<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510: Routing from ezVPN Client to non-LAN Zone in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184884#M361478</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have attached the config - had to edit a bit to keep it somewhat safe - and the Screnshot from the Packet Tracer.&lt;/P&gt;&lt;P&gt;Hope it helps you to understand the Problem and the cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankx in advance for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Feb 2013 15:20:13 GMT</pubDate>
    <dc:creator>society-gmbh</dc:creator>
    <dc:date>2013-02-25T15:20:13Z</dc:date>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184881#M361472</link>
      <description>&lt;P&gt;Good Day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got a Problem with Routing on a ASA5510.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ezVPN Clients connected to the ASA5510. Those Clients are assigned an IP from 192.168.236.0/24 Pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Router of a contractor connected to a dedicated ASA Interface called IBIZA with IP Net 10.100.10.0/24 and the Router itself with the IP 10.100.10.1. Behind that Router is another private Network which I need to reach from the ezVPN Clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Connection from the ezVPN Clients to the "LAN" Interface/Network on the ASA works fine, but I cannot reach either the Contractor Router (10.100.10.1) nor the Network behind that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the LAN Network (on the LAN Interface) I can reach both the Contractor Router and the Network behind.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I use the Packet Tracer Tool from the ASDM it tells me that the Traffic goes through but ends on the LAN Interface.&lt;/P&gt;&lt;P&gt;But it should end on the IBIZA Interface or am I wrong here ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do I need to tell the ASA to route the Traffic from the ezVPN Client to the Contractor Router and back ?&lt;/P&gt;&lt;P&gt;I have set up the ezVPN Connection as full-tunnel so all Traffic goes through the VPN Tunnel. That shouldn´t be the Problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankful for any suggestions/ideas.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184881#M361472</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2019-03-12T01:05:07Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184882#M361474</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest way to go about solving this would be to see the ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though at this point I suspect it somehow due to NAT configurations on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 13:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184882#M361474</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T13:27:58Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184883#M361476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also please attach the "packet-tracer" output you have done to test this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 13:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184883#M361476</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T13:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184884#M361478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have attached the config - had to edit a bit to keep it somewhat safe - and the Screnshot from the Packet Tracer.&lt;/P&gt;&lt;P&gt;Hope it helps you to understand the Problem and the cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankx in advance for your help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 15:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184884#M361478</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2013-02-25T15:20:13Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184885#M361480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I cant open either of the attachement files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either they are being scanned for viruses (not by my computer but by the actual site) or I can download them but they are damaged files.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So until I can actually access them I cant really help you with this &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ofcourse there is always the wonderfull Copy/Paste &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 15:54:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184885#M361480</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T15:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184886#M361481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tells me they are scanned for viruses too. So I guess it is a feature of the community software used here.