<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic anyconnect vpn, can't get internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153222#M358037</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (outside,outside) source dynamic&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;NETWORK_OBJ_192.168.64.64_27&amp;nbsp; interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; Let me know who it goes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Apr 2013 04:16:09 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-04-17T04:16:09Z</dc:date>
    <item>
      <title>anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153221#M358036</link>
      <description>&lt;P&gt;hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;need help again...&amp;nbsp; my anyconnect vpn can't route to internet, but my inside interface can...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here' s my show run below,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;enable password NuLKvvWGg.x9HEKO encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.50 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.64.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test1.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.64.64_27&lt;/P&gt;&lt;P&gt; subnet 192.168.64.64 255.255.255.224&lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool inside-pool-vpn 192.168.64.70-192.168.64.90 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.64.64_27 NETWORK_OBJ_192.168.64.64_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.64.0 255.255.255.0 192.168.64.1 10&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS (inside) host 192.168.64.100&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=test1,dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=administrator,cn=Users,dc=test1,dc=com&lt;/P&gt;&lt;P&gt; server-type auto-detect&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa.test1.com&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate e0a96d51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082025c 308201c5 a0030201 020204e0 a96d5130 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003040 311b3019 06035504 03131263 6973636f 6173612e 74657374 312e636f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6d312130 1f06092a 864886f7 0d010902 16126369 73636f61 73612e74 65737431 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e636f6d 301e170d 31333034 31363139 34343139 5a170d32 33303431 34313934 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3431395a 3040311b 30190603 55040313 12636973 636f6173 612e7465 7374312e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6d31 21301f06 092a8648 86f70d01 09021612 63697363 6f617361 2e746573 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74312e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 818100e1 1fc4496f 3f5a18f6 2809edf7 a83b4a72 f04f0a9b c38a49f4 010055c1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5b433440 b942f442 1816b281 3e4489ee 8e96bc85 8549ae99 613a02af 5f3c963f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dca6c79a 568eaf4c 25cd92f4 6700cfdb 794f9d8a 26a805bf 7136f75d 9346bc8c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7d18e40e 954d626a 9cf4882d 573f9552 e70bb2f8 04933034 50d93bd4 1de2ed32 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 71ea5302 03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 80148a71 8795f669 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0435b43b 9290bfab a586025a a00a301d 0603551d 0e041604 148a7187 95f66904 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 35b43b92 90bfaba5 86025aa0 0a300d06 092a8648 86f70d01 01050500 03818100 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; bbba25e1 cf3926e6 682f5c42 08531f63 8d9f309a bad12c1e 2f610131 25a3e052 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3f81d48a 924bd871 dd041600 85f68816 5faa4210 5f5f75e9 c98f182f 873cf014 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1963122d e2fa9d35 b68e19a6 c47a6bd1 0d861234 2e1a8b01 cfc96ca7 de96ef59 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3dd6cbf4 1651386b 25b2240d 097c8b83 5720367b 86d38de2 229eddf8 9ebf0864&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside client-services port 443&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.64.40-192.168.64.60 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.1 192.168.64.100 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 200000 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain test1.com interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect profiles anyconnect-vpn_client_profile disk0:/anyconnect-vpn_client_profile.xml&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1 192.168.64.100&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev2 ssl-client &lt;/P&gt;&lt;P&gt; default-domain value test1.com&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value anyconnect-vpn_client_profile type user&lt;/P&gt;&lt;P&gt;username rickyv password gw5iJZK0zpRVc1Ur encrypted&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn general-attributes&lt;/P&gt;&lt;P&gt; address-pool inside-pool-vpn&lt;/P&gt;&lt;P&gt; authentication-server-group LDAPSERVERS LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_anyconnect-vpn&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias anyconnect-vpn enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:ee1ad0b35257ed2f09d75ebae6c4926c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the digital cert is self signed and vpn can connect easily and user will have shared path, meaning vpn is working properly but user have no internet routing, also can't ping gw 192.168.64.1 from vpn client. my asdm is 6.6.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for any comment you may add.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;neetu&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:29:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153221#M358036</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2019-03-12T01:29:50Z</dc:date>
    </item>
    <item>
      <title>anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153222#M358037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (outside,outside) source dynamic&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;NETWORK_OBJ_192.168.64.64_27&amp;nbsp; interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; Let me know who it goes&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 04:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153222#M358037</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-17T04:16:09Z</dc:date>
