<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SSL Anyconnect client can't ping internal network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411941#M270545</link>
    <description>&lt;P&gt;I can authenticate through anyconnect and grab the ip address that I set in the vpn pool but I cannot ping any internal host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal is 192.168.2.0&lt;/P&gt;&lt;P&gt;VPN network is 192.168.5.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked at the asa log viewer and it says &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetic NAT rules matched for forward and reverse flows; connection for udp src outside: 192.168.5.0/137 denied to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing my nat exempt rule has to be incorrect or something.&amp;nbsp; I'm all out of ideas I could use some help.&amp;nbsp; To be safe I created a vlan for the vpn network on the connected 3750 switch and a subinterface on the default gateway which is a 2811 router to allow intervlan communication.&amp;nbsp; I also configured a route from the asa to the 2811 router but still nothing.&amp;nbsp; Honestly I'm not even sure if I was even required to do the steps I just mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the ASA configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name work.local&lt;/P&gt;&lt;P&gt;enable password qs4KxKxaDPGaY6hx encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.2.0 INSIDE&lt;/P&gt;&lt;P&gt;name 192.168.5.0 VPN-NETWORK&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.251 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 30.20.30.40 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip INSIDE 255.255.255.0 VPN-NETWORK 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list SPLIT-TUNNEL standard permit VPN-NETWORK 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-POOL 192.168.5.50-192.168.5.55 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 30.20.30.1&lt;/P&gt;&lt;P&gt;route inside 10.10.10.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside VPN-NETWORK 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http INSIDE 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; fqdn sslvpn.work.com&lt;/P&gt;&lt;P&gt; subject-name CN=sslvpn.workl.com&lt;/P&gt;&lt;P&gt; keypair sslvpnkey&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca server &lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust&lt;/P&gt;&lt;P&gt; certificate 9712ed51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201f3 3082015c a0030201 02020497 12ed5130 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500303e 311a3018 06035504 03131173 736c7670 6e2e7061 6e61746c 2e636f6d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3120301e 06092a86 4886f70d 01090216 1173736c 76706e2e 70616e61 746c2e63 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6f6d301e 170d3133 31303130 30383139 32365a17 0d323331 30303830 38313932 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 365a303e 311a3018 06035504 03131173 736c7670 6e2e7061 6e61746c 2e636f6d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3120301e 06092a86 4886f70d 01090216 1173736c 76706e2e 70616e61 746c2e63 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100a7 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ac561300 66c0bd79 bf50bbfe a654f45b 0241d3d7 dbe84150 c5f0c273 2eb79abc &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02a5309b 5f70be68 a9f81a43 28782c9c af71593d b6d973aa e9b9de8c 1cac25d8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; eeca6ddd 786c2794 a0e6657c 0f91c9ed 5ea4688d 669a7f9e 9b4d901a d0d9ec05 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b083cf50 0697939a 04252125 88fc0e35 470d30f1 bfa1dc5e 57bfc4b2 53a5d702 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03010001 300d0609 2a864886 f70d0101 05050003 8181000e e6d713aa bf5aa97e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 37c41539 613e3da6 8137b741 bf17816b 1de80c1d 553dd639 e411bf5c ffe727f2 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aa082f91 f0fed21b 9521c2ac 4f830ce3 6da0d6f6 8142c83f 1ed5b3f8 6c0cd703 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9138249c eddd180a bbb145bc 8019dff6 4e3d9d37 3b15a67e 72635365 dd0a898d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 795ccef2 f582eecd ceb9329a d0c8dcc6 1ea57a0d 0cc231&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; certificate ca 01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820219 30820182 a0030201 02020101 300d0609 2a864886 f70d0101 05050030 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20311e30 1c060355 04031315 63697363 6f617361 2e70616e 61746c2e 6c6f6361 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c301e17 0d313430 31323730 39323635 315a170d 31373031 32363039 32363531 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a302031 1e301c06 03550403 13156369 73636f61 73612e70 616e6174 6c2e6c6f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63616c30 819f300d 06092a86 4886f70d 01010105 0003818d 00308189 02818100 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e7a4eac6 cebe5985 10041101 99a8d4ed 4daa9982 8a25e005 f9ed5217 ace5178e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 231ff9be 8e6b1ce1 b943f988 17e5a38c 6ef729ba a02aa908 654df078 b8c20b69 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7e4b0f62 685a4898 92142bb1 8ce14c3c 756245de c5004e6d 936b3000 da652594 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2d004480 610c265d f389bbe0 f3ea0b9e 78c17bc0 6cbdc7f1 dc46e378 f99d4ed9 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02030100 01a36330 61300f06 03551d13 0101ff04 05300301 01ff300e 0603551d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0f0101ff 04040302 0186301f 0603551d 23041830 1680141d f0130d73 2edbdb98 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 811209c2 56d25f7a 5c430430 1d060355 