&lt;/P&gt;&lt;P&gt;I will check tomorrow if the scanning is one or post via Copy-Paste.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankx &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 16:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184886#M361481</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2013-02-25T16:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184887#M361483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm. seems the FileUpload Feature of the Community is Buggy so here is the config in plain text.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname DE-BN1-fw1&lt;/P&gt;&lt;P&gt;domain-name cuscomer.de&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Internet&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address XXX.XXX.243.43 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address ASA-Inside 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; speed 10&lt;/P&gt;&lt;P&gt; duplex half&lt;/P&gt;&lt;P&gt; nameif IBIZA&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 10.100.10.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description Internet Backup Interface&lt;/P&gt;&lt;P&gt; nameif Internet-LTE&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 192.168.240.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa843-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns domain-lookup Internet&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 145.254.2.11&lt;/P&gt;&lt;P&gt; name-server 145.254.2.75&lt;/P&gt;&lt;P&gt; domain-name customer.de&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network mail&lt;/P&gt;&lt;P&gt; host XXX.XXX.243.42&lt;/P&gt;&lt;P&gt;object network IBIZA-SERVER&lt;/P&gt;&lt;P&gt; host XX.XX.106.235&lt;/P&gt;&lt;P&gt;object network Network1&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Class-C Netz Network 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Network20_Netz_intern&lt;/P&gt;&lt;P&gt; subnet 172.19.8.0 255.255.252.0&lt;/P&gt;&lt;P&gt;object network Network7&lt;/P&gt;&lt;P&gt; subnet 192.168.7.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network ASA-Outside&lt;/P&gt;&lt;P&gt; host 80.150.243.43&lt;/P&gt;&lt;P&gt; description ASA Interface Outside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Notes-Zentrale&lt;/P&gt;&lt;P&gt; host 192.168.1.20&lt;/P&gt;&lt;P&gt;object network AP-Schmidt&lt;/P&gt;&lt;P&gt; host 192.168.1.112&lt;/P&gt;&lt;P&gt;object network Alle_Netze_192_168_0_0&lt;/P&gt;&lt;P&gt; subnet 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network ASA-Inside&lt;/P&gt;&lt;P&gt; host 192.168.1.1&lt;/P&gt;&lt;P&gt; description ASA Interface Inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network DE-B2-01&lt;/P&gt;&lt;P&gt; host 192.168.7.10&lt;/P&gt;&lt;P&gt; description Domino und Fileserver Berlin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Network2&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Class-C Netz Network 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Network4&lt;/P&gt;&lt;P&gt; subnet 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Class-C Netz Network4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Network6&lt;/P&gt;&lt;P&gt; subnet 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Class-C Netz Network 6 &lt;/P&gt;&lt;P&gt;object network Society-NAT&lt;/P&gt;&lt;P&gt; host XXX.XXX.222.254&lt;/P&gt;&lt;P&gt;object network hermes&lt;/P&gt;&lt;P&gt; host XXX.XXX.222.200&lt;/P&gt;&lt;P&gt;object network zentrale&lt;/P&gt;&lt;P&gt; host 192.168.1.20&lt;/P&gt;&lt;P&gt; description Domino Server Zentrale&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network DE-BN1-01&lt;/P&gt;&lt;P&gt; host 192.168.1.10&lt;/P&gt;&lt;P&gt; description Fileserver&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network DE-BN2-01&lt;/P&gt;&lt;P&gt; host 192.168.2.20&lt;/P&gt;&lt;P&gt; description NotesSRV LCC&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network DMS-SRV&lt;/P&gt;&lt;P&gt; host 192.168.1.11&lt;/P&gt;&lt;P&gt; description DMS-SRV BN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network DE-B2-02&lt;/P&gt;&lt;P&gt; host 192.168.7.1&lt;/P&gt;&lt;P&gt; description Linux Firewall Berlin&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network VPN_Remote_Clients_Netz&lt;/P&gt;&lt;P&gt; subnet 192.168.236.