<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336206#M344944</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will not be able to ping the inside interface unless you add the command management-access inside, as I mentioned in my first post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Aug 2013 15:05:25 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2013-08-22T15:05:25Z</dc:date>
    <item>
      <title>ASA5520 AnyConnect SSL VPN Connected but unable to ping my inside LAN</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336197#M344928</link>
      <description>&lt;P&gt;Hi there, please forgive if I have missed any forum protocols as this is my first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure Anyconnect SSL VPN. I am able to connect to the VPN on a laptop, witch is able to download the anyconnect client from the ASA. I am unable to ping any of my IP's that are on the inside of my ASA. Before posting here I have spent many hours on forums and watching videos on anyconnect SSL VPN creation and I am following it to the T but still no ping. Any help would be very much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.254/24&lt;/P&gt;&lt;P&gt;Outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dhcp&lt;/P&gt;&lt;P&gt;VPN Pool&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.250.1-50/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside LAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 99&lt;/P&gt;&lt;P&gt;ip address 192.168.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 99&lt;/P&gt;&lt;P&gt;ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name dock.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network inside-network-object&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network management-network-object&lt;/P&gt;&lt;P&gt;subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;subnet 192.168.250.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object-group network AllInside-networks&lt;/P&gt;&lt;P&gt;network-object object inside-network-object&lt;/P&gt;&lt;P&gt;network-object object management-network-object&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list split_tunnel standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split_tunnel standard permit 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 192.168.250.1-192.168.250.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic AllInside-networks interface&lt;/P&gt;&lt;P&gt;nat (inside,any) source static any any destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable 4433&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable outside&lt;/P&gt;&lt;P&gt;anyconnect image disk0:/anyconnect-win-3.1.03103-k9.pkg 1&lt;/P&gt;&lt;P&gt;anyconnect enable&lt;/P&gt;&lt;P&gt;tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect attributes&lt;/P&gt;&lt;P&gt;wins-server none&lt;/P&gt;&lt;P&gt;dns-server value 8.8.8.8&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value split_tunnel&lt;/P&gt;&lt;P&gt;default-domain value dock.local&lt;/P&gt;&lt;P&gt;username test password JAasdf434ey521ZCT encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect general-attributes&lt;/P&gt;&lt;P&gt;address-pool vpn_pool&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy_anyconnect&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect webvpn-attributes&lt;/P&gt;&lt;P&gt;group-alias anyconnect enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt;profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:24bcba3c4124ab371297d52260135924&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;:&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:23:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336197#M344928</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2019-03-12T02:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336198#M344932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you add the command &lt;STRONG&gt;management-access inside&lt;/STRONG&gt; and then see if you can ping the inside interface of the ASA when connected to the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are able to, then it is most likely the windows firewall blocking the ICMP packets (or whichever firewall is installed on the PC).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are not able to ping the inside interface, try changing the NAT rule to be more specific:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no&lt;/STRONG&gt; nat (inside,any) source static any any destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-network-object inside-network-object destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static management-network-object management-network-object destination static NETWORK_OBJ_192.168.250.0_25&amp;nbsp; NETWORK_OBJ_192.168.250.0_25 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also try running the packet-tracer.&amp;nbsp; It can help in identifying where the drop is.&amp;nbsp; Run it twice in a row, as the first time you run it will most certainly show a drop.&amp;nbsp; The second will show the accurate trace.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 192.168.1.10 4444 192.168.250.10 80 detail&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Aug 2013 19:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336198#M344932</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-16T19:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336199#M344935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you're response. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the things you suggested, but still no ping over anyconnnect vpn connection. This are the results from the packet-tracer:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input inside tcp 192.168.1.10 4444 192.168.250.10 80 d$&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x736fd4e8, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=10, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x736b9ef8, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=4, user_data=0x6f6ed580, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x736fe188, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=100, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source dynamic AllInside-networks interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 192.168.1.10/4444 to 62.45.21.113/4444&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x733289c0, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5, user_data=0x73843478, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.1.0, mask=255.255.255.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0x736f3f60, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1359, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 1781, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 07:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336199#M344935</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-20T07:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336200#M344936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;doesn't look like your NAT Exempt statement is is being matched.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you confirm the IP address that is assigned to the VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you confirm the group policy which is assigned to the VPN client ( this can be easily done using the ASDM Monitoring tab)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, your object group and VPN pool do not match up. Though it should not have much to say in this situation it is best to have everything uniform.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;subnet 192.168.250.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 192.168.250.1-192.168.250.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change the local pool to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool vpn_pool 192.168.250.1-192.168.250.126 mask 255.255.255.128&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 08:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336200#M344936</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-21T08:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336201#M344938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I changed the subnet from object network NETWORK_OBJ_192.168.250.0_25 to 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ip-adres of the anyconnect vpn client is: 192.168.250.1 with gateway 192.168.250.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The group policy which is assigned: GroupPolicy_anyconnect&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 12:34:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336201#M344938</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-21T12:34:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336202#M344940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post a current config please.