<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Forward selected internet traffic to another site in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921629#M30440</link>
    <description>&lt;P&gt;&lt;STRONG&gt;BRANCH SIDE:&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(outside-hk) should look like. (You can always use object/object-group but here i am not using anything to make it clear for you)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 192.167.0.0 255.255.255.0&lt;BR /&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 host 204.11.35.98&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Now i see there are two internet connections. So your NAT should look something like&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR NORMAL INTERNET &lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object-group network OBJ-SHN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ SIDE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CRYPTO ACL&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside-SH&amp;nbsp;extended permit ip 192.167.0.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside-SH&amp;nbsp;extended permit ip host 204.11.35.98 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT CONFIGURATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;REMOAVE THIS: &lt;FONT color="#FF0000"&gt;(Done)&lt;/FONT&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network www.whatsmyip&lt;BR /&gt;nat (outside-isp1,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ALREADY CONFIGURED: &amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp2) dynamic interface&lt;BR /&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION-already in-place&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp1) source static OBJ-HKN OBJ-HKN destination static OBJ-SHN OBJ-SHN no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HAIRPINING NAT&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (outside-isp1,outside-isp1) source dynamic OBJ-SHN interface&lt;BR /&gt;nat (outside-isp2,outside-isp2) source dynamic OBJ-SHN interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=================================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not working. Can't ping to the IP nor hit the address. I must be missing smth else&lt;/P&gt;</description>
    <pubDate>Tue, 10 Sep 2019 09:33:02 GMT</pubDate>
    <dc:creator>dylan.su18@gmail.com</dc:creator>
    <dc:date>2019-09-10T09:33:02Z</dc:date>
    <item>
      <title>Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920083#M30302</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;i am a newbie in ASA so please bear with me,&lt;/P&gt;&lt;P&gt;I have configured a site to site VPN between 2 sites.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A can see Site B resources&lt;/P&gt;&lt;P&gt;Site B can see Site A resources&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i transfer selected internet traffic from Site B to Site A?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using ASDM btw.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920083#M30302</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-06T09:07:35Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920088#M30319</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;the crypto map which has been configured to create the VPN between the two sites will have an associated ACL. Traffic which matches the ACL will be sent via the VPN, if it doesn't it will continue on its way.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to send certain internet traffic via the VPN, assuming the path to the internet goes via the interface with the crypto map applied, then all you need to do is add the required internet host IP/ subnets to the crypto map ACL.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure you also update the crypto map ACL on the other site ASA so that the return traffic will be sent via the VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920088#M30319</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-09-06T09:14:55Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920091#M30334</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the quick response. I have try adding a external public webpage to the cryptomap. However, it doesn't work at all - in other words, the moment i add it into my cryptomap - I could neither ping it or browser the page. Removing it, will work (because it will just use SiteB internet and reach the page).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also added "&lt;STRONG&gt;same-security-traffic permit intra-interface"&amp;nbsp;&lt;/STRONG&gt;into SiteA's ASA.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:23:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920091#M30334</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-06T09:23:47Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920096#M30346</link>
      <description>&lt;P&gt;Have you added the 'reversed' ACL for the traffic flow to SiteA's crypto map?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried a packet capture on SiteA's outside interface to see if the traffic is leaving and returning on the outside interface?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share the configs of the ASAs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:31:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920096#M30346</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2019-09-06T09:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920101#M30363</link>
      <description>&lt;P&gt;Yup, it is checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried on packet tracer is fine both ways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A can throw the public IP to B&lt;/P&gt;&lt;P&gt;Site B can throw the public IP to A&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:41:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920101#M30363</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-06T09:41:40Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920103#M30376</link>
      <description>&lt;P&gt;I think this is to the continues query regarding the INTERNET over the VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you share your configuration so that we can have a clear idea.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you have done the NAT hair-pining for the VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure you are not doing any NAT on the SITE-2 (Branch) ASA and ACLs are properly configured.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Bhaggu&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 09:44:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920103#M30376</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-06T09:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920107#M30387</link>
