<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289120#M342673</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your response.&lt;/P&gt;&lt;P&gt;so I've tried to include what I beleive might be what you're talking about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"access-list InternetWan_cryptomap extended permit ip 192.168.99.32 255.255.255.240 object 195_Ferguson&amp;nbsp; ".&amp;nbsp; However, this did not do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the RA_VPN need to be the same encryption as the site-to-site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ci&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Sep 2013 19:37:09 GMT</pubDate>
    <dc:creator>Christian Isla</dc:creator>
    <dc:date>2013-09-30T19:37:09Z</dc:date>
    <item>
      <title>ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289117#M342670</link>
      <description>&lt;P&gt;Hi all, &lt;/P&gt;&lt;P&gt;I've seen example after example of having a Remote IPSec Client reach a Remote Site via a Single ASA.&amp;nbsp; Unfortunately, these have all been with the former syntax using ver &amp;lt;8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm Hoping some might be able to guide me as this ASA is new to me.&amp;nbsp; I have working Site2Site (in &lt;SPAN style="color: #ff0000;"&gt;RED &lt;/SPAN&gt;) and working Remote Client VPN (in &lt;SPAN style="color: #00ff00;"&gt;GREEN&lt;/SPAN&gt;).&amp;nbsp;&amp;nbsp; My problem is that I'm want my remote client to reach the remote site too ( in &lt;SPAN style="color: #3366ff;"&gt;Blue &lt;/SPAN&gt;).&amp;nbsp;&amp;nbsp; I've attached a diagram. and I've included my configs for both ends (remote site router and local asa).&amp;nbsp; I've been using ASDM 7.1 to help me through this, but it's only gotten me this far and I'm killing way to many cycles pulling my hair out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please tell what's wrong here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;oh, and ever since I've set my security-level higher on my insideDATA I can still reach web pages but not PING anything on the Internet.??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===============================&lt;/P&gt;&lt;P&gt;ASA&lt;/P&gt;&lt;P&gt;WUMASA5515x# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname WUMASA5515x&lt;/P&gt;&lt;P&gt;domain-name wumfrgsn.local&lt;/P&gt;&lt;P&gt;enable password AYL/mjKstXNLBeQX encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool RA_IP_POOL 192.168.50.33-192.168.50.46 mask 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif InternetWan&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 24.102.6.36 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.11&lt;/P&gt;&lt;P&gt; vlan 11&lt;/P&gt;&lt;P&gt; nameif insideDATA&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 10.11.0.1 255.255.0.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.172&lt;/P&gt;&lt;P&gt; vlan 172&lt;/P&gt;&lt;P&gt; nameif GuestWIFI&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.16.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.99.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif unused&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa912-smp-k8.bin&lt;/P&gt;&lt;P&gt;boot system disk0:/asa911-smp-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup InternetWan&lt;/P&gt;&lt;P&gt;dns domain-lookup insideDATA&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 24.53.239.16&lt;/P&gt;&lt;P&gt; name-server 24.53.239.17&lt;/P&gt;&lt;P&gt; domain-name wumfrgsn.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network 145_Wilson_st&lt;/P&gt;&lt;P&gt; subnet 10.19.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 191Mainst&lt;/P&gt;&lt;P&gt; subnet 10.17.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 195_Ferguson&lt;/P&gt;&lt;P&gt; subnet 10.23.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.11.0.0_16&lt;/P&gt;&lt;P&gt; subnet 10.11.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 151_QueenN&lt;/P&gt;&lt;P&gt; subnet 10.22.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 155_QueenN&lt;/P&gt;&lt;P&gt; subnet 10.12.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 350_Quigley&lt;/P&gt;&lt;P&gt; subnet 10.21.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network 93_DelenaN&lt;/P&gt;&lt;P&gt; subnet 10.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.50.32_28&lt;/P&gt;&lt;P&gt; subnet 192.168.50.32 255.255.255.240&lt;/P&gt;&lt;P&gt;object-group network Remote_Networks&lt;/P&gt;&lt;P&gt; network-object object 195_Ferguson&lt;/P&gt;&lt;P&gt; network-object object 145_Wilson_st&lt;/P&gt;&lt;P&gt; network-object object 151_QueenN&lt;/P&gt;&lt;P&gt; network-object object 155_QueenN&lt;/P&gt;&lt;P&gt; network-object object 191Mainst&lt;/P&gt;&lt;P&gt; network-object object 350_Quigley&lt;/P&gt;&lt;P&gt; network-object object 93_DelenaN&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object 10.11.