1d0e0416 04141df0 130d732e dbdb9881 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1209c256 d25f7a5c 4304300d 06092a86 4886f70d 01010505 00038181 00dfdf3c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9ddc14d2 c628024d 12e7564c ad39a3d2 74ecab60 0b7f359d cdbb95a1 888d6c8d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7b756d05 42ccd2d0 9cd48530 87dd5d45 39bb9f7d 1e389760 efc41051 4b9922dd &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b533d69f 24267b29 ee62bce7 53e36813 c9bc59c6 dd86cd52 d66963ae 7f91d3d8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2b3dbbbb 364cda0c ed680947 7e149a27 fb7513fe 1b897f9a 53f42019 86&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet INSIDE 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address INSIDE 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address VPN-NETWORK 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; port 52100&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-3.1.04066-k9_3.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 209.244.0.3 209.244.0.4&lt;/P&gt;&lt;P&gt; default-domain value work.local&lt;/P&gt;&lt;P&gt;group-policy AnyC_vpn_users internal&lt;/P&gt;&lt;P&gt;group-policy AnyC_vpn_users attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.2.250&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; default-domain value work.local&lt;/P&gt;&lt;P&gt; address-pools value VPN-POOL&lt;/P&gt;&lt;P&gt;username Admin password 50kW205ESdwCv6Hv encrypted privilege 15&lt;/P&gt;&lt;P&gt;username User013 password LoQiMJe/l0JC8MX1 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-POOL&lt;/P&gt;&lt;P&gt; default-group-policy AnyC_vpn_users&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias AnyC-Test-VPN enable&lt;/P&gt;&lt;P&gt;tunnel-group telecommuters type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group telecommuters webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias vpn_department enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:f4089ec09306af333efd0ac46206c85c&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:38:40 GMT</pubDate>
    <dc:creator>sam saeed</dc:creator>
    <dc:date>2019-03-12T03:38:40Z</dc:date>
    <item>
      <title>SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411941#M270545</link>
      <description>&lt;P&gt;I can authenticate through anyconnect and grab the ip address that I set in the vpn pool but I cannot ping any internal host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internal is 192.168.2.0&lt;/P&gt;&lt;P&gt;VPN network is 192.168.5.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked at the asa log viewer and it says &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetic NAT rules matched for forward and reverse flows; connection for udp src outside: 192.168.5.0/137 denied to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm guessing my nat exempt rule has to be incorrect or something.&amp;nbsp; I'm all out of ideas I could use some help.&amp;nbsp; To be safe I created a vlan for the vpn network on the connected 3750 switch and a subinterface on the default gateway which is a 2811 router to allow intervlan communication.&amp;nbsp; I also configured a route from the asa to the 2811 router but still nothing.&amp;nbsp; Honestly I'm not even sure if I was even required to do the steps I just mentioned.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the ASA configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name work.local&lt;/P&gt;&lt;P&gt;enable password qs4KxKxaDPGaY6hx encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.2.0 INSIDE&lt;/P&gt;&lt;P&gt;name 192.168.5.0 VPN-NETWORK&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description LAN&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.2.251 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description WAN&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 30.20.30.40 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 extended permit icmp any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip INSIDE 255.255.255.0 VPN-NETWORK 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list SPLIT-TUNNEL standard permit VPN-NETWORK 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-POOL 192.168.5.50-192.168.5.55 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 100 in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 30.20.30.1&lt;/P&gt;&lt;P&gt;route inside 10.10.10.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.3.0 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;route inside VPN-NETWORK 255.255.255.0 192.168.2.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;http INSIDE 255.255.255.0 inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; fqdn sslvpn.work.com&lt;/P&gt;&lt;P&gt; subject-name CN=sslvpn.workl.com&lt;/P&gt;&lt;P&gt; keypair sslvpnkey&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca server &lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust&lt;/P&gt;&lt;P&gt; certificate 9712ed51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308201f3 3082015c a0030201 02020497 12ed5130 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0500303e 311a3018 06035504 03131173 736c7670 6e2e7061 6e61746c 2e636f6d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3120301e 06092a86 4886f70d 01090216 1173736c 76706e2e 70616e61 746c2e63 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6f6d301e 170d3133 31303130 30383139 32365a17 0d323331 30303830 38313932 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 365a303e 311a3018 06035504 03131173 736c7670 6e2e7061 6e61746c 2e636f6d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3120301e 06092a86 4886f70d 01090216 1173736c 76706e2e 70616e61 746c2e63 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 818100a7 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ac561300 66c0bd79 bf50bbfe a654f45b 0241d3d7 dbe84150 