<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA RA VPN, iPad, PC in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306985#M344641</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you mean to give your VPN users internet access while using full tunneling? then yes you would to do a NAT and also allow the ASA to send traffic out the same interface it was received on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;network object VPN&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 17 Aug 2013 19:07:39 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2013-08-17T19:07:39Z</dc:date>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306978#M344624</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize if this has already been asked.&amp;nbsp; If you see a thread asking this same question, please link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently overseas and wish to setup my home (US) ASA 5505 with two VPN profiles; one full tunnel, one split tunnel.&amp;nbsp; This would enable me to connect from either my PC or iPad and access my things at home (split-tunnel), or reach websites sourcing from my US address (full-tunnel).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would prefer to go about this configuration via CLI as I am not too familiar with the GUI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My first question is just a basic:&amp;nbsp; What am I going for?&amp;nbsp; Remote Access VPN with multiple groups?&amp;nbsp; AnyConnect?&amp;nbsp; Eazy VPN?&amp;nbsp; I'm not sharp on the ASA platform, so any help would be appreciated.&amp;nbsp; I would very much like to use the iPad's built in IPSEC VPN option (labeled "Cisco").&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5505 9.1(1)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306978#M344624</guid>
      <dc:creator>scott.bridges</dc:creator>
      <dc:date>2019-03-12T02:26:01Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306979#M344626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've been messing with the configuration and this is what I have.&amp;nbsp; I am able to successfully authenticate via my iPad and obtain an IP from the vpnPool.&amp;nbsp; However, I can only ping the inside interface IP (192.168.0.250), nothing else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I'm focusing on the Full Tunnel (hairpin) configuration.&amp;nbsp; I know I'm missing something with NAT, but I'm not sure what...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;ip local pool vpnPool 192.168.0.210-192.168.0.220 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Ethernet0/0&lt;/P&gt;
&lt;P&gt; switchport access vlan 2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan1&lt;/P&gt;
&lt;P&gt; nameif inside&lt;/P&gt;
&lt;P&gt; security-level 100&lt;/P&gt;
&lt;P&gt; ip address 192.168.0.250 255.255.255.0 &lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;interface Vlan2&lt;/P&gt;
&lt;P&gt; nameif outside&lt;/P&gt;
&lt;P&gt; security-level 0&lt;/P&gt;
&lt;P&gt; ip address dhcp setroute &lt;/P&gt;
&lt;P&gt; no pim&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;boot system disk0:/asa911-k8.bin&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;access-list outsideIN extended permit icmp any4 any4 object-group DM_INLINE_ICMP_1 &lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;asdm image disk0:/asdm-711-52.bin&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static VPN-SOURCE VPN-SOURCE destination static VPN-DESTINATION-1 VPN-DESTINATION-1&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static VPN-SOURCE VPN-SOURCE destination static VPN-DESTINATION-2 VPN-DESTINATION-2&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network obj_any&lt;/P&gt;
&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;
&lt;P&gt;access-group outsideIN in interface outside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;
&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;
&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-3DES-SHA&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;
&lt;P&gt;crypto isakmp nat-traversal 3600&lt;/P&gt;
&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;
&lt;P&gt; authentication crack&lt;/P&gt;
&lt;P&gt; encryption aes-256&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 20&lt;/P&gt;
&lt;P&gt; authentication rsa-sig&lt;/P&gt;
&lt;P&gt; encryption aes-256&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 30&lt;/P&gt;
&lt;P&gt; authentication pre-share&lt;/P&gt;
&lt;P&gt; encryption aes-256&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 40&lt;/P&gt;
&lt;P&gt; authentication crack&lt;/P&gt;
&lt;P&gt; encryption aes-192&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 50&lt;/P&gt;
&lt;P&gt; authentication rsa-sig&lt;/P&gt;
&lt;P&gt; encryption aes-192&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 60&lt;/P&gt;
&lt;P&gt; authentication pre-share&lt;/P&gt;
&lt;P&gt; encryption aes-192&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 70&lt;/P&gt;
&lt;P&gt; authentication crack&lt;/P&gt;
&lt;P&gt; encryption aes&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 80&lt;/P&gt;
