK_OBJ_192.168.210.224_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route outside 192.168.210.224 255.255.255.224 200.190.70.65 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.16.5.31 172.16.5.32&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value splittunnel&lt;/P&gt;&lt;P&gt;default-domain value zzzzzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;username user1 password zzzzzz encrypted&lt;/P&gt;&lt;P&gt;username user1 attributes&lt;/P&gt;&lt;P&gt;vpn-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool remote-vpn-pool&lt;/P&gt;&lt;P&gt;default-group-policy DefaultRAGroup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt;no authentication chap&lt;/P&gt;&lt;P&gt;authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Rohit&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 07:52:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479479#M267540</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2014-04-16T07:52:32Z</dc:date>
    </item>
    <item>
      <title>What's your LAN network</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479480#M267541</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size:14px;"&gt;What's your LAN network address? is it one of these,&amp;nbsp;172.16.0.0 255.255.0.0 /&amp;nbsp;192.168.1.0 255.255.255.0? If not one of those, you will need to modify your split tunnel ACL.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 08:30:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479480#M267541</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T08:30:57Z</dc:date>
    </item>
    <item>
      <title>Hi Rudy,The LAN network</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479481#M267542</link>
      <description>&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;The LAN network Address is 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;192.168.1.0 / 24 -- DMZ&lt;/P&gt;&lt;P&gt;192.168.210.224 /27 -- VPN client address&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Rohit&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 08:38:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479481#M267542</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2014-04-16T08:38:00Z</dc:date>
    </item>
    <item>
      <title>post your config.</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479482#M267543</link>
      <description>&lt;P&gt;post your config.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 08:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479482#M267543</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T08:47:26Z</dc:date>
    </item>
    <item>
      <title>Hi Rudy,Please see the</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479483#M267545</link>
      <description>&lt;P&gt;Hi Rudy,&lt;/P&gt;&lt;P&gt;Please see the complete configuration of ASA.&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 200.190.70.66 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.3.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;speed 1000&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif dmz&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.1.254 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/6&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/7&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 10.1.95.11 255.255.255.0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/0&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name zzzzzz&lt;BR /&gt;object network obj-172.16.0.0-nonat&lt;BR /&gt;&amp;nbsp;subnet 172.16.0.0 255.255.0.0&lt;BR /&gt;object network obj-192.168.1.0-nonat&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.0.0-nonat&lt;BR /&gt;&amp;nbsp;subnet 192.168.0.0 255.255.0.0&lt;BR /&gt;object network obj-192.168.1.0-nonatdmz&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.201.0-nonatdmz&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network obj-172.16.0.0-nonatdmz&lt;BR /&gt;&amp;nbsp;subnet 172.16.0.0 255.255.0.0&lt;BR /&gt;object network obj-192.168.1.0-dmz-vpn_private&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.210.224_27&lt;BR /&gt;&amp;nbsp;subnet 192.168.210.224 255.255.255.224&lt;BR /&gt;object network internal-radius&lt;BR /&gt;&amp;nbsp;host 172.16.5.67&lt;BR /&gt;object-group network inside-subnet-source&lt;BR /&gt;&amp;nbsp;network-object 172.16.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.2.0 255.255.255.252&lt;BR /&gt;&amp;nbsp;network-object 172.16.3.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.5.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.11.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.13.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.21.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.23.