<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic problems with VPN and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285148#M342376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that solved the local network access.I still have problems with internet access now. I've checked my split tunneling but it still doesnt work, do you see anything wrong with split tunneling?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Sep 2013 07:46:42 GMT</pubDate>
    <dc:creator>djxtcsthlm77</dc:creator>
    <dc:date>2013-09-30T07:46:42Z</dc:date>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285143#M342370</link>
      <description>&lt;P&gt;I'm running a ASA 5505 with IOS 8.4 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was trying to setup anyconnect ssl vpn and now it's really strange, i cant get it to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm able to connect to the VPN service, but no network at all. I cant connect to either local hosts or to the internet when i'm connected to the VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my full config (masking password &amp;amp; public IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas? Or where i can start troubleshoot?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname vpn&lt;/P&gt;&lt;P&gt;domain-name domain.com&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.240.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.Y.Z.Z 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa844-1-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 8.8.8.8&lt;/P&gt;&lt;P&gt; name-server 8.8.4.4&lt;/P&gt;&lt;P&gt; domain-name domain.com&lt;/P&gt;&lt;P&gt;object network obj-192.168.240.0&lt;/P&gt;&lt;P&gt; subnet 192.168.240.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network NETWORK_OBJ_192.168.241.0_25&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip 192.168.240.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list XXXXXX_VPN_ACL standard permit 192.168.240.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any log disable&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list nat-exempt extended permit ip 192.168.240.0 255.255.255.0 192.168.241.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list VPN_ACL extended permit ip 192.168.240.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN_IP_POOL 192.168.241.50-192.168.241.70 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649-103.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-192.168.240.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 DGW_IP 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;user-identity default-domain LOCAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.240.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;no snmp-server location&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=vpn.domain.com&lt;/P&gt;&lt;P&gt; keypair VPN&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate 7e2d4352&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082024c 308201b5 a0030201 0202047e 2d435230 0d06092a 864886f7 0d010105&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bed6f320 a5047dba 203db5cc b933cd52 25c7822d a525de87 9b521770 78e8ccff&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 092a8648 86f70d01 01050500 03818100 0d5404b2 20db2566 ccf213d5 d00372a4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e512093a da4f007d 5d7cb409 034dd59b 7df80f4f a9b7b014 4de91eaf beb8f3b4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 16a417ba 07c04292 881413fc 18c73894 2ccc3f2a 820c449a 70516774 cf859c3a&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f37b5397 4d4efc07 306a1ad2 04239f97 a26f8625 af4f90c5 28b47744 718656d8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e885a641 e3517bff 8f64be2b 21fab9c5&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;telnet timeout 30&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ssh timeout 30&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.240.101-192.168.240.132 inside&lt;/P&gt;&lt;P&gt;dhcpd dns dns1srv dns2srv interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 2&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; cache&lt;/P&gt;&lt;P&gt;&amp;nbsp; cache-static-content enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value XXXXXX_VPN_ACL&lt;/P&gt;&lt;P&gt; default-domain value domain.com&lt;/P&gt;&lt;P&gt; split-tunnel-all-dns enable&lt;/P&gt;&lt;P&gt; address-pools value VPN_IP_POOL&lt;/P&gt;&lt;P&gt;group-policy AnyConnect internal&lt;/P&gt;&lt;P&gt;group-policy AnyConnect attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 8.8.4.4&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client&lt;/P&gt;&lt;P&gt; default-domain value domain.com&lt;/P&gt;&lt;P&gt; address-pools value VPN_IP_POOL&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;username admin password XXXXXXXXXXX encrypted&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; address-pool VPN_IP_POOL&lt;/P&gt;&lt;P&gt; default-group-policy AnyConnect&lt;/P&gt;&lt;P&gt;tunnel-group VPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN_IP_POOL&lt;/P&gt;&lt;P&gt; default-group-policy AnyConnect&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:6b4b05d3f1dd7bd5888890f805018f32&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285143#M342370</guid>
      <dc:creator>djxtcsthlm77</dc:creator>
      <dc:date>2019-03-12T02:44:57Z</dc:date>
    </item>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285144#M342372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried a packet trace and this is the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It fails in the NAT section and then the result is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(acl-drop) flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Sep 2013 23:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285144#M342372</guid>
      <dc:creator>djxtcsthlm77</dc:creator>
      <dc:date>2013-09-29T23:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285145#M342373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you only testing with PING? If yes, then configure the folowing and also test with other services (http, ftp ...):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;policy-map global_policy&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;class inspection_default&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; inspect icmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And for accessing the internet you have to configure either Split-Tunneling or NAT from outside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;/P&gt;&lt;P&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 00:05:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285145#M342373</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-30T00:05:21Z</dc:date>
    </item>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285146#M342374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Right now im concerned about why i even cant access local network resources. &lt;/P&gt;&lt;P&gt;I've tried adding the above commands but it didnt helt out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do receive these errors in the log:&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:192.168.241.51/49484(LOCAL\admin) dst inside:192.168.240.10/5000 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where 192..168.241.0 is my VPN IP pool and 192.168.240.0 is my local network. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 07:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285146#M342374</guid>
      <dc:creator>djxtcsthlm77</dc:creator>
      <dc:date>2013-09-30T07:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285147#M342375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just see it: You don't have any nat-exemption configured for your VPN-traffic:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object-group network VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; network-object 192.168.241.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;object-group network LAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; network-object 192.168.240.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;nat&amp;nbsp; 1 (any,outside) source static LAN LAN destination static VPN VPN no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni" rel="nofollow"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 07:24:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285147#M342375</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-30T07:24:49Z</dc:date>
    </item>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285148#M342376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that solved the local network access.I still have problems with internet access now. I've checked my split tunneling but it still doesnt work, do you see anything wrong with split tunneling?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 07:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285148#M342376</guid>
      <dc:creator>djxtcsthlm77</dc:creator>
      <dc:date>2013-09-30T07:46:42Z</dc:date>
    </item>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285149#M342377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your combination of default- and configured groups is a little bit strange but still should work. I don't remember if the old AnyConnect-client 2.5 had some special behaviour. So I would change that to the newest 3.1 release. If that works you probably have to use a public certificate to get rid of the certificate-warnings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you see under secured routes in the client after you establish the connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 08:31:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285149#M342377</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-30T08:31:47Z</dc:date>
    </item>
    <item>
      <title>problems with VPN and NAT</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285150#M342378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im actually running version 3.1.01085&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under secured routes i see &lt;/P&gt;&lt;P&gt;192.168.240.0/24&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 09:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat/m-p/2285150#M342378</guid>
      <dc:creator>djxtcsthlm77</dc:creator>
      <dc:date>2013-09-30T09:18:23Z</dc:date>
    </item>
  </channel>
</rss>