c5f0c273 2eb79abc &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02a5309b 5f70be68 a9f81a43 28782c9c af71593d b6d973aa e9b9de8c 1cac25d8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; eeca6ddd 786c2794 a0e6657c 0f91c9ed 5ea4688d 669a7f9e 9b4d901a d0d9ec05 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b083cf50 0697939a 04252125 88fc0e35 470d30f1 bfa1dc5e 57bfc4b2 53a5d702 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03010001 300d0609 2a864886 f70d0101 05050003 8181000e e6d713aa bf5aa97e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 37c41539 613e3da6 8137b741 bf17816b 1de80c1d 553dd639 e411bf5c ffe727f2 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aa082f91 f0fed21b 9521c2ac 4f830ce3 6da0d6f6 8142c83f 1ed5b3f8 6c0cd703 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9138249c eddd180a bbb145bc 8019dff6 4e3d9d37 3b15a67e 72635365 dd0a898d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 795ccef2 f582eecd ceb9329a d0c8dcc6 1ea57a0d 0cc231&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; certificate ca 01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820219 30820182 a0030201 02020101 300d0609 2a864886 f70d0101 05050030 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20311e30 1c060355 04031315 63697363 6f617361 2e70616e 61746c2e 6c6f6361 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6c301e17 0d313430 31323730 39323635 315a170d 31373031 32363039 32363531 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a302031 1e301c06 03550403 13156369 73636f61 73612e70 616e6174 6c2e6c6f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63616c30 819f300d 06092a86 4886f70d 01010105 0003818d 00308189 02818100 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e7a4eac6 cebe5985 10041101 99a8d4ed 4daa9982 8a25e005 f9ed5217 ace5178e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 231ff9be 8e6b1ce1 b943f988 17e5a38c 6ef729ba a02aa908 654df078 b8c20b69 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7e4b0f62 685a4898 92142bb1 8ce14c3c 756245de c5004e6d 936b3000 da652594 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2d004480 610c265d f389bbe0 f3ea0b9e 78c17bc0 6cbdc7f1 dc46e378 f99d4ed9 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 02030100 01a36330 61300f06 03551d13 0101ff04 05300301 01ff300e 0603551d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0f0101ff 04040302 0186301f 0603551d 23041830 1680141d f0130d73 2edbdb98 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 811209c2 56d25f7a 5c430430 1d060355 1d0e0416 04141df0 130d732e dbdb9881 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1209c256 d25f7a5c 4304300d 06092a86 4886f70d 01010505 00038181 00dfdf3c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9ddc14d2 c628024d 12e7564c ad39a3d2 74ecab60 0b7f359d cdbb95a1 888d6c8d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7b756d05 42ccd2d0 9cd48530 87dd5d45 39bb9f7d 1e389760 efc41051 4b9922dd &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b533d69f 24267b29 ee62bce7 53e36813 c9bc59c6 dd86cd52 d66963ae 7f91d3d8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2b3dbbbb 364cda0c ed680947 7e149a27 fb7513fe 1b897f9a 53f42019 86&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet INSIDE 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address INSIDE 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address VPN-NETWORK 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; port 52100&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-3.1.04066-k9_3.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 209.244.0.3 209.244.0.4&lt;/P&gt;&lt;P&gt; default-domain value work.local&lt;/P&gt;&lt;P&gt;group-policy AnyC_vpn_users internal&lt;/P&gt;&lt;P&gt;group-policy AnyC_vpn_users attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.2.250&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; default-domain value work.local&lt;/P&gt;&lt;P&gt; address-pools value VPN-POOL&lt;/P&gt;&lt;P&gt;username Admin password 50kW205ESdwCv6Hv encrypted privilege 15&lt;/P&gt;&lt;P&gt;username User013 password LoQiMJe/l0JC8MX1 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-POOL&lt;/P&gt;&lt;P&gt; default-group-policy AnyC_vpn_users&lt;/P&gt;&lt;P&gt;tunnel-group AnyC-Test-VPN webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias AnyC-Test-VPN enable&lt;/P&gt;&lt;P&gt;tunnel-group telecommuters type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group telecommuters webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias vpn_department enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" rel="nofollow" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:f4089ec09306af333efd0ac46206c85c&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411941#M270545</guid>
      <dc:creator>sam saeed</dc:creator>
      <dc:date>2019-03-12T03:38:40Z</dc:date>
    </item>
    <item>
      <title>SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411942#M270546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT0 configurations seems to be in order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what you have created in the other devices. If you have configured the VPN Pool network somewhere else in the network I would suggest removing those configurations. Also remove the "route" command for the VPN network from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem with your VPN configuration is the Split Tunnel ACL. You have configured the VPN network in the ACL even though should mention the LAN network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Split Tunnel ACL tells the VPN Client which networks are found through the VPN connection and in this case its naturally the LAN network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do these changes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list SPLIT-TUNNEL standard permit 192.168.2.0 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list SPLIT-TUNNEL standard permit VPN-NETWORK 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And as I said check that you dont have not configured the VPN Pool network in the LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411942#M270546</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-31T16:30:25Z</dc:date>