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.99.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 24.102.6.32 255.255.255.224&lt;/P&gt;&lt;P&gt; group-object Remote_Networks&lt;/P&gt;&lt;P&gt;access-list InternetWan_cryptomap extended permit ip 10.11.0.0 255.255.0.0 object 195_Ferguson &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.11.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 172.16.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 192.168.99.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 24.102.6.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.19.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.22.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.12.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.17.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.23.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.21.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RA_VPN_splitTunnelAcl standard permit 10.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list InternetWan_cryptomap_1 extended permit ip 10.11.0.0 255.255.0.0 object 145_Wilson_st &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu InternetWan 1500&lt;/P&gt;&lt;P&gt;mtu insideDATA 1500&lt;/P&gt;&lt;P&gt;mtu GuestWIFI 1500&lt;/P&gt;&lt;P&gt;mtu unused 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any InternetWan&lt;/P&gt;&lt;P&gt;icmp permit any insideDATA&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-713.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (insideDATA,InternetWan) source static NETWORK_OBJ_10.11.0.0_16 NETWORK_OBJ_10.11.0.0_16 destination static Remote_Networks Remote_Networks no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (GuestWIFI,InternetWan) source dynamic any interface&lt;/P&gt;&lt;P&gt;nat (insideDATA,InternetWan) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static NETWORK_OBJ_192.168.50.32_28 NETWORK_OBJ_192.168.50.32_28 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (insideDATA,InternetWan) source static NETWORK_OBJ_10.11.0.0_16 NETWORK_OBJ_10.11.0.0_16 destination static 145_Wilson_st 145_Wilson_st no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (management,InternetWan) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (insideDATA,InternetWan) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;route InternetWan 0.0.0.0 0.0.0.0 24.102.6.33 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL &lt;/P&gt;&lt;P&gt;aaa authorization exec authentication-server&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.99.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.50.32 255.255.255.240 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 1 match address InternetWan_cryptomap&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 1 set pfs &lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 1 set peer 72.12.152.245 &lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 1 set ikev1 transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 2 match address InternetWan_cryptomap_1&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 2 set pfs &lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 2 set peer 72.12.152.188 &lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 2 set ikev1 transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map InternetWan_map interface InternetWan&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;crypto ikev1 enable InternetWan&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.99.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh 192.168.50.32 255.255.255.240 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group14-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access management&lt;/P&gt;&lt;P&gt;dhcpd address 10.11.0.20-10.11.0.40 insideDATA&lt;/P&gt;&lt;P&gt;dhcpd dns 24.53.239.16 interface insideDATA&lt;/P&gt;&lt;P&gt;dhcpd domain wum.local interface insideDATA&lt;/P&gt;&lt;P&gt;dhcpd update dns both interface insideDATA&lt;/P&gt;&lt;P&gt;dhcpd enable insideDATA&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.0.100-172.16.0.150 GuestWIFI&lt;/P&gt;&lt;P&gt;dhcpd dns 24.53.239.16 24.53.239.17 interface GuestWIFI&lt;/P&gt;&lt;P&gt;dhcpd domain wum.guest.local interface GuestWIFI&lt;/P&gt;&lt;P&gt;dhcpd enable GuestWIFI&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.99.240-192.168.99.250 management&lt;/P&gt;&lt;P&gt;dhcpd dns 24.53.239.16 24.53.239.17 interface management&lt;/P&gt;&lt;P&gt;dhcpd domain mgnt.wum.local interface management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 209.167.68.100 source InternetWan prefer&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 &lt;/P&gt;&lt;P&gt;group-policy RA_VPN internal&lt;/P&gt;&lt;P&gt;group-policy RA_VPN attributes&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8 4.2.2.2&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RA_VPN_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value