<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 Issue with NAT and Internal Network Routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160229#M351624</link>
    <description>&lt;P&gt;Hi, I am having a problem getting my ASA to work properly.&amp;nbsp; I attached a diagram for reference and most of the config is below.&lt;/P&gt;&lt;P&gt; When I finally got it to route properly between 2 subnets on the internal network, the NONAT statement broke routing for the VPN Clients who rely on a NAT statement for the same subnet that is listed in NONAT access list.&amp;nbsp; I can get one of the 2 to work by replacing NAT statements but can't figure out a combinaton to allow routing for both the internal subnets and the VPN clients to work.&amp;nbsp; If more details are needed, please let me know.&amp;nbsp; I'd really appreciate some help with this, it's been about 5 days of tweaking this thing just to get the internal routing to work correctly and when I finally did I broke VPN client access.&amp;nbsp; To note, the VPN clients can still log in and get a session going, they just can't get anywhere once they are in.&amp;nbsp; I also think there's alot of stuff in this config that is not needed like a lot of the object groups, etc. but I am being very careful about removing anything.&amp;nbsp; I took over support of this ASA after someone else put it in place and over this past weekend we moved it to a new building and new ISP and that is when I had to get it to route between subnets.&amp;nbsp; The main point of this move was to remove building 1's reliance on building 2 for Internet and outside email access in the event that building 2 is not available (it is close to water and this has happended more than once over the past year).&amp;nbsp; So that is why I can't go with the smartest option of just keeping the routes on the router in the other building.&amp;nbsp; I also know the 1600s are ancient but they're all we have for now.&amp;nbsp; I can provide those router configs also but they are VERY basic, all static routing. &lt;STRONG&gt; The IP for the Cisco router on the same subnet as the ASA is 192.168.42.254.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is the statement that allows the routing to work between the 2 internal subnets but breaks VPN clients:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is the statement that allows the VPN clients to work but breaks the internal routing:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list INSIDE_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The rest of the config is below the diagram.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/5/9/135952-Network_Config.jpg" alt="Network_Config.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password - encrypted&lt;/P&gt;&lt;P&gt;passwd - encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.X 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.42.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa822-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.0&lt;/P&gt;&lt;P&gt;object-group network obj-10.1.1.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.42&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.5&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.40&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.0.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.43.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list INSIDE_nat0_outbound extended permit ip 192.168.42.0 255.255.255.0 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list X_splitTunnelAcl standard permit 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host X.X.X.X eq smtp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host X.X.X.X eq https &lt;/P&gt;&lt;P&gt;access-list NetTech21_splitTunnelAcl standard permit 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 192.168.42.0 255.255.255.0 192.168.43.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 192.168.43.0 255.255.255.0 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit object-group DM_INLINE_PROTOCOL_2 192.168.42.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list tcp_bypass extended permit tcp 192.168.43.0 255.255.255.0 192.168.42.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list tcp_bypass extended permit tcp 192.168.42.0 255.255.255.0 192.168.43.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool IPPool 10.1.1.1-10.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface OUTSIDE&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 1 X.X.X.X&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (INSIDE) 1 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) X.X.X.X 192.168.42.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) X.X.X.X 192.168.42.42 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 101 in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group INSIDE_access_in in interface INSIDE&lt;/P&gt;&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;route INSIDE 192.168.43.0 255.255.255.0 192.168.42.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.42.0 255.255.255.0 INSIDE&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 OUTSIDE&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map OUTSIDE_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE_map 65535 ipsec-isakmp dynamic OUTSIDE_dyn_map&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE_map interface OUTSIDE&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname &lt;/P&gt;&lt;P&gt;crypto isakmp enable OUTSIDE&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 INSIDE&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 OUTSIDE&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy StDvPn internal&lt;/P&gt;&lt;P&gt;group-policy StDvPn attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;group-policy NetTech21 internal&lt;/P&gt;&lt;P&gt;group-policy NetTech21 attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value NetTech21_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;group-policy X internal&lt;/P&gt;&lt;P&gt;group-policy X attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value X_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** A bunch of user name and tunnel group statements here&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt; match access-list tcp_bypass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;policy-map tcp_bypass_policy&lt;/P&gt;&lt;P&gt; class tcp_bypass&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy tcp_bypass_policy interface INSIDE&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:-&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:30:21 GMT</pubDate>
    <dc:creator>shumanick</dc:creator>
    <dc:date>2019-03-12T01:30:21Z</dc:date>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160229#M351624</link>