      <description>&lt;P&gt;&lt;EM&gt;Make sure you are not doing any NAT on the SITE-2 (Branch) ASA and ACLs are properly configured.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;means?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dont' create any NAT between SiteB to SiteA?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What kind of ACLs are needed?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I noticed i have no issue sending traffic from Site B to Site A but there is no return traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Site A on the other hand shows nothing received.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 10:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920107#M30387</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-06T10:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920112#M30397</link>
      <description>&lt;P&gt;This is what I assume you want to achieve.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have HQ and Branch both has Internet Connection and are connected through VPN tunnel.&lt;/P&gt;&lt;P&gt;Now you want that on Branch all Internet traffic move through the local Internet but a specific subnet/IP should go through VPN tunnel on the HQ and access the subnet/IP from the HQ's Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you confirm this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so. You have already established the tunnel and for that you have created an ACL. That ACL on both side should contain two entries on for the PRIVATE IP subnet that you own at HQ and BRANCH. and the subnet/IP that you want to access through the HQ's Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For BRANCH's normal internet access you have created NAT policy. Now you need a one more NAT policy that exempt the particular subnet/IP that you want to access through HQ's Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In HQ you already has the Hair-Pinning NAT setup to take care of the internet acces.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope your earlier query &lt;A href="https://community.cisco.com/t5/firewalls/asa-site-to-site-vpn-no-internet-access/m-p/3918657" target="_blank" rel="noopener"&gt;ASA site to site VPN no internet access&lt;/A&gt;&amp;nbsp;is answered and working, Please rate and select it as answered if you feel.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Bhaggu&lt;/P&gt;</description>
      <pubDate>Fri, 06 Sep 2019 10:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920112#M30397</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-06T10:12:23Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920892#M30408</link>
      <description>&lt;P&gt;Yup, the tunnel is established. The ACL u refers to is which ACL?&lt;/P&gt;&lt;P&gt;I already have a ACL in Crytomap that have Site A internal LAN &amp;lt;&amp;gt; Site B internal LAN service Any.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;For BRANCH's normal internet access you have created NAT policy. Now you need a one more NAT policy that exempt the particular subnet/IP that you want to access through HQ's Internet.&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do i create this?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 01:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3920892#M30408</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-09T01:59:03Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921003#M30414</link>
      <description>&lt;P&gt;For you I have created a Lab You can find the attached files for configuration reference. The topology diagram is also attached for your reference.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you got all your questioned answered by studying the configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In example, from BRANCH's LAN subnet (10.1.2.0/24) any traffic going to 3.3.3.3/32 will go through VPN tunnel.&lt;/P&gt;&lt;P&gt;But, any other Internet destination will be pass through local Internet connection.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if you still have query fill free to ask .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 08:30:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921003#M30414</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-09T08:30:50Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921508#M30438</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;bhargavdesai&lt;/SPAN&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;You have been extremely helpful and im grateful for it.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="UserName lia-user-name lia-user-rank-Beginner lia-component-message-view-widget-author-username"&gt;&lt;SPAN class=""&gt;I tried to check my config with yours and it looks similar. I don't know what I am missing...&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 03:15:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921508#M30438</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-10T03:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921588#M30439</link>
      <description>&lt;P&gt;I have gone through your partial configuration so will try to guide you through that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think your Tunnel is up and you are able to connect to your private network. The problem is you are not able to send traffic for particular public network to other side. I am only looking at NAT and ACL part at the moment.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;====&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;BRANCH SIDE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt; (outside-hk) should look like. (You can always use object/object-group but here i am not using anything to make it clear for you)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 192.167.0.0 255.255.255.0&lt;BR /&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 host 204.11.35.98&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Now i see there are two internet connections. So your NAT should look something like&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR NORMAL INTERNET&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object-group network OBJ-SHN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) dynamic interface&lt;/P&gt;&lt;P&gt;object-group network OBJ-SHN&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static &lt;A href="http://www.whatsmyip.org" target="_blank"&gt;www.whatsmyip.org&lt;/A&gt; &lt;A href="http://www.whatsmyip.org" target="_blank"&gt;www.whatsmyip.org&lt;/A&gt; no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static &lt;A href="http://www.whatsmyip.org" target="_blank"&gt;www.whatsmyip.org&lt;/A&gt; &lt;A href="http://www.whatsmyip.org" target="_blank"&gt;www.whatsmyip.org&lt;/A&gt; no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ SIDE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CRYPTO ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside-SH&amp;nbsp;extended permit ip 192.167.0.