wumfrgsn.local&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_72.12.152.188 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_72.12.152.188 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_72.12.152.245 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_72.12.152.245 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;username vpntest password IyV0jGRyb7Bozb3j encrypted privilege 15&lt;/P&gt;&lt;P&gt;username vpntest attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy RA_VPN&lt;/P&gt;&lt;P&gt;username usermon password KpWxOxmGlFVZC0Kf encrypted&lt;/P&gt;&lt;P&gt;username clearca password ji55PAt.mBgyB8Ep encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.245 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.245 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_72.12.152.245&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.245 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt; ikev2 remote-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt; ikev2 local-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group RA_VPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RA_VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool RA_IP_POOL&lt;/P&gt;&lt;P&gt; default-group-policy RA_VPN&lt;/P&gt;&lt;P&gt;tunnel-group RA_VPN ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.188 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.188 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_72.12.152.188&lt;/P&gt;&lt;P&gt;tunnel-group 72.12.152.188 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt; ikev2 remote-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt; ikev2 local-authentication pre-shared-key *****&lt;/P&gt;&lt;P&gt;!=========&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;========================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;! Last configuration change at 10:10:47 EDST Fri Sep 20 2013 by cisla&lt;/P&gt;&lt;P&gt;! NVRAM config last updated at 10:11:58 EDST Fri Sep 20 2013 by cisla&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;version 12.4&lt;/P&gt;&lt;P&gt;no service pad&lt;/P&gt;&lt;P&gt;service timestamps debug datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service timestamps log datetime msec localtime show-timezone&lt;/P&gt;&lt;P&gt;service password-encryption&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname WUM145Wlsn-861&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot-start-marker&lt;/P&gt;&lt;P&gt;boot system flash c860-universalk9-mz.153-3.M.bin&lt;/P&gt;&lt;P&gt;boot-end-marker&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;logging message-counter syslog&lt;/P&gt;&lt;P&gt;logging buffered 1024000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa new-model&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;aaa session-id common&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDST recurring&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki trustpoint TP-self-signed-3210677487&lt;/P&gt;&lt;P&gt; enrollment selfsigned&lt;/P&gt;&lt;P&gt; subject-name cn=IOS-Self-Signed-Certificate-3210677487&lt;/P&gt;&lt;P&gt; revocation-check none&lt;/P&gt;&lt;P&gt; rsakeypair TP-self-signed-3210677487&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto pki certificate chain TP-self-signed-3210677487&lt;/P&gt;&lt;P&gt; certificate self-signed 01&lt;/P&gt;&lt;P&gt;&amp;nbsp; 30820252 308201BB A0030201 02020101 300D0609 2A864886 F70D0101 04050030 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 69666963 6174652D 33323130 36373734 3837301E 170D3133 30393130 31343332 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 35365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 32313036 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 37373438 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 8100D387 BFA5724D CB3A1419 BDD284C9 2CB5F7F3 85B8FF8D AC9A1E38 45757873 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 16B3FFE2 E9363FA5 8DB00C89 61ABB632 A91F49D0 40444E69 04A73966 2DEE492F &lt;/P&gt;&lt;P&gt;&amp;nbsp; EE65C774 5BA7808B 9E82B108 7BFF299E 2880175F 93ABDD4C 0C5C3609 5D516CDA &lt;/P&gt;&lt;P&gt;&amp;nbsp; 550C2E36 F5F93D22 9896182B 58946DAA AC463317 E6E6D730 31E6E28A 14ECDA91 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 49E70203 010001A3 7A307830 0F060355 1D130101 FF040530 030101FF 30250603 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 551D1104 1E301C82 1A57554D 31393546 5247534E 2D383631 772E7775 6D2E6C6F &lt;/P&gt;&lt;P&gt;&amp;nbsp; 63616C30 1F060355 1D230418 30168014 BA424AD3 CCCD22F5 863C50C1 A63FFC1D &lt;/P&gt;&lt;P&gt;&amp;nbsp; 17B2E7F5 301D0603 551D0E04 160414BA 424AD3CC CD22F586 3C50C1A6 3FFC1D17 &lt;/P&gt;&lt;P&gt;&amp;nbsp; B2E7F530 0D06092A 864886F7 0D010104 05000381 81007877 CCA0B502 47D8F8BD &lt;/P&gt;&lt;P&gt;&amp;nbsp; 30829B54 E6719CF0 D12F00FB 433FE0FF 2C03E549 7D88673B AF444F62 76F3754D &lt;/P&gt;&lt;P&gt;&amp;nbsp; D27E8E7B 1653D4B7 36D322CD DC4CB3A1 5C77FAC5 F52F6AE5 2D7FFDDE 55C5142E &lt;/P&gt;&lt;P&gt;&amp;nbsp; 2ABF2A0F B34B01BB C99547F1 DFCF6F7F 8CEC2806 60F89145 92124E4E 93C1E956 &lt;/P&gt;&lt;P&gt;&amp;nbsp; 21435255 612622F0 FA74FE30 83C9D80A 8518FA4A 4118&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;quit&lt;/P&gt;&lt;P&gt;ip source-route&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp excluded-address 10.19.0.1 10.19.0.20&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dhcp pool ccp-pool&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; import all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; network 10.19.