      <description>&lt;P&gt;Hi, I am having a problem getting my ASA to work properly.&amp;nbsp; I attached a diagram for reference and most of the config is below.&lt;/P&gt;&lt;P&gt; When I finally got it to route properly between 2 subnets on the internal network, the NONAT statement broke routing for the VPN Clients who rely on a NAT statement for the same subnet that is listed in NONAT access list.&amp;nbsp; I can get one of the 2 to work by replacing NAT statements but can't figure out a combinaton to allow routing for both the internal subnets and the VPN clients to work.&amp;nbsp; If more details are needed, please let me know.&amp;nbsp; I'd really appreciate some help with this, it's been about 5 days of tweaking this thing just to get the internal routing to work correctly and when I finally did I broke VPN client access.&amp;nbsp; To note, the VPN clients can still log in and get a session going, they just can't get anywhere once they are in.&amp;nbsp; I also think there's alot of stuff in this config that is not needed like a lot of the object groups, etc. but I am being very careful about removing anything.&amp;nbsp; I took over support of this ASA after someone else put it in place and over this past weekend we moved it to a new building and new ISP and that is when I had to get it to route between subnets.&amp;nbsp; The main point of this move was to remove building 1's reliance on building 2 for Internet and outside email access in the event that building 2 is not available (it is close to water and this has happended more than once over the past year).&amp;nbsp; So that is why I can't go with the smartest option of just keeping the routes on the router in the other building.&amp;nbsp; I also know the 1600s are ancient but they're all we have for now.&amp;nbsp; I can provide those router configs also but they are VERY basic, all static routing. &lt;STRONG&gt; The IP for the Cisco router on the same subnet as the ASA is 192.168.42.254.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is the statement that allows the routing to work between the 2 internal subnets but breaks VPN clients:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is the statement that allows the VPN clients to work but breaks the internal routing:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list INSIDE_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The rest of the config is below the diagram.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/2/5/9/135952-Network_Config.jpg" alt="Network_Config.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password - encrypted&lt;/P&gt;&lt;P&gt;passwd - encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif OUTSIDE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.X 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif INSIDE&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.42.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa822-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.0&lt;/P&gt;&lt;P&gt;object-group network obj-10.1.1.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.42&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.5&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.42.40&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.0.0&lt;/P&gt;&lt;P&gt;object-group network obj-192.168.43.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list INSIDE_nat0_outbound extended permit ip 192.168.42.0 255.255.255.0 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list X_splitTunnelAcl standard permit 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host X.X.X.X eq smtp &lt;/P&gt;&lt;P&gt;access-list 101 extended permit tcp any host X.X.X.X eq https &lt;/P&gt;&lt;P&gt;access-list NetTech21_splitTunnelAcl standard permit 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 192.168.42.0 255.255.255.0 192.168.43.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 192.168.43.0 255.255.255.0 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list INSIDE_access_in extended permit object-group DM_INLINE_PROTOCOL_2 192.168.42.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list tcp_bypass extended permit tcp 192.168.43.0 255.255.255.0 192.168.42.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list tcp_bypass extended permit tcp 192.168.42.0 255.255.255.0 192.168.43.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu OUTSIDE 1500&lt;/P&gt;&lt;P&gt;mtu INSIDE 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool IPPool 10.1.1.1-10.1.1.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface OUTSIDE&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 1 X.X.X.X&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (INSIDE) 1 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) X.X.X.X 192.168.42.5 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (INSIDE,OUTSIDE) X.X.X.X 192.168.42.42 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 101 in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-group INSIDE_access_in in interface INSIDE&lt;/P&gt;&lt;P&gt;route OUTSIDE 0.0.0.0 0.0.0.0 X.X.X.X 1&lt;/P&gt;&lt;P&gt;route INSIDE 192.168.43.0 255.255.255.0 192.168.42.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.42.0 255.255.255.0 INSIDE&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 0.0.0.0 0.0.0.0 OUTSIDE&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map OUTSIDE_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE_map 65535 ipsec-isakmp dynamic OUTSIDE_dyn_map&lt;/P&gt;&lt;P&gt;crypto map OUTSIDE_map interface OUTSIDE&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname &lt;/P&gt;&lt;P&gt;crypto isakmp enable OUTSIDE&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;ssh 192.168.0.0 255.255.0.0 INSIDE&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 OUTSIDE&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy StDvPn internal&lt;/P&gt;&lt;P&gt;group-policy StDvPn attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;group-policy NetTech21 internal&lt;/P&gt;&lt;P&gt;group-policy NetTech21 attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value NetTech21_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;group-policy X internal&lt;/P&gt;&lt;P&gt;group-policy X attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.42.40&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value X_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*** A bunch of user name and tunnel group statements here&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt; match access-list tcp_bypass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;policy-map tcp_bypass_policy&lt;/P&gt;&lt;P&gt; class tcp_bypass&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options tcp-state-bypass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy tcp_bypass_policy interface INSIDE&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService" target="_blank"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com" target="_blank"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:-&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160229#M351624</guid>
      <dc:creator>shumanick</dc:creator>