    </item>
    <item>
      <title>anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153223#M358038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i'll try this later... i'm at work...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot and more power.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 15:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153223#M358038</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-17T15:54:37Z</dc:date>
    </item>
    <item>
      <title>anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153224#M358039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure Neetu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remember to rate all of the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:03:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153224#M358039</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-17T17:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153225#M358041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry the ip change now, since i'm testing in the office, i have another 5515x in the office and another at home...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here's my show run with filter on nat...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run | i nat&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.0.80.32_27 NETWORK_OBJ_10.0.80.32_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now i changed it to your instruction&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run |&amp;nbsp; i nat&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic NETWORK_OBJ_10.0.80.32_27 interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it can't route to internet, so i tried&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run |&amp;nbsp; i nat&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic NETWORK_OBJ_10.0.80.32_27 interface&lt;/P&gt;&lt;P&gt;nat (outside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it still can't route my user vpn with internet...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153225#M358041</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-17T17:39:50Z</dc:date>
    </item>
    <item>
      <title>anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153226#M358043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neetu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the nat you had before should still be there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wanted to add one more:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic&amp;nbsp; NETWORK_OBJ_192.168.64.64_27&amp;nbsp; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the complete show run NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way that we could use another subnet range ( diferent from the inside network) ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153226#M358043</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-17T17:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153227#M358046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i also tried this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run | i nat&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.0.80.32_27 NETWORK_OBJ_10.0.80.32_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic NETWORK_OBJ_10.0.80.32_27 interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it didn't work...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yeah i could create another subnet...&amp;nbsp; how can i modify the current pool for the vpn, the wizard have no edit on vpn...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 17:54:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153227#M358046</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-17T17:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153228#M358047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay let's do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local-pool Anyconnect-test 192.168.100.1-192.168.100.100 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;tunnel-group anyconnect-vpn general-attributes&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no address-pool inside-pool-vpn&lt;/P&gt;&lt;P&gt; address-pool Anyconnect-test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Anyconnect_Pool_Julio&lt;/P&gt;&lt;P&gt;subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no &lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12.222222328186035px;"&gt;nat (outside,outside) source dynamic NETWORK_OBJ_10.0.80.32_27 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no nat (outside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt; &lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;nat (inside,outside)&amp;nbsp; 1 source static any any destination static&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;Anyconnect_Pool_Julio&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif; font-size: 10pt;"&gt;Anyconnect_Pool_Julio&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic &lt;SPAN style="font-size: 10pt;"&gt;Anyconnect_Pool_Julio&amp;nbsp; interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 18:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153228#M358047</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-17T18:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153229#M358048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i really appreciate your help...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;something is not right in my test environment in the office...&amp;nbsp; at home i can ping my AD host, but here in my office, it can't.&amp;nbsp; so i have to test this at home.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks and more power...&amp;nbsp; i will let you know later when i'm testing at home...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 21:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153229#M358048</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-17T21:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153230#M358049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sure, keep me updated&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 21:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153230#M358049</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-17T21:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153231#M358050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here's my testing at home...