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside-SH&amp;nbsp;extended permit ip host 204.11.35.98 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT CONFIGURATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;REMOAVE THIS: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network www.whatsmyip&lt;BR /&gt;nat (outside-isp1,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ALREADY CONFIGURED: &amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp2) dynamic interface&lt;BR /&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION-already in-place&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp1) source static OBJ-HKN OBJ-HKN destination static OBJ-SHN OBJ-SHN no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HAIRPINING NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (outside-isp1,outside-isp1) source dynamic OBJ-SHN interface&lt;BR /&gt;nat (outside-isp2,outside-isp2) source dynamic OBJ-SHN interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;======&lt;/P&gt;&lt;P&gt;Whenever you check at branch, make sure you are using the&amp;nbsp;&lt;STRONG&gt;204.11.35.98&amp;nbsp;&lt;/STRONG&gt;ip address in the browser and not the &lt;A href="http://www.whatismyip.org" target="_blank"&gt;www.whatismyip.org&lt;/A&gt; in the browser, because it may resolve to some other ip address and you want get the desire result.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Due to partial configuration, This is what I found, If you still having issue please share full &lt;EM&gt;sanitised&lt;/EM&gt; configuration of both-side so that i can help you out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 07:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921588#M30439</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-10T07:44:47Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921629#M30440</link>
      <description>&lt;P&gt;&lt;STRONG&gt;BRANCH SIDE:&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Crypto ACL&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(outside-hk) should look like. (You can always use object/object-group but here i am not using anything to make it clear for you)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 192.167.0.0 255.255.255.0&lt;BR /&gt;access-list outside-hk&amp;nbsp;extended permit ip 192.168.0.0 255.255.255.0 host 204.11.35.98&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Now i see there are two internet connections. So your NAT should look something like&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR NORMAL INTERNET &lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object-group network OBJ-SHN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static OBJ-HKN OBJ-HKN no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp2) source static OBJ-SHN OBJ-SHN destination static&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;no-proxy-arp&lt;BR /&gt;nat (inside,outside-isp1) source static OBJ-SHN OBJ-SHN destination static&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://www.whatsmyip.org/" target="_blank" rel="nofollow noopener noreferrer"&gt;www.whatsmyip.org&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HQ SIDE:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CRYPTO ACL&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list outside-SH&amp;nbsp;extended permit ip 192.167.0.0 255.255.255.0 192.168.0.0 255.255.255.0&lt;BR /&gt;access-list outside-SH&amp;nbsp;extended permit ip host 204.11.35.98 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT CONFIGURATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;REMOAVE THIS: &lt;FONT color="#FF0000"&gt;(Done)&lt;/FONT&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network www.whatsmyip&lt;BR /&gt;nat (outside-isp1,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ALREADY CONFIGURED: &amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp2) dynamic interface&lt;BR /&gt;object network Internal-LAN&lt;BR /&gt;nat (inside,outside-isp1) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FOR VPN EXEMPTION-already in-place&amp;nbsp;&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside-isp1) source static OBJ-HKN OBJ-HKN destination static OBJ-SHN OBJ-SHN no-proxy-arp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;HAIRPINING NAT&lt;FONT color="#FF0000"&gt;(in place)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (outside-isp1,outside-isp1) source dynamic OBJ-SHN interface&lt;BR /&gt;nat (outside-isp2,outside-isp2) source dynamic OBJ-SHN interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=================================================================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not working. Can't ping to the IP nor hit the address. I must be missing smth else&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 09:33:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921629#M30440</guid>
      <dc:creator>dylan.su18@gmail.com</dc:creator>
      <dc:date>2019-09-10T09:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: Forward selected internet traffic to another site</title>
      <link>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921666#M30441</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you run the packet tracer from BRANCH&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;packet-tracer input inside icmp 192.168.0.10 8 0 204.11.35.98 detail&lt;/PRE&gt;&lt;P&gt;The result will make sure the traffic is hitting the VPN or Not. You can run the packet-tracer at HO too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can enable logging on ASDM and check on HO that the traffic is reaching the HO or not.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moreover there are possibility of NAT sequencing issue. For that you can run the "sh nat" command on both side and provide the output.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It will be easier to troubleshoot if you provide sanitised configuration of both side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 10:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/forward-selected-internet-traffic-to-another-site/m-p/3921666#M30441</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-09-10T10:34:25Z</dc:date>
    </item>
  </channel>
</rss>

