<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 Anyconnect no return traffic/can't ping anything beyond in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231393#M346312</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT looks fine, even though I would personally define the actual source interface for the NAT rather than use&lt;STRONG&gt; "any"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most typical reason that ICMP fails through a Cisco firewall is lacking the ICMP Inspection, which is disabled by default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try adding the following and see if it makes any difference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jul 2013 06:31:06 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-17T06:31:06Z</dc:date>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond firewall</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231392#M346311</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a bit of a problem with my any connect setup (probably NAT exempt) &lt;/P&gt;&lt;P&gt;I can setup a any connect connection without issue but i am unable to reach anything beyond the firewall. It seems i have no return traffic.&lt;/P&gt;&lt;P&gt;If i log in to the firewall itself i can ping everything i need to ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is greatly appriciated, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.1(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CJD-PERIMETER-FW01&lt;/P&gt;&lt;P&gt;domain-name jud.local&lt;/P&gt;&lt;P&gt;enable password FtIWMCJmyPFy.7bM encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;ip local pool DHCP-VPN-10.255.255.0_24 10.255.255.10-10.255.255.69 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Uplink to Internet&lt;/P&gt;&lt;P&gt; switchport access vlan 650&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description Uplink to vendor&lt;/P&gt;&lt;P&gt; switchport access vlan 651&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 11,652,660&lt;/P&gt;&lt;P&gt; switchport trunk native vlan 1&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan650&lt;/P&gt;&lt;P&gt; description Uplink to Internet&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 74.214.9.106 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan651&lt;/P&gt;&lt;P&gt; description Uplink to vendor&lt;/P&gt;&lt;P&gt; nameif vendor&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.153.0.58 255.255.255.252&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan652&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.6.240.1 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa912-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 10.6.10.110&lt;/P&gt;&lt;P&gt; name-server 10.6.10.111&lt;/P&gt;&lt;P&gt; domain-name jud.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.6.0.0_16&lt;/P&gt;&lt;P&gt; subnet 10.6.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object service TCP25-SMTP&lt;/P&gt;&lt;P&gt; service tcp source eq smtp&lt;/P&gt;&lt;P&gt;subnet 10.255.255.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object network obj-10.255.255.0&lt;/P&gt;&lt;P&gt; subnet 10.255.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network obj-10.6.0.0&lt;/P&gt;&lt;P&gt; subnet 10.6.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Alllow SMTP to CJD-EXCH01 (Exchange Server)&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 10.6.10.112 eq smtp&lt;/P&gt;&lt;P&gt;access-list vendor_access_in extended deny ip any any&lt;/P&gt;&lt;P&gt;access-list outside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list vendor_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list Vlan652-webfilter_out_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list INTERNAL_10.6.0.0_16 standard permit 10.6.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu vendor 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-713.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static CJD-EXCH01 interface service TCP25-SMTP TCP25-SMTP&lt;/P&gt;&lt;P&gt;nat (any,outside) source static obj-10.6.0.0 obj-10.6.0.0 destination static obj-10.255.255.0 obj-10.255.255.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group outside_access_out out interface outside&lt;/P&gt;&lt;P&gt;access-group vendor_access_in in interface vendor&lt;/P&gt;&lt;P&gt;access-group vendor_access_out out interface vendor&lt;/P&gt;&lt;P&gt;access-group Vlan652-webfilter_out_access_in in interface inside control-plane&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 74.222.92.105 1&lt;/P&gt;&lt;P&gt;route vendor 10.0.0.0 255.0.0.0 10.153.0.57 10&lt;/P&gt;&lt;P&gt;route inside 10.6.0.0 255.255.0.0 10.6.240.2 1&lt;/P&gt;&lt;P&gt;route vendor 172.0.0.0 255.224.0.0 10.153.0.57 1&lt;/P&gt;&lt;P&gt;route vendor 192.168.0.0 255.255.0.0 10.153.0.57 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;ldap attribute-map 1-Webmail&lt;/P&gt;&lt;P&gt;&amp;nbsp; map-name&amp;nbsp; memberOf IETF-Radius-Class&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server Jud-ldap protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server Jud-ldap (inside) host 10.6.10.110&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; ldap-group-base-dn DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=svc-Cisco_ASA_LDAP,OU=Service,OU=Users,OU=Jud,DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa-server Jud-ldap (inside) host 10.6.10.111&lt;/P&gt;&lt;P&gt; timeout 5&lt;/P&gt;&lt;P&gt; ldap-base-dn DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; ldap-group-base-dn DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn CN=svc-Cisco_ASA_LDAP,OU=Service,OU=Users,OU=Jud,DC=Jud,DC=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;aaa authorization command LOCAL&lt;/P&gt;&lt;P&gt;http server enable 9443&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=Jud&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpool policy&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate 4e079651&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 10.6.10.110 source inside prefer&lt;/P&gt;&lt;P&gt;ntp server 10.6.10.111 source inside&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect-essentials&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-3.1.03103-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-macosx-i386-2.4.1012-k9.pkg 2 regex "Intel Mac OS X"&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-clientless&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; ipv6-split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value INTERNAL_10.6.0.0_16&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_1-Webmail internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_1-Webmail attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 10.6.10.110 10.6.10.111&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ssl-client&lt;/P&gt;&lt;P&gt; default-domain value jud.local&lt;/P&gt;&lt;P&gt;username Admin password hD9NaKiPiFEXFQxL encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group 1-Webmail type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group 1-Webmail general-attributes&lt;/P&gt;&lt;P&gt; address-pool DHCP-VPN-10.255.255.0_24&lt;/P&gt;&lt;P&gt; authentication-server-group Jud-ldap&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_1-Webmail&lt;/P&gt;&lt;P&gt;tunnel-group 1-Webmail webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias 1-Webmail enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231392#M346311</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2019-03-12T02:13:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231393#M346312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT looks fine, even though I would personally define the actual source interface for the NAT rather than use&lt;STRONG&gt; "any"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most typical reason that ICMP fails through