<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Intermittent Internet Connection and VPN clients can't ping inte in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193805#M356887</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just did what you have posted above I can only ping 1 server address within the subnet of 10.152.11.0 but the rest of the servers and even PCs, I received only RTOs. and anothing thing sir that when i access the 1 server that i could ping, i can login to it but cant access inside of the services? please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Feb 2013 00:07:38 GMT</pubDate>
    <dc:creator>ejnavarro06</dc:creator>
    <dc:date>2013-02-12T00:07:38Z</dc:date>
    <item>
      <title>Intermittent Internet Connection and VPN clients can't ping internal LAN but connected after installating cisco ASA5512x</title>
      <link>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193802#M356884</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wish someone can help me on this, I'm a new guy on cisco firewalls and I'm currently implementing cisco asa 5512x, here are the details:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP -&amp;gt;&amp;nbsp; Firewall -&amp;gt; Core switch -&amp;gt; Internal LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;after installing the cisco asa and terminating the appropriate lan for the outside and inside interfaces, internet seems intermittent and cisco vpn client can connect with internet connection but can't ping internal LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's my configuration from my firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2 &lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;hostname ciscofirewall&lt;BR /&gt;enable password 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 203.x.x.x 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.152.11.15 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;name-server 4.2.2.2 -------&amp;gt; public DNS&lt;BR /&gt;name-server 8.8.8.8 -------&amp;gt; public&lt;/P&gt;&lt;P&gt;name-server 203.x.x.x&amp;nbsp;&amp;nbsp; ----&amp;gt; Clients DNS&lt;BR /&gt;name-server 203.x.x.x&amp;nbsp; -----&amp;gt; Clients DNS&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network net_access&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network citrix_server&lt;BR /&gt;host 10.152.11.21&lt;BR /&gt;object network NETWORK_OBJ_10.10.10.0_28&lt;BR /&gt;subnet 10.10.10.0 255.255.255.240&lt;BR /&gt;object network NETWORK_OBJ_10.0.0.0_8&lt;BR /&gt;subnet 10.0.0.0 255.0.0.0&lt;BR /&gt;object network InterconHotel&lt;BR /&gt;subnet 10.152.11.0 255.255.255.0&lt;BR /&gt;access-list net_surf extended permit ip any any &lt;BR /&gt;access-list net_surf extended permit ip object NETWORK_OBJ_10.10.10.0_28 object InterconHotel &lt;BR /&gt;access-list outside_access extended permit tcp any object citrix_server eq www &lt;BR /&gt;access-list outside_access extended permit ip object NETWORK_OBJ_10.10.10.0_28 any &lt;BR /&gt;access-list outsidevpn_splitTunnelAcl standard permit 10.152.11.0 255.255.255.0 &lt;BR /&gt;access-list LAN_Users remark LAN_clients&lt;BR /&gt;access-list LAN_Users standard permit any &lt;BR /&gt;access-list vpnpool extended permit ip 10.10.10.0 255.255.255.248 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu management 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;ip local pool vpnpool 10.10.10.1-10.10.10.6 mask 255.255.255.248&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.10.10.0_28 NETWORK_OBJ_10.10.10.0_28 destination static NETWORK_OBJ_10.10.10.0_28 NETWORK_OBJ_10.10.10.0_28 no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network net_access&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network citrix_server&lt;BR /&gt;nat (inside,outside) static 203.177.18.234 service tcp www www &lt;BR /&gt;object network NETWORK_OBJ_10.10.10.0_28&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;object network InterconHotel&lt;BR /&gt;nat (inside,outside) dynamic interface dns&lt;BR /&gt;access-group outside_access in interface outside&lt;BR /&gt;access-group net_surf out interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 203.x.x.x 1&lt;BR /&gt;route outside 10.10.10.0 255.255.255.248 10.152.11.15 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.0.0.100 255.255.255.255 inside&lt;BR /&gt;http 10.10.10.0 255.255.255.240 outside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs &lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map inside_map interface inside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 enable inside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;authentication crack&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet 10.152.11.