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 13:46:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336202#M344940</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-22T13:46:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336203#M344941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(4)1 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address dhcp setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 99&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 99&lt;/P&gt;&lt;P&gt; ip address 192.168.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name dock.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;object network inside-network-object&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network management-network-object&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt; subnet 192.168.250.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network AllInside-networks&lt;/P&gt;&lt;P&gt; network-object object inside-network-object&lt;/P&gt;&lt;P&gt; network-object object management-network-object&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list split_tunnel standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split_tunnel standard permit 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool Anyconnect-pool 192.168.250.1-192.168.250.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic AllInside-networks interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-network-object inside-network-object destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static management-network-object management-network-object destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.100.2 255.255.255.255 management&lt;/P&gt;&lt;P&gt;http 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.100.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl encryption rc4-sha1 aes128-sha1 aes256-sha1 3des-sha1&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.03103-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_Anyconnect_VPN internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_Anyconnect_VPN attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split_tunnel&lt;/P&gt;&lt;P&gt; default-domain value dock.local&lt;/P&gt;&lt;P&gt;username sander password f/J.5nLef/EqyPfy encrypted&lt;/P&gt;&lt;P&gt;username aveha password JA8X3IiqPvFFsZCT encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group Anyconnect_VPN type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Anyconnect_VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool Anyconnect-pool&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_Anyconnect_VPN&lt;/P&gt;&lt;P&gt;tunnel-group Anyconnect_VPN webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias Anyconnect_VPN enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:4636fa566ffc11b0f7858b760d974dee&lt;/P&gt;&lt;P&gt;: end&lt;SPAN id="mce_marker"&gt;&lt;/SPAN&gt;: &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 14:12:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336203#M344941</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-22T14:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336204#M344942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be enabled by default...but you can try to add the command &lt;STRONG&gt;sysopt connection permit-vpn&lt;/STRONG&gt; to ensure that the VPN traffic bypasses interface ACLs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 14:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336204#M344942</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-22T14:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336205#M344943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Done that, still not able to ping management interface/inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 14:48:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336205#M344943</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-22T14:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336206#M344944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will not be able to ping the inside interface unless you add the command management-access inside, as I mentioned in my first post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 15:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336206#M344944</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-22T15:05:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336207#M344945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have done that command, it's in the config i posted earlier this day.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 15:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336207#M344945</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-22T15:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336208#M344946</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I overlooked it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest rearranging your NAT statements so that the NAT Exempt appears above the dynamic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat&amp;nbsp; (inside,outside) source static&amp;nbsp; inside-network-object&amp;nbsp; inside-network-object destination static&amp;nbsp; NETWORK_OBJ_192.168.250.0_25&amp;nbsp; NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat&amp;nbsp; (inside,outside) source static&amp;nbsp; management-network-object&amp;nbsp; management-network-object destination static&amp;nbsp;&amp;nbsp; NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic AllInside-networks interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 18:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336208#M344946</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-22T18:44:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336209#M344947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Executed the commands you suggested, still not able to ping to management interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 09:48:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336209#M344947</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-23T09:48:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336210#M344948</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you remove the NAT statements before you issued the commands?&amp;nbsp; It is easier doing this in the ASDM but will cause existing connections to be terminated, and those connections would need to be re-established.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 10:06:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336210#M344948</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-23T10:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336211#M344949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, i removed all NAT statements first, then i executed the ones you suggested. NAT looks like the folllowing in ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 inside outside 192.168.1.0/24 192.168.250.0/24 any -- Original -- -- Original -- -- Original --&amp;nbsp; &lt;/P&gt;&lt;P&gt;1 outside inside 192.168.250.0/24 192.168.1.0/24 any -- Original -- -- Original -- -- Original --&amp;nbsp; &lt;/P&gt;&lt;P&gt;2 inside outside 192.168.100.0/24 192.168.250.0/24 any -- Original -- -- Original -- -- Original --&amp;nbsp; &lt;/P&gt;&lt;P&gt;2 outside inside 192.168.250.0/24 192.168.100.0/24 any -- Original -- -- Original -- -- Original --&amp;nbsp; &lt;/P&gt;&lt;P&gt;3 inside outside AllInside-networks any any &lt;A href="mailto:a_u$c@1b2df369"&gt;a_u$c@1b2df369&lt;/A&gt; -- Original -- -- Original -- &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 10:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336211#M344949</guid>
      <dc:creator>Sander Zuijdam</dc:creator>
      <dc:date>2013-08-23T10:30:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5520 AnyConnect SSL VPN Connected but unable to ping my i</title>
      <link>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336212#M344950</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see you are not using the ASA as a CA for the anyconnect but it should still connect without the certificate, it just isn't secure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only other thing that looks a little out of place, but should not affect connectivity is:&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split_tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might want to change that to: &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other than that I would suggest removing all anyconnect configuration and starting from scratch.&amp;nbsp; I like using the ASDM when setting up AnyConnect, and it doesn't take a lot of time to get it done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration looks correct, perhaps just a restart is needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Aug 2013 10:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5520-anyconnect-ssl-vpn-connected-but-unable-to-ping-my/m-p/2336212#M344950</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-23T10:52:03Z</dc:date>
    </item>
  </channel>
</rss>