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.31.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.35.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.40.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.109.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.118.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.128.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.129.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.130.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.131.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.132.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.192.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.193.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.194.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.195.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.196.0 255.255.255.0&lt;BR /&gt;object-group network dmz-subnet-source&lt;BR /&gt;&amp;nbsp;network-object 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list o_inside extended permit ah any any&lt;BR /&gt;access-list o_inside extended permit esp any any&lt;BR /&gt;access-list o_inside extended permit icmp any any&lt;BR /&gt;access-list o_inside extended permit icmp any any echo&lt;BR /&gt;access-list o_inside extended permit tcp any any eq imap4&lt;BR /&gt;access-list o_inside extended permit udp any any eq 143&lt;/P&gt;&lt;P&gt;***access-list o_inside extended permit tcp/udp SPECIFIC inside network/pc device to access host in DMZ network (none related to VPN)&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any echo-reply&lt;BR /&gt;access-list outside extended permit icmp any any&lt;/P&gt;&lt;P&gt;***access-list outside extended permit tcp/udp SPECIFIC from outside network/pc device to access host in DMZ/inside network (none related to VPN)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list o_dmz extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;***access-list o_dmz extended permit tcp/udp SPECIFIC from dmz network/pc device to access host in inside network (none related to VPN)&lt;/P&gt;&lt;P&gt;access-list splittunnel standard permit 172.16.0.0 255.255.0.0&lt;BR /&gt;access-list splittunnel standard permit 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SYSTEM_DEFAULT_CRYPTO_MAP extended permit ip any object NETWORK_OBJ_192.168.210.224_27&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 1048576&lt;BR /&gt;logging buffered debugging&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;ip local pool remote-vpn-pool 192.168.210.231-192.168.210.250 mask 255.255.255.224&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;icmp permit any vpn_private&lt;BR /&gt;icmp permit any vpn_public&lt;BR /&gt;icmp permit any optusapn_temp&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,any) source static obj-172.16.0.0-nonat obj-172.16.0.0-nonat destination static obj-192.168.1.0-nonat obj-192.168.1.0-nonat no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-172.16.0.0-nonat obj-172.16.0.0-nonat destination static obj-192.168.0.0-nonat obj-192.168.0.0-nonat no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.0.0-nonat obj-192.168.0.0-nonat destination static obj-192.168.0.0-nonat obj-192.168.0.0-nonat no-proxy-arp&lt;BR /&gt;nat (inside,any) source static obj-192.168.0.0-nonat obj-192.168.0.0-nonat destination static obj-192.168.1.0-nonat obj-192.168.1.0-nonat no-proxy-arp&lt;BR /&gt;nat (dmz,any) source static obj-192.168.1.0-nonatdmz obj-192.168.1.0-nonatdmz destination static obj-172.16.0.0-nonatdmz obj-172.16.0.0-nonatdmz no-proxy-arp&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-subnet-source inside-subnet-source destination static NETWORK_OBJ_192.168.210.224_27 NETWORK_OBJ_192.168.210.224_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;nat (inside,outside) after-auto source dynamic inside-subnet-source outside-host-global&lt;BR /&gt;nat (inside,dmz) after-auto source dynamic inside-subnet-source dmz-host-global&lt;BR /&gt;nat (dmz,outside) after-auto source dynamic dmz-subnet-source outside-host-global&lt;BR /&gt;access-group outside in interface outside&lt;BR /&gt;access-group o_inside in interface inside&lt;BR /&gt;access-group o_dmz in interface dmz&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 200.190.70.65 1&lt;BR /&gt;route inside 172.16.0.0 255.255.0.0 172.16.3.1 1&lt;BR /&gt;route inside 172.20.1.0 255.255.255.0 172.16.3.1 1&lt;BR /&gt;route inside 172.30.1.0 255.255.255.0 172.16.3.1 1&lt;BR /&gt;route inside 192.168.0.0 255.255.0.0 172.16.3.1 1&lt;BR /&gt;route outside 192.168.210.0 255.255.255.224 200.190.70.65 1&lt;BR /&gt;route outside 192.168.210.32 255.255.255.224 200.190.70.65 1&lt;BR /&gt;route outside 192.168.210.64 255.255.255.224 200.190.70.65 1&lt;BR /&gt;route outside 192.168.210.96 255.255.255.224 200.190.70.65 1&lt;BR /&gt;route outside 192.168.210.128 255.255.255.224 200.190.70.65 1&lt;BR /&gt;route outside 192.168.210.224 255.255.255.224 200.190.70.65 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server internal-radius protocol radius&lt;BR /&gt;aaa-server internal-radius (inside) host 172.16.5.67&lt;BR /&gt;&amp;nbsp;key zzzzzz&lt;BR /&gt;&amp;nbsp;radius-common-pw zzzzzz&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 172.16.0.0 255.255.0.0 inside&lt;BR /&gt;http 172.16.0.0 255.255.0.