a Cisco firewall is lacking the ICMP Inspection, which is disabled by default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try adding the following and see if it makes any difference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 06:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231393#M346312</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T06:31:06Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231394#M346315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN style="font-size: 10pt;"&gt;JouniForss,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for you reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No luck with the inspect, unfortunately&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:01:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231394#M346315</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2013-07-17T12:01:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231395#M346318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So have you confirmed that the traffic comes to the ASA through the VPN connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell us what is the specific network/host to which you are attempting connections to? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to connect to several different hosts to rule out maybe some software firewall preventing the connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 12:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231395#M346318</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T12:37:31Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231396#M346321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the 10.6.240.1 ip if i connect the VPN but nothing beyond that. and i see the counters increase.&lt;/P&gt;&lt;P&gt;The VPN IP address is added to the routing table on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Djurre&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231396#M346321</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2013-07-17T13:36:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231397#M346324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the router behind the ASAs &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface have connections anywhere else? Is it possible that the traffic back to the VPN Client pool is forwarded somewhere else on the internal router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have the VPN Client connected you could always run the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp &lt;SOME internal="" ip=""&gt; 8 0 &lt;VPN user="" ip=""&gt;&lt;/VPN&gt;&lt;/SOME&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also do the same for the other direction where the input interface is &lt;STRONG&gt;"outside"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside icmp &lt;VPN user="" ip=""&gt; 8 0 &lt;SOME internal="" ip=""&gt;&lt;/SOME&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally use the IP address assigned to the users in the above commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 13:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231397#M346324</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T13:51:06Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231398#M346325</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Don't see how, as i do have internet connectivity and the subnet 10.255.255.0/24 is not used anywhere else&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 14:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231398#M346325</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2013-07-17T14:44:18Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231399#M346328</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you change the &lt;STRONG&gt;"nat" &lt;/STRONG&gt;configuration I mentioned initially?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) source static obj-10.6.0.0 obj-10.6.0.0 destination&amp;nbsp; static obj-10.255.255.0 obj-10.255.255.0 no-proxy-arp route-lookup&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you could even try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static obj-10.6.0.0 obj-10.6.0.0 destination&amp;nbsp; static obj-10.255.255.0 obj-10.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Incase the NAT is causing some problems or there is something with the route lookup even though the ASA should have a more specific route for the VPN pool and choose that over the 10.0.0.0/8 route you have in place staticly on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above change doesnt do anything then I would suggest running the "packet-tracer" commands through to see what the ASA does to the traffic you are testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 14:49:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231399#M346328</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T14:49:46Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231400#M346330</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside,outside) source static obj-10.6.0.0 obj-10.6.0.0 destination&amp;nbsp; static obj-10.255.255.0 obj-10.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;But without the route-lookup at the end i'm not able to even ping the firewall.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I did a packet trace and i just don't see any returning trafic &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 22:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231400#M346330</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2013-07-17T22:22:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 Anyconnect no return traffic/can't ping anything beyond</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231401#M346332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Removing the &lt;STRONG&gt;"route-lookup"&lt;/STRONG&gt; should only affect the connections aimed at the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. Its needed if you plan to manage the firewall through the VPN connections using the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would still like to see the actual &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command output. Without it I am quite blind to what is actually happening with your connection attempts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I can say is that the NAT configurations seems correct if you want to connect from the VPN Client to the inside network range of 10.6.0.0/16&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also the most common reasons that ICMP tests fail would be that the ICMP Echo is blocked on either the actual target device or some other device in between OR that there is something wrong with the routing. For example if you had accidentally configured 10-network with /8 mask somewhere internally the return traffic to VPN Pool would fail. Then again you seem to have another link with route for 10.0.0.0/8 so in that case that wouldnt work either, so probably not the case here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jul 2013 06:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231401#M346332</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-18T06:45:14Z</dc:date>
    </item>
    <item>
      <title>Sorry for the late reply It</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231402#M346335</link>
      <description>&lt;P&gt;Sorry for the late reply It&lt;/P&gt;
&lt;P&gt;It was in a routing issue in the core switch,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your time! Jouni&lt;/P&gt;</description>
      <pubDate>Sun, 20 Dec 2015 14:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-anyconnect-no-return-traffic-can-t-ping-anything-beyond/m-p/2231402#M346335</guid>
      <dc:creator>Djurre Woudstra</dc:creator>
      <dc:date>2015-12-20T14:44:04Z</dc:date>
    </item>
  </channel>
</rss>