&lt;P&gt; authentication rsa-sig&lt;/P&gt;
&lt;P&gt; encryption aes&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 90&lt;/P&gt;
&lt;P&gt; authentication pre-share&lt;/P&gt;
&lt;P&gt; encryption aes&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 100&lt;/P&gt;
&lt;P&gt; authentication crack&lt;/P&gt;
&lt;P&gt; encryption 3des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 110&lt;/P&gt;
&lt;P&gt; authentication rsa-sig&lt;/P&gt;
&lt;P&gt; encryption 3des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 120&lt;/P&gt;
&lt;P&gt; authentication pre-share&lt;/P&gt;
&lt;P&gt; encryption 3des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 130&lt;/P&gt;
&lt;P&gt; authentication crack&lt;/P&gt;
&lt;P&gt; encryption des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 140&lt;/P&gt;
&lt;P&gt; authentication rsa-sig&lt;/P&gt;
&lt;P&gt; encryption des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 150&lt;/P&gt;
&lt;P&gt; authentication pre-share&lt;/P&gt;
&lt;P&gt; encryption des&lt;/P&gt;
&lt;P&gt; hash sha&lt;/P&gt;
&lt;P&gt; group 2&lt;/P&gt;
&lt;P&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;dhcpd address 192.168.0.100-192.168.0.200 inside&lt;/P&gt;
&lt;P&gt;dhcpd dns 4.2.2.6 4.2.2.2 interface inside&lt;/P&gt;
&lt;P&gt;dhcpd domain local.lan interface inside&lt;/P&gt;
&lt;P&gt;dhcpd update dns both interface inside&lt;/P&gt;
&lt;P&gt;dhcpd enable inside&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;webvpn&lt;/P&gt;
&lt;P&gt; anyconnect-essentials&lt;/P&gt;
&lt;P&gt;group-policy Full_Tunnel internal&lt;/P&gt;
&lt;P&gt;group-policy Full_Tunnel attributes&lt;/P&gt;
&lt;P&gt; vpn-tunnel-protocol ssl-clientless&lt;/P&gt;
&lt;P&gt;group-policy Split_Tunnel internal&lt;/P&gt;
&lt;P&gt;group-policy Split_Tunnel attributes&lt;/P&gt;
&lt;P&gt; vpn-tunnel-protocol ssl-clientless&lt;/P&gt;
&lt;P&gt; webvpn&lt;/P&gt;
&lt;P&gt;&amp;nbsp; smart-tunnel tunnel-policy tunnelspecified homeNetwork&lt;/P&gt;
&lt;P&gt;username scott password .. encrypted privilege 15&lt;/P&gt;
&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;
&lt;P&gt; address-pool vpnPool&lt;/P&gt;
&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;
&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;
&lt;P&gt;tunnel-group groupFullTunnel type remote-access&lt;/P&gt;
&lt;P&gt;tunnel-group groupFullTunnel general-attributes&lt;/P&gt;
&lt;P&gt; address-pool vpnPool&lt;/P&gt;
&lt;P&gt; default-group-policy Full_Tunnel&lt;/P&gt;
&lt;P&gt;tunnel-group groupFullTunnel ipsec-attributes&lt;/P&gt;
&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Excuse all the random config.&amp;nbsp; I made the mistake of trying the wizard.&amp;nbsp; I prefer CLI.&lt;BR /&gt;Side note, can I remove those 'crypto ikev policty' statements?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 15:03:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306979#M344626</guid>
      <dc:creator>scott.bridges</dc:creator>
      <dc:date>2013-08-17T15:03:11Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306980#M344628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One thing is that you will have connection issues because the VPN pool is on the same subnet as the inside network.&amp;nbsp; The inside network will think it is directly connected&amp;nbsp; and never send the traffic to the ASA to be routed to the VPN.&amp;nbsp; To get around this you could either subnet the current IP allocation or assign a comletely separate subnet to the VPN (192.168.1.0/24 for example).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the NAT I am uncertain what you mean by VPN-SOURCE and VPN-DESTINATION.&amp;nbsp; If the VPN-SOURCE is the VPN IP and VPN-DESTINATION is the LAN then the NAT statement is backwards and should read something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static VPN-DESTINATION-1 VPN-DESTINATION-1 destination static VPN-SOURCE VPN-SOURCE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 16:03:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306980#M344628</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-17T16:03:49Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306981#M344631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to exempt the VPN clients from NAT. Try adding:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;object network lan-subnet &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;subnet 192.168.0.0 255.255.255.0 &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;BR /&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;nat (inside,outside) source static lan-subnet lan-subnet destination static lan-subnet lan-subnet&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that doesn't work have a look at this pdf guide - &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.vpntracker.com/cms_components/media/vpnt/VPNT_Interop_Howtos/1101/CiscoASA.pdf"&gt;http://www.vpntracker.com/cms_components/media/vpnt/VPNT_Interop_Howtos/1101/CiscoASA.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's for a Mac IPsec client but I've found that the configuration works perfectly well with the iPhone/iPad built-in Cisco IPsec client connecting to an ASA5505. The CLI commands are at the end of the document.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 16:07:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306981#M344631</guid>