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; default-router 10.19.0.1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; dns-server 24.215.0.249 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; lease 0 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip cef&lt;/P&gt;&lt;P&gt;ip domain name wum.local&lt;/P&gt;&lt;P&gt;ip name-server 24.53.239.16&lt;/P&gt;&lt;P&gt;ip name-server 24.53.239.17&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username cisla privilege 15 secret 5 $1$gf9q$ndfAaob6J/M7jwQOOaA310&lt;/P&gt;&lt;P&gt;! &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 19&lt;/P&gt;&lt;P&gt; encr 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt;crypto isakmp key testing4231 address 24.102.6.36&lt;/P&gt;&lt;P&gt;crypto isakmp keepalive 360&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec df-bit clear&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map SDM_CMAP_1 19 ipsec-isakmp &lt;/P&gt;&lt;P&gt; description Tunnel to MAIN&lt;/P&gt;&lt;P&gt; set peer 24.102.6.36&lt;/P&gt;&lt;P&gt; set transform-set ESP-3DES-MD5 &lt;/P&gt;&lt;P&gt; match address 119&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;archive&lt;/P&gt;&lt;P&gt; log config&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidekeys&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt; ip address dhcp&lt;/P&gt;&lt;P&gt; ip access-group 199 in&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface wlan-ap0&lt;/P&gt;&lt;P&gt; description Service module interface to manage the embedded AP&lt;/P&gt;&lt;P&gt; ip unnumbered Vlan1&lt;/P&gt;&lt;P&gt; arp timeout 0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Wlan-GigabitEthernet0&lt;/P&gt;&lt;P&gt; description Internal switch interface connecting to the embedded AP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$&lt;/P&gt;&lt;P&gt; ip address 10.19.0.1 255.255.0.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip forward-protocol nd&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http access-class 23&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip dns server&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet4 overload&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 23 permit 10.19.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;access-list 23 permit 10.11.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;access-list 23 permit 192.168.50.32 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 100 remark PAT Route Map Rule&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 10.19.0.0 0.0.255.255 10.11.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 10.19.0.0 0.0.255.255 192.168.50.32 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 10.19.0.0 0.0.255.255 192.168.99.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.19.0.0 0.0.255.255 any&lt;/P&gt;&lt;P&gt;access-list 119 remark ## IPSEC allow to REMOTE&lt;/P&gt;&lt;P&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 10.11.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 192.168.50.32 0.0.0.15&lt;/P&gt;&lt;P&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 192.168.99.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 199 remark WAN INTERFACE INPUT&lt;/P&gt;&lt;P&gt;access-list 199 permit tcp any any gt 1023 established&lt;/P&gt;&lt;P&gt;access-list 199 permit tcp any eq domain any&lt;/P&gt;&lt;P&gt;access-list 199 permit udp any eq domain any&lt;/P&gt;&lt;P&gt;access-list 199 permit esp any any&lt;/P&gt;&lt;P&gt;access-list 199 permit ahp any any&lt;/P&gt;&lt;P&gt;access-list 199 permit udp any any eq isakmp&lt;/P&gt;&lt;P&gt;access-list 199 permit udp any any eq non500-isakmp&lt;/P&gt;&lt;P&gt;access-list 199 permit tcp any any eq smtp&lt;/P&gt;&lt;P&gt;access-list 199 permit ip 24.102.6.32 0.0.0.31 any&lt;/P&gt;&lt;P&gt;access-list 199 permit ip 24.53.224.0 0.0.0.3 any&lt;/P&gt;&lt;P&gt;access-list 199 permit ip 24.53.239.0 0.0.0.127 any&lt;/P&gt;&lt;P&gt;access-list 199 permit ip host 209.167.68.100 any&lt;/P&gt;&lt;P&gt;access-list 199 permit udp any eq bootps any eq bootpc&lt;/P&gt;&lt;P&gt;access-list 199 permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list 199 permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list 199 permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list 199 deny&amp;nbsp;&amp;nbsp; ip any any log&lt;/P&gt;&lt;P&gt;no cdp