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network ASA_Interface_IBIZA&lt;/P&gt;&lt;P&gt; host 10.100.10.1&lt;/P&gt;&lt;P&gt;object network EAPS_VMWare_Host&lt;/P&gt;&lt;P&gt; host 192.168.1.200&lt;/P&gt;&lt;P&gt;object network EAPS_VM_PP_1&lt;/P&gt;&lt;P&gt; host 192.168.1.201&lt;/P&gt;&lt;P&gt;object network EAPS_VM_PP_2&lt;/P&gt;&lt;P&gt; host 192.168.1.202&lt;/P&gt;&lt;P&gt;object network EAPS_VM_PP_3&lt;/P&gt;&lt;P&gt; host 192.168.1.203&lt;/P&gt;&lt;P&gt;object network EAPS_VM_PP_4&lt;/P&gt;&lt;P&gt; host 192.168.1.204&lt;/P&gt;&lt;P&gt;object network IBIZA_TransferNetz&lt;/P&gt;&lt;P&gt; subnet 10.100.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Zentrale-webmail&lt;/P&gt;&lt;P&gt; host 192.168.1.20&lt;/P&gt;&lt;P&gt; description WebMail&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network IBIZA-Netzwerk-Neu&lt;/P&gt;&lt;P&gt; subnet XXX.115.17.40 255.255.255.248&lt;/P&gt;&lt;P&gt; description IBIZA Netzwerk Neu&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;object network Notes-Service&lt;/P&gt;&lt;P&gt; host 192.168.1.15&lt;/P&gt;&lt;P&gt;object network Notes-Berlin2&lt;/P&gt;&lt;P&gt; host 192.168.7.20&lt;/P&gt;&lt;P&gt;object network Notes-LCC&lt;/P&gt;&lt;P&gt; host 192.168.2.10&lt;/P&gt;&lt;P&gt;object network HoBre-Heim-AP&lt;/P&gt;&lt;P&gt; subnet 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Network5&lt;/P&gt;&lt;P&gt; subnet 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network Network10&lt;/P&gt;&lt;P&gt; subnet 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Remote-Admin-Gruppe&lt;/P&gt;&lt;P&gt; network-object object Society-NAT&lt;/P&gt;&lt;P&gt;object-group network Netze&lt;/P&gt;&lt;P&gt; network-object object Network7&lt;/P&gt;&lt;P&gt; network-object object Network1&lt;/P&gt;&lt;P&gt; network-object object Network2&lt;/P&gt;&lt;P&gt; network-object object Network4&lt;/P&gt;&lt;P&gt; network-object object Network5&lt;/P&gt;&lt;P&gt; network-object object Network6&lt;/P&gt;&lt;P&gt; network-object object Network10&lt;/P&gt;&lt;P&gt;object-group service TOUR&lt;/P&gt;&lt;P&gt; service-object tcp destination range 4101 4101 &lt;/P&gt;&lt;P&gt;object-group network VPN-Netzwerke&lt;/P&gt;&lt;P&gt; network-object object VPN_Remote_Clients_Netz&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq 390 &lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group protocol IP_ICMP&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_2&lt;/P&gt;&lt;P&gt; network-object object Notes-Backup&lt;/P&gt;&lt;P&gt; network-object object zentrale&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object object Notes-Backup&lt;/P&gt;&lt;P&gt; network-object object zentrale&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_4&lt;/P&gt;&lt;P&gt; network-object object Notes-Backup&lt;/P&gt;&lt;P&gt; network-object object zentrale&lt;/P&gt;&lt;P&gt; network-object object Notes-Service&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;/P&gt;&lt;P&gt; icmp-object echo-reply&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_5&lt;/P&gt;&lt;P&gt; network-object object Notes-Service&lt;/P&gt;&lt;P&gt; network-object object Notes-Zentrale&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq 390 &lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp &lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_2&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq 8043&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_7&lt;/P&gt;&lt;P&gt; network-object object Society-NAT&lt;/P&gt;&lt;P&gt; group-object TOUR-Datenabgleich&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_8&lt;/P&gt;&lt;P&gt; network-object object AP-Schmidt&lt;/P&gt;&lt;P&gt; network-object object ASA-Outside&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_9&lt;/P&gt;&lt;P&gt; network-object object DMS-SRV&lt;/P&gt;&lt;P&gt; network-object object EAPS_VM_PP_1&lt;/P&gt;&lt;P&gt; network-object object EAPS_VM_PP_2&lt;/P&gt;&lt;P&gt; network-object object EAPS_VM_PP_3&lt;/P&gt;&lt;P&gt; network-object object EAPS_VM_PP_4&lt;/P&gt;&lt;P&gt; network-object object Notes-Zentrale&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_6&lt;/P&gt;&lt;P&gt; network-object object zentrale&lt;/P&gt;&lt;P&gt; network-object object ASA-Outside&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_10&lt;/P&gt;&lt;P&gt; network-object object Network7&lt;/P&gt;&lt;P&gt; network-object object Network1&lt;/P&gt;&lt;P&gt; network-object object Network2&lt;/P&gt;&lt;P&gt; network-object object Network4&lt;/P&gt;&lt;P&gt; network-object object Network5&lt;/P&gt;&lt;P&gt; network-object object Network6&lt;/P&gt;&lt;P&gt; network-object object