      <dc:creator>kmccourt</dc:creator>
      <dc:date>2013-08-17T16:07:19Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306982#M344634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're right in that I should have a different subnet for the vpnPool.&amp;nbsp; I changed it to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;ip local pool vpnPool 192.168.1.200-192.168.1.220 mask 255.255.255.0&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also added the following lines based on second reply:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network vpn-subnet&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static vpn-subnet vpn-subnet destination static vpn-subnet vpn-subnet&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I connect, I now obtain the new pool of IP's, but I'm in the same spot as before.&amp;nbsp; I can ping the inside interface IP, but that's it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marius, those VPN-SOURCE objects are defined for a site-to-site VPN I've been playing with.&amp;nbsp; I shouldn't have included that in this effort, my apologies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now get the following log message when I connect to the VPN and try to ping:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;5&lt;/TD&gt;&lt;TD&gt;Aug 17 2013&lt;/TD&gt;&lt;TD&gt;14:10:03&lt;/TD&gt;&lt;TD&gt;305013&lt;/TD&gt;&lt;TD&gt;192.168.1.200&lt;/TD&gt;&lt;TD&gt;LOCAL&lt;/TD&gt;&lt;TD&gt;192.168.0.252&lt;/TD&gt;&lt;TD&gt;&lt;BR /&gt;&lt;/TD&gt;&lt;TD&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:192.168.1.200(LOCAL\scott) dst inside:192.168.0.252 (type 8, code 0) denied due to NAT reverse path failure&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's obvious a NAT issue, I'm just unsure of the solution...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 18:28:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306982#M344634</guid>
      <dc:creator>scott.bridges</dc:creator>
      <dc:date>2013-08-17T18:28:23Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306983#M344637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is not necessary to have a different subnet but if you do then I think the statement should be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;nat (inside,outside) source static lan-subnet lan-subnet destination static vpn-subnet vpn-subnet&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Look at the linked document I sent - it breaks down the process into steps that I think are easy to follow.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 18:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306983#M344637</guid>
      <dc:creator>kmccourt</dc:creator>
      <dc:date>2013-08-17T18:36:39Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306984#M344639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you.&amp;nbsp; Very helpful PDF and it really outlines it for you.&amp;nbsp; I like that only the subject configuration is shown.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can now connect with my iPad and ping internal IP's, which is a lot further than where I was.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I just need to figure out the hairpin part.&amp;nbsp; Allowing my iPad to use my Firewalls connection as it's source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this also a simple NAT config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 18:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306984#M344639</guid>
      <dc:creator>scott.bridges</dc:creator>
      <dc:date>2013-08-17T18:55:27Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306985#M344641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you mean to give your VPN users internet access while using full tunneling? then yes you would to do a NAT and also allow the ASA to send traffic out the same interface it was received on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;network object VPN&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 19:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306985#M344641</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-17T19:07:39Z</dc:date>
    </item>
    <item>
      <title>ASA RA VPN, iPad, PC</title>
      <link>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306986#M344643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sweet!&amp;nbsp; That was it.&amp;nbsp; I can now browse from my iPad with my home ASA as the source.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank both of you much for the help!&amp;nbsp; I really need to read up on NAT; it's always been my weak point.&amp;nbsp; The syntax is boggling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Aug 2013 19:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ra-vpn-ipad-pc/m-p/2306986#M344643</guid>
      <dc:creator>scott.bridges</dc:creator>
      <dc:date>2013-08-17T19:29:48Z</dc:date>
    </item>
  </channel>
</rss>