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 19:31:06.189 UTC Wed Apr 17 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;enable password NuLKvvWGg.x9HEKO encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.0.50 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.64.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name test1.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.64.64_27&lt;/P&gt;&lt;P&gt; subnet 192.168.64.64 255.255.255.224&lt;/P&gt;&lt;P&gt;object network anyconnect-pool&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool inside-pool-vpn 192.168.64.70-192.168.64.90 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;ip local pool anyconnect-test 192.168.100.1-192.168.100.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static anyconnect-pool anyconnect-pool&lt;/P&gt;&lt;P&gt;nat (outside,outside) source dynamic anyconnect-pool interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.64.0 255.255.255.0 192.168.64.1 10&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS (inside) host 192.168.64.100&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=test1,dc=com&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password Test123&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=administrator,cn=Users,dc=test1,dc=com&lt;/P&gt;&lt;P&gt; server-type auto-detect&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt; protocol esp encryption des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt; protocol esp encryption 3des&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt; protocol esp encryption aes&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt; protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt; protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name CN=ciscoasa.test1.com&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate d1ec6e51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082025c 308201c5 a0030201 020204d1 ec6e5130 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003040 311b3019 06035504 03131263 6973636f 6173612e 74657374 312e636f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6d312130 1f06092a 864886f7 0d010902 16126369 73636f61 73612e74 65737431 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e636f6d 301e170d 31333034 31373138 34353433 5a170d32 33303431 35313834 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3534335a 3040311b 30190603 55040313 12636973 636f6173 612e7465 7374312e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6d31 21301f06 092a8648 86f70d01 09021612 63697363 6f617361 2e746573 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74312e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 818100e1 1fc4496f 3f5a18f6 2809edf7 a83b4a72 f04f0a9b c38a49f4 010055c1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5b433440 b942f442 1816b281 3e4489ee 8e96bc85 8549ae99 613a02af 5f3c963f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dca6c79a 568eaf4c 25cd92f4 6700cfdb 794f9d8a 26a805bf 7136f75d 9346bc8c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7d18e40e 954d626a 9cf4882d 573f9552 e70bb2f8 04933034 50d93bd4 1de2ed32 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 71ea5302 03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 80148a71 8795f669 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0435b43b 9290bfab a586025a a00a301d 0603551d 0e041604 148a7187 95f66904 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 35b43b92 90bfaba5 86025aa0 0a300d06 092a8648 86f70d01 01050500 03818100 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3202994e d191cafc 1cc071f0 8539dc37 63583a74 e7437d34 d34fe975 6b1879a7 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8515c574 b03c4b95 d65b750f a389e989 dc3228dd 2ffeceb9 61e369a8 7c520bc2 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ea0a9044 a454924d 4afcff95 5732d904 1ea4a313 2a75d2bb d16674d5 625f4a22 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b622ab13 7d590e7d ea09e03c affc9744 3dbc234d 8241bf4b d1bcb0bd 3ab9534d&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; integrity sha&lt;/P&gt;&lt;P&gt; group 5 2&lt;/P&gt;&lt;P&gt; prf sha&lt;/P&gt;&lt;P&gt; lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside client-services port 443&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.64.40-192.168.64.60 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.1 192.168.64.100 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 200000 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain test1.com interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt; anyconnect profiles anyconnect-vpn_client_profile disk0:/anyconnect-vpn_client_profile.xml&lt;/P&gt;&lt;P&gt; anyconnect enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1 192.168.64.100&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev2 ssl-client &lt;/P&gt;&lt;P&gt; default-domain value test1.com&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value anyconnect-vpn_client_profile type user&lt;/P&gt;&lt;P&gt;username rickyv password gw5iJZK0zpRVc1Ur encrypted&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn general-attributes&lt;/P&gt;&lt;P&gt; address-pool anyconnect-test&lt;/P&gt;&lt;P&gt; authentication-server-group LDAPSERVERS LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy_anyconnect-vpn&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias anyconnect-vpn enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:158ae89723342648e472577f2fe7498c&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no luck on internet route...&amp;nbsp; but it still allowed me to ping host 192.168.64.100 or the AD host.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the original config above at home, it doesn't allow me to ping the GW 192.168.64.1 but as i said, it allows me to ping the ad host.&amp;nbsp; both configuration above and this new configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 03:35:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153231#M358050</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-18T03:35:23Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153232#M358051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neetu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 192.168.100.15 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provide me the results,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:30:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153232#M358051</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-18T16:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153233#M358052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here you go...