run&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_1 permit 1&lt;/P&gt;&lt;P&gt; match ip address 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;control-plane&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;line con 0&lt;/P&gt;&lt;P&gt; no modem enable&lt;/P&gt;&lt;P&gt;line aux 0&lt;/P&gt;&lt;P&gt;line 2&lt;/P&gt;&lt;P&gt; no activation-character&lt;/P&gt;&lt;P&gt; no exec&lt;/P&gt;&lt;P&gt; transport preferred none&lt;/P&gt;&lt;P&gt; transport input all&lt;/P&gt;&lt;P&gt;line vty 0 4&lt;/P&gt;&lt;P&gt; access-class 23 in&lt;/P&gt;&lt;P&gt; privilege level 15&lt;/P&gt;&lt;P&gt; transport input telnet ssh&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;scheduler max-task-time 5000&lt;/P&gt;&lt;P&gt;ntp server 209.167.68.100 prefer source FastEthernet4&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;===============================&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289117#M342670</guid>
      <dc:creator>Christian Isla</dc:creator>
      <dc:date>2019-03-12T02:41:30Z</dc:date>
    </item>
    <item>
      <title>ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289118#M342671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello? Anyone.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 13:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289118#M342671</guid>
      <dc:creator>Christian Isla</dc:creator>
      <dc:date>2013-09-24T13:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289119#M342672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like your cryptomaps at the main site don't include your remote access address pool (&lt;SPAN style="font-size: 10pt;"&gt;192.168.50.32/28 or 0.0.0.15 inverse mask&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list InternetWan_cryptomap extended permit ip 10.11.0.0 255.255.0.0 object 195_Ferguson&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;access-list InternetWan_cryptomap_1 extended permit ip 10.11.0.0 255.255.0.0 object 145_Wilson_st&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It appears to be included ok at the remote site config you provided:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;access-list 119 remark ## IPSEC allow to REMOTE&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 10.11.0.0 0.0.255.255&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 192.168.50.32 0.0.0.15&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; padding-left: 30px;"&gt;access-list 119 permit ip 10.19.0.0 0.0.255.255 192.168.99.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember site-site VPNs should always have mirrored cyptomaps. You can see the current security associations (SAs) by doing "show crypto ipsec sa". You should see remote/local pairs for each of the allowed networks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 23:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289119#M342672</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-09-24T23:25:26Z</dc:date>
    </item>
    <item>
      <title>ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289120#M342673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, thanks for your response.&lt;/P&gt;&lt;P&gt;so I've tried to include what I beleive might be what you're talking about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"access-list InternetWan_cryptomap extended permit ip 192.168.99.32 255.255.255.240 object 195_Ferguson&amp;nbsp; ".&amp;nbsp; However, this did not do the trick.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the RA_VPN need to be the same encryption as the site-to-site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ci&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; left: -10000px; top: 0px; width: 1px; height: 1px; overflow: hidden;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 19:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289120#M342673</guid>
      <dc:creator>Christian Isla</dc:creator>
      <dc:date>2013-09-30T19:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515x  v. 9.1 Remote client VPN to Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289121#M342674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't read the config guide for the v8.x ASA features. I was playing about recently on a 7.2(2) ASA and needed to do something similar. Enabling same-security-traffic permit intra-interface was the resolution for me. I note you have permit inter-interface but your traffic is hair-pinning I.e entering and exiting the same interface.&lt;BR /&gt;&lt;BR /&gt;Apologies if I mis-read your config.&lt;BR /&gt;&lt;BR /&gt;Good luck sorting.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Darren&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 20:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515x-v-9-1-remote-client-vpn-to-site-to-site-vpn/m-p/2289121#M342674</guid>
      <dc:creator>darreng</dc:creator>
      <dc:date>2013-09-30T20:34:35Z</dc:date>
    </item>
  </channel>
</rss>