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map ASA-VPN-SITE interface outside&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;BR /&gt;&amp;nbsp;encryption aes-256 aes-192 aes&lt;BR /&gt;&amp;nbsp;integrity sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;prf sha&lt;BR /&gt;&amp;nbsp;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;encryption 3des&lt;BR /&gt;&amp;nbsp;hash sha&lt;BR /&gt;&amp;nbsp;group 2&lt;BR /&gt;&amp;nbsp;lifetime 86400&lt;BR /&gt;telnet 172.16.1.0 255.255.255.0 inside&lt;BR /&gt;telnet 172.16.3.0 255.255.255.0 inside&lt;BR /&gt;telnet 172.16.0.0 255.255.0.0 management&lt;BR /&gt;telnet timeout 20&lt;BR /&gt;ssh 172.16.0.0 255.255.0.0 inside&lt;BR /&gt;ssh 172.16.3.0 255.255.255.0 inside&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 management&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 30&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ntp server 172.16.3.1&lt;BR /&gt;webvpn&lt;BR /&gt;&amp;nbsp;enable outside&lt;BR /&gt;&amp;nbsp;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;BR /&gt;&amp;nbsp;anyconnect enable&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt;&amp;nbsp;dns-server value 172.16.5.31 172.16.5.32&lt;BR /&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;BR /&gt;&amp;nbsp;split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;split-tunnel-network-list value splittunnel&lt;BR /&gt;&amp;nbsp;default-domain value ZZZZZZ&lt;/P&gt;&lt;P&gt;username user1 password zzzzzz encrypted&lt;BR /&gt;username user1 attributes&lt;BR /&gt;vpn-group-policy DefaultRAGroup&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt;&amp;nbsp;address-pool remote-vpn-pool&lt;BR /&gt;&amp;nbsp;default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt;&amp;nbsp;ikev1 pre-shared-key ZZZZZZ&lt;BR /&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;BR /&gt;&amp;nbsp;no authentication chap&lt;BR /&gt;&amp;nbsp;authentication ms-chap-v2&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;call-home&lt;BR /&gt;&amp;nbsp;profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&amp;nbsp; destination address http &lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination address email callhome@cisco.com&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly 7&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:a225df4d313cd95bb3662bd3d70733fe&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Rohit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 09:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479483#M267545</guid>
      <dc:creator>Rohit Mangotra</dc:creator>
      <dc:date>2014-04-16T09:37:49Z</dc:date>
    </item>
    <item>
      <title>Your NAT statements overlap</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479484#M267547</link>
      <description>&lt;P&gt;Your NAT statements overlap with each other.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;nat (inside,any) source static obj-172.16.0.0-nonat obj-172.16.0.0-nonat destination static obj-192.168.0.0-nonat obj-192.168.0.0-nonat no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;nat (inside,outside) source static inside-subnet-source inside-subnet-source destination static NETWORK_OBJ_192.168.210.224_27 NETWORK_OBJ_192.168.210.224_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;change&amp;nbsp;&lt;STRONG&gt;any&lt;/STRONG&gt;&amp;nbsp;on your NAT statements to a more specific interface, in this case it should be&amp;nbsp;&lt;STRONG&gt;outside&amp;nbsp;&lt;/STRONG&gt;and add the route-lookup on it. Then remove the bottom NAT statement as you don't need it because the top NAT statement is doing the same thing.&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;please post the output of&amp;nbsp;&lt;STRONG&gt;show run nat, show nat, show access-list &lt;/STRONG&gt;and&lt;STRONG&gt; show ipsec sa&amp;nbsp;&lt;/STRONG&gt;commands if above steps hasn't solved your issue.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 10:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection-problem/m-p/2479484#M267547</guid>
      <dc:creator>Rudy Sanjoko</dc:creator>
      <dc:date>2014-04-16T10:09:58Z</dc:date>
    </item>
  </channel>
</rss>