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 192.168.100.15 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.0.100.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:52:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153233#M358052</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-18T16:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153234#M358053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neetu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I see you do not have any acl, let's create one JUST FOR the PACKET-TRACER test okay?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list TEST permit ip 192.168.100.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group TEST in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then the packet tracer again &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 16:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153234#M358053</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-18T16:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153235#M358054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 192.168.100.15 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;&lt;P&gt;ciscoasa# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153235#M358054</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-18T17:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153236#M358055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cap capout interface outside match tcp host x.x.x.x ( your Anyconnect client ip address) any eq 80&lt;/P&gt;&lt;P&gt;cap asp type asp-drop all circular-buffer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to connect to google&lt;/P&gt;&lt;P&gt;and provide&lt;/P&gt;&lt;P&gt;show cap capout&lt;/P&gt;&lt;P&gt;show cap asp | include x.x.x.x ( your client IP address)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153236#M358055</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-18T17:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153237#M358056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; i did split tunnelling of internet...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# conf t&lt;BR /&gt;ciscoasa(config)# access-list split-tunnel permit 10.0.100.0 255.255.255.0&lt;BR /&gt;ciscoasa(config)# group-policy GroupPolicy_anyconnect-vpn attributes&lt;BR /&gt;ciscoasa(config-group-policy)# split-tunnel-policy tunnelspecified&lt;BR /&gt;ciscoasa(config-group-policy)# split-tunnel-network-list value split-tunnel&lt;BR /&gt;ciscoasa(config-group-policy)# end&lt;BR /&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it now works internet on the vpn client, my problem in my office test environment is that vpn client can't route to inside network but on my home test environment, it can.&amp;nbsp; i just have to figure out, maybe my asa in the office have problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards and thank you... &lt;/P&gt;&lt;DIV class="mcePaste" id="_mcePaste" style="position: absolute; width: 1px; height: 1px; overflow: hidden; top: 0px; left: -10000px;"&gt;﻿&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:34:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153237#M358056</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-18T17:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153238#M358058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The split-tunneling should not be need it as by default we will tunnel all traffic...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the internet works right now it's because it's using the local connection, is not using the internet through the VPN,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 17:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153238#M358058</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-18T17:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153239#M358060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my test at home is working properly on routing of vpn to inside and also to the internet...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 19:03:06.849 UTC Thu Apr 18 2013&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.6(1)2 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;enable password NuLKvvWGg.x9HEKO encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 192.168.0.50 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.64.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/4&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/5&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name test1.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.64.64_27&lt;/P&gt;&lt;P&gt;subnet 192.168.64.64 255.255.255.224&lt;/P&gt;&lt;P&gt;access-list split-tunnel standard permit 10.0.64.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool inside-pool-vpn 192.168.64.70-192.168.64.90 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.64.64_27 NETWORK_OBJ_192.168.64.64_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.64.0 255.255.255.0 192.168.64.1 10&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server LDAPSERVERS (inside) host 192.168.64.100&lt;/P&gt;&lt;P&gt;ldap-base-dn dc=test1,dc=com&lt;/P&gt;&lt;P&gt;ldap-scope subtree&lt;/P&gt;&lt;P&gt;ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt;ldap-login-password Test123&lt;/P&gt;&lt;P&gt;ldap-login-dn cn=administrator,cn=Users,dc=test1,dc=com&lt;/P&gt;&lt;P&gt;server-type auto-detect&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;/P&gt;&lt;P&gt;protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;/P&gt;&lt;P&gt;protocol esp encryption aes-192&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;/P&gt;&lt;P&gt;protocol esp encryption aes&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;/P&gt;&lt;P&gt;protocol esp encryption 3des&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;/P&gt;&lt;P&gt;protocol esp encryption des&lt;/P&gt;&lt;P&gt;protocol esp integrity sha-1 md5&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;enrollment self&lt;/P&gt;&lt;P&gt;subject-name CN=ciscoasa.test1.com&lt;/P&gt;&lt;P&gt;proxy-ldc-issuer&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;certificate 6cfc6e51&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082025c 