      <dc:date>2019-03-12T01:30:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160230#M351625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its totally possible that I might have missed something but couldnt you just add the VPN Client NAT0 ACL statement to the ACL used in the above configuration for traffic between 2 LANs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NONAT permit ip 192.168.42.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Probably better to get some coffee and look this through once more incase I missed something &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 16:26:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160230#M351625</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-17T16:26:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160231#M351626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just gave that a shot and the VPN clients still can't get anywhere.&amp;nbsp; Were there statements you were recommending I remove in addtion to adding that one?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 16:44:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160231#M351626</guid>
      <dc:creator>shumanick</dc:creator>
      <dc:date>2013-04-17T16:44:54Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160232#M351627</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you monitored the ASA logs through ASDM while connected with a VPN Client and attempting to connect to some host on the 192.168.42.0/24 network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you testing with some TCP connection or just ICMP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 16:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160232#M351627</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-17T16:53:22Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160233#M351628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now I am having some mixes results after re-connecting so that definetely did something.&amp;nbsp; I need to go somewhere with better reception for my air card to test this out because it's terrible wher eI am now.&amp;nbsp; I will get back to you with the results soon.&amp;nbsp; Thank you for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160233#M351628</guid>
      <dc:creator>shumanick</dc:creator>
      <dc:date>2013-04-17T17:07:12Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160234#M351629</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that did the trick, on my laptop running through my iPhone everything works just about as good as I think it could over that connection but I never really use it.&amp;nbsp; Another user who has been testing over his sprint air card says that it seems much slower to him now but I am not sure how much he actually uses this card for access.&amp;nbsp; I can say that it was pretty painful on his device but don't know for sure that isn't how it always worked.&amp;nbsp; &lt;STRONG&gt;The additional access list statement definitely fixed the routing issue. &lt;/STRONG&gt; I am just wondering if the ASA is now doing way more processing or the routing is not ideal.&amp;nbsp; I will know for sure later when I can test from a good wifi network.&amp;nbsp; It doesn't much sense that it would be slower because we moved it to a MUCH faster internet connection and all of our outbound Internet access has been remarkably faster since then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you want to mark this as answered that is no problem with me.&amp;nbsp; If I seem to have a performance issue now I could try to get some help on that separately.&amp;nbsp; Thanks again for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Steve&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 18:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160234#M351629</guid>
      <dc:creator>shumanick</dc:creator>
      <dc:date>2013-04-17T18:21:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160235#M351630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually I cant mark the question as answered. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; You can mark my replys as correct answer with the "button" that shows at the bottom of the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine it will be harder to determine the the cause of slowness in connection rather than determining a cause when something doesnt work at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the routing setup isnt ideal at the moment as you have stated yourself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the hosts on 192.168.42.0/24 are using ASA as their default gateway then you have asymmetric routing between the 2 LANs for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connections from 192.168.42.0/24 to 192.168.43.0/24 would at the moment go like this&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Host 192.168.42.100 attempts to connect 192.168.43.100&lt;/LI&gt;&lt;LI&gt;Host 192.168.42.100 sends traffic to its default gateway&lt;/LI&gt;&lt;LI&gt;ASA sends it back to the internal router &lt;UL&gt;&lt;LI&gt;This is achieved with "same-security-traffic permit intra-interface"&amp;nbsp; and NAT0 configuration&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Connection attempt reaches the host 192.168.43.100&lt;/LI&gt;&lt;LI&gt;Host 192.168.43.100 sends reply to host 192.168.42.100&lt;/LI&gt;&lt;LI&gt;The reply will get forwarded from the router directly to the host and therefore leaving the ASA totally out of the picture with regards to this reply. Therefore the ASA would normally just teardown the connection and any TCP connection would fail. But the TCP State Bypass is allowing the traffic.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally this shouldnt relate to the VPN Clients connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe one approach would be to both monitor the logs while testing and also taking traffic capture to determine how TCP connections are working. Traffic capture can be done directly on the ASA if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss
Edited the above description a bit since it was partly missleading&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 18:28:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160235#M351630</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-17T18:28:53Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 Issue with NAT and Internal Network Routing</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160236#M351631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the detail on that, I spent a lot of time figuring that out and then finally finding the actual problem and resolution after reading Cisco Document ID: 111986.&amp;nbsp; I was concerned about the routing between those 2 subnets also but that is actually working well with no complaints on noticable performance hit at least from a user perspective.&amp;nbsp; The only thing that "seems" like it MIGHT be slower is client VPN access once you have a seesion enabled.&amp;nbsp; I will be able to have a good handle on that later this evening but from what I've seen so far I'm not convinced this is the case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 18:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-issue-with-nat-and-internal-network-routing/m-p/2160236#M351631</guid>
      <dc:creator>shumanick</dc:creator>
      <dc:date>2013-04-17T18:37:16Z</dc:date>
    </item>
  </channel>
</rss>