    </item>
    <item>
      <title>SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411943#M270549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok great it worked!&amp;nbsp; Creating the subinterfaces in the router with the 192.168.5.0 network was killing everything so I removed that and made the changes to the split tunnel.&amp;nbsp; I can ping everything except for the ASA I would like to be able to telnet into the ASA.&amp;nbsp; I can telnet into everything else router/switch wise.&amp;nbsp; What do I need to enable telnet on the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;telnet VPN-NETWORK 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I know if I can't ping it then I probably can't telnet into it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 17:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411943#M270549</guid>
      <dc:creator>sam saeed</dc:creator>
      <dc:date>2014-01-31T17:51:24Z</dc:date>
    </item>
    <item>
      <title>SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411944#M270550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should allow connection to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface through the VPN connection. This is not otherwise allowed since you are connection from behind another interface (other than the destination interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 17:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411944#M270550</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-31T17:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411945#M270557</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cool everything works.&amp;nbsp; Once last thing I have 2 access servers for lab purposes I can't ping those through the vpn.&amp;nbsp; On each one I added the command ip default-gateway 192.168.2.1 --&amp;gt; the 2811 which handles the routing.&amp;nbsp; I checked the real time log viewer and the pings are passing through the firewall.&amp;nbsp; I'm not sure why I can't ping it from the vpn.&amp;nbsp; I can ping internally to those ip addresses just fine.&amp;nbsp; The ip address for the access servers are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.2.152&lt;/P&gt;&lt;P&gt;192.168.2.153&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the configuration for the one the 2nd one is configured the same exact way so no need to paste that one as well.&amp;nbsp; If I can't figure it then I can still telnet into the 2811 and telnet from there into the access server but I'd rather be able to do it directly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAB_AccesServer#sh run&lt;/P&gt;&lt;P&gt;Building configuration...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current configuration:&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.0&lt;/P&gt;&lt;P&gt;service timestamps debug uptime&lt;/P&gt;&lt;P&gt;service timestamps log uptime&lt;/P&gt;&lt;P&gt;no service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname LAB_AccesServer&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;enable password password&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username Dmart014 privilege 15 password 0 asdfeF231$21&lt;/P&gt;&lt;P&gt;ip subnet-zero&lt;/P&gt;&lt;P&gt;ip host r1 2001 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r2 2002 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r3 2003 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r4 2004 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r5 2005 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r6 2006 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r7 2007 2.1.1.1&lt;/P&gt;&lt;P&gt;ip host r8 2008 2.1.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Loopback0&lt;/P&gt;&lt;P&gt; ip address 2.1.1.1 255.0.0.0&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; ip address 192.168.2.153 255.255.255.0&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Serial0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip directed-broadcast&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip default-gateway 192.168.2.1&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; transport preferred telnet&lt;/P&gt;&lt;P&gt; transport input none&lt;/P&gt;&lt;P&gt;line 1 8&lt;/P&gt;&lt;P&gt; session-timeout 35000 &lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt; exec-timeout 0 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; logging synchronous&lt;/P&gt;&lt;P&gt; transport preferred telnet&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; exec-timeout 5041 0&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; login local&lt;/P&gt;&lt;P&gt; transport input telnet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 18:51:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411945#M270557</guid>
      <dc:creator>sam saeed</dc:creator>
      <dc:date>2014-01-31T18:51:21Z</dc:date>
    </item>
    <item>
      <title>SSL Anyconnect client can't ping internal network</title>
      <link>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411946#M270559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Am I supposed to be able to ping anyconnect vpn users from the ASA or internal pc's because I currently can't.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 19:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ssl-anyconnect-client-can-t-ping-internal-network/m-p/2411946#M270559</guid>
      <dc:creator>sam saeed</dc:creator>
      <dc:date>2014-01-31T19:18:49Z</dc:date>
    </item>
  </channel>
</rss>