308201c5 a0030201 0202046c fc6e5130 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003040 311b3019 06035504 03131263 6973636f 6173612e 74657374 312e636f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6d312130 1f06092a 864886f7 0d010902 16126369 73636f61 73612e74 65737431 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e636f6d 301e170d 31333034 31373139 34393134 5a170d32 33303431 35313934 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3931345a 3040311b 30190603 55040313 12636973 636f6173 612e7465 7374312e &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 636f6d31 21301f06 092a8648 86f70d01 09021612 63697363 6f617361 2e746573 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 74312e63 6f6d3081 9f300d06 092a8648 86f70d01 01010500 03818d00 30818902 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 818100e1 1fc4496f 3f5a18f6 2809edf7 a83b4a72 f04f0a9b c38a49f4 010055c1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5b433440 b942f442 1816b281 3e4489ee 8e96bc85 8549ae99 613a02af 5f3c963f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dca6c79a 568eaf4c 25cd92f4 6700cfdb 794f9d8a 26a805bf 7136f75d 9346bc8c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7d18e40e 954d626a 9cf4882d 573f9552 e70bb2f8 04933034 50d93bd4 1de2ed32 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 71ea5302 03010001 a3633061 300f0603 551d1301 01ff0405 30030101 ff300e06 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03551d0f 0101ff04 04030201 86301f06 03551d23 04183016 80148a71 8795f669 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0435b43b 9290bfab a586025a a00a301d 0603551d 0e041604 148a7187 95f66904 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 35b43b92 90bfaba5 86025aa0 0a300d06 092a8648 86f70d01 01050500 03818100 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b99d2516 9ce771c6 460af456 f035c972 804ba3d9 ae743112 02cab6cf 197f4a80 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 974057bb 48de9476 653f192a b47a4df7 030e90a5 1aa14888 2f775350 8ba41267 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d05d6a12 cf8ffced 7a54f10f 688eae71 9cdc009f 78b8bf5d dfade190 d0881463 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 68555ab4 8d31b5a7 f3274305 a8654e30 f3f933eb 95e342f3 8d6a4376 a8eb8c85&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 1&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 10&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 20&lt;/P&gt;&lt;P&gt;encryption aes&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 30&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 policy 40&lt;/P&gt;&lt;P&gt;encryption des&lt;/P&gt;&lt;P&gt;integrity sha&lt;/P&gt;&lt;P&gt;group 5 2&lt;/P&gt;&lt;P&gt;prf sha&lt;/P&gt;&lt;P&gt;lifetime seconds 86400&lt;/P&gt;&lt;P&gt;crypto ikev2 enable outside client-services port 443&lt;/P&gt;&lt;P&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.64.40-192.168.64.60 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 192.168.0.1 192.168.64.100 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 200000 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain test1.com interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable outside&lt;/P&gt;&lt;P&gt;anyconnect image disk0:/anyconnect-win-2.5.2014-k9.pkg 1&lt;/P&gt;&lt;P&gt;anyconnect profiles anyconnect-vpn_client_profile disk0:/anyconnect-vpn_client_profile.xml&lt;/P&gt;&lt;P&gt;anyconnect enable&lt;/P&gt;&lt;P&gt;tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy_anyconnect-vpn attributes&lt;/P&gt;&lt;P&gt;wins-server none&lt;/P&gt;&lt;P&gt;dns-server value 192.168.0.1 192.168.64.100&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol ikev2 ssl-client &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value split-tunnel&lt;/P&gt;&lt;P&gt;default-domain value test1.com&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles value anyconnect-vpn_client_profile type user&lt;/P&gt;&lt;P&gt;username rickyv password gw5iJZK0zpRVc1Ur encrypted&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn general-attributes&lt;/P&gt;&lt;P&gt;address-pool inside-pool-vpn&lt;/P&gt;&lt;P&gt;authentication-server-group LDAPSERVERS LOCAL&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy_anyconnect-vpn&lt;/P&gt;&lt;P&gt;tunnel-group anyconnect-vpn webvpn-attributes&lt;/P&gt;&lt;P&gt;group-alias anyconnect-vpn enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:d93fe36a4b479e88bb6b4e2d7dc469f1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;although i have routing from vpn client to inside network but below tracer route is like that on the output...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside icmp 192.168.64.70 8 0 6 192.168.64.100&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.64.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_192.168.64.64_27 NETWORK_OBJ_192.168.64.64_27 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 192.168.64.100/0 to 192.168.64.100/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule &lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyways, everything is working fine... maybe the wrong netmask on my office with 24.0.0.0 is making the routing wrong, as i said my ISP told me it's suppose to be 255.255.255.248.&amp;nbsp; i will test this sunday and i will let you know...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks and more power!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 03:12:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153239#M358060</guid>
      <dc:creator>Neetu Bhushan</dc:creator>
      <dc:date>2013-04-19T03:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: anyconnect vpn, can't get internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153240#M358061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Neetu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, do that,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the configuration looks good, the packet tracer will always show a drop as the traffic is supposed to come encrypted,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the Split tunnel should not be need it if we are doing a tunnel all.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway keep us post&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 03:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-can-t-get-internet/m-p/2153240#M358061</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-19T03:39:30Z</dc:date>
    </item>
  </channel>
</rss>