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect-essentials&lt;BR /&gt;group-policy outsidevpn internal&lt;BR /&gt;group-policy outsidevpn attributes&lt;BR /&gt;dns-server value 203.x.x.x 203.x.x.x&lt;BR /&gt;vpn-tunnel-protocol ikev1 l2tp-ipsec ssl-client &lt;BR /&gt;split-tunnel-policy tunnelall&lt;BR /&gt;split-tunnel-network-list value outsidevpn_splitTunnelAcl&lt;BR /&gt;default-domain value interconti.com&lt;BR /&gt;address-pools value vpnpool&lt;BR /&gt;username test1 password i1lji/GiOWB67bAs encrypted privilege 5&lt;BR /&gt;username test1 attributes&lt;BR /&gt;vpn-group-policy outsidevpn&lt;BR /&gt;username mnlha password WlzjmENGEEZmT9LA encrypted&lt;BR /&gt;username mnlha attributes&lt;BR /&gt;vpn-group-policy outsidevpn&lt;BR /&gt;username cisco password 3USUcOPFUiMCO4Jk encrypted privilege 15&lt;BR /&gt;tunnel-group outsidevpn type remote-access&lt;BR /&gt;tunnel-group outsidevpn general-attributes&lt;BR /&gt;address-pool (inside) vpnpool&lt;BR /&gt;address-pool vpnpool&lt;BR /&gt;authentication-server-group (outside) LOCAL&lt;BR /&gt;default-group-policy outsidevpn&lt;BR /&gt;tunnel-group outsidevpn ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; user-statistics accounting&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;hpm topN enable&lt;BR /&gt;Cryptochecksum:edc30dda08e5800fc35b72dd6e1d88d7&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks. please help.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193802#M356884</guid>
      <dc:creator>ejnavarro06</dc:creator>
      <dc:date>2019-03-12T00:58:25Z</dc:date>
    </item>
    <item>
      <title>Intermittent Internet Connection and VPN clients can't ping inte</title>
      <link>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193803#M356885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you should change your nat-exemption rule to smth more general, like&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside,outside) source static &lt;STRONG&gt;any any&lt;/STRONG&gt; destination static NETWORK_OBJ_10.10.10.0_28&amp;nbsp; NETWORK_OBJ_10.10.10.0_28 no-proxy-arp route-lookup&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;'cause your inside networks are not the same as your vpn-pool subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plus, if you're trying to reach inside subnets, different from 10.152.11.0 255.255.255.0 (ip from wich subnet is assignet to your inside interface, and for wich above nat exception should be enough), you should check if routing is configured from that subnets to your vpn-pool-subnet through the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 07:01:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193803#M356885</guid>
      <dc:creator>Andrew Phirsov</dc:creator>
      <dc:date>2013-02-10T07:01:39Z</dc:date>
    </item>
    <item>
      <title>Intermittent Internet Connection and VPN clients can't ping inte</title>
      <link>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193804#M356886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; thanks Sir for the quick reply, so I will just change my nat-exemption and i should ready to ping internal subnets ? how about the intermittentcy of the internet connection being experienced ? does our asa is th culprit for it or i there any other reason? appreciate sir your feedback on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;again, let me give you my appreciation for the above update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Feb 2013 10:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193804#M356886</guid>
      <dc:creator>ejnavarro06</dc:creator>
      <dc:date>2013-02-10T10:44:58Z</dc:date>
    </item>
    <item>
      <title>Intermittent Internet Connection and VPN clients can't ping inte</title>
      <link>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193805#M356887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just did what you have posted above I can only ping 1 server address within the subnet of 10.152.11.0 but the rest of the servers and even PCs, I received only RTOs. and anothing thing sir that when i access the 1 server that i could ping, i can login to it but cant access inside of the services? please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Feb 2013 00:07:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/intermittent-internet-connection-and-vpn-clients-can-t-ping/m-p/2193805#M356887</guid>
      <dc:creator>ejnavarro06</dc:creator>
      <dc:date>2013-02-12T00:07:38Z</dc:date>
    </item>
  </channel>
</rss>