Network10&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_4&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt;object-group service LotusNotes tcp&lt;/P&gt;&lt;P&gt; port-object eq lotusnotes&lt;/P&gt;&lt;P&gt;object-group network IBIZA&lt;/P&gt;&lt;P&gt; network-object object IBIZA-Netzwerk-Neu&lt;/P&gt;&lt;P&gt; network-object object IBIZA-SERVER&lt;/P&gt;&lt;P&gt;object-group icmp-type DM_INLINE_ICMP_2&lt;/P&gt;&lt;P&gt; icmp-object time-exceeded&lt;/P&gt;&lt;P&gt; icmp-object unreachable&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_11&lt;/P&gt;&lt;P&gt; network-object object Network7&lt;/P&gt;&lt;P&gt; network-object object HoBre-Heim-AP&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_12&lt;/P&gt;&lt;P&gt; group-object Remote-Admin-Gruppe&lt;/P&gt;&lt;P&gt; network-object object aunt&lt;/P&gt;&lt;P&gt; object-group protocol DM_INLINE_PROTOCOL_5&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_13&lt;/P&gt;&lt;P&gt; network-object 10.100.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; group-object IBIZA&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_14&lt;/P&gt;&lt;P&gt; network-object object VPN_Remote_Clients_Netz&lt;/P&gt;&lt;P&gt; network-object object HoBre-Heim-AP&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_6&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip any object-group VPN-Netzwerke log &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip object-group DM_INLINE_NETWORK_4 object mail &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip object-group Netze object IBIZA-SERVER &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip object Network1 object Network20 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip object Network1 object Network7 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip object Network1 object ASA-Outside &lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit icmp any any object-group DM_INLINE_ICMP_1 &lt;/P&gt;&lt;P&gt;access-list Internet_access_in remark Lotus Notes Webmail Zugriff&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit tcp any object Notes-Zentrale eq https log &lt;/P&gt;&lt;P&gt;access-list Internet_access_in remark Society Lotus Notes Zugriff (Notes-Protokoll)&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit object-group DM_INLINE_SERVICE_1 object mail object-group DM_INLINE_NETWORK_2 log &lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit tcp object-group Remote-Admin-Gruppe object Notes-Zentrale eq lotusnotes log &lt;/P&gt;&lt;P&gt;access-list Internet_access_in remark TOUR Update auf AP Schmidt&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit object-group TOUR object-group DM_INLINE_NETWORK_1 object AP-Schmidt log &lt;/P&gt;&lt;P&gt;access-list Internet_access_in remark SMTP-Routing eingehende Emails&lt;/P&gt;&lt;P&gt;access-list Network1 standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Network1 standard permit 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internet_cryptomap_65535.1 extended permit ip object Network7 object IBIZA-SERVER &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Split_Networks_West standard permit 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Society_splitTunnelAcl standard permit any &lt;/P&gt;&lt;P&gt;access-list Internet_nat0_outbound extended permit ip object mail object-group DM_INLINE_NETWORK_3 &lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit tcp any host 87.79.27.245 eq ssh log warnings &lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group TCPUDP object-group DM_INLINE_NETWORK_14 object-group IBIZA log warnings &lt;/P&gt;&lt;P&gt;access-list LAN_access_in remark IBIZA Zugriff&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group IP_ICMP object-group Netze object-group IBIZA log notifications &lt;/P&gt;&lt;P&gt;access-list LAN_access_in remark Voller Internetzugriff aus dem LAN&lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any any &lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit object-group DM_INLINE_PROTOCOL_2 object-group Netze object ASA-Inside &lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit object-group DM_INLINE_PROTOCOL_6 object VPN_Remote_Clients_Netz any log notifications &lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark Allow ICMP Type 11 for Windows tracert&lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit object-group DM_INLINE_SERVICE_2 object mail object-group DM_INLINE_NETWORK_5 &lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit icmp any any object-group DM_INLINE_ICMP_2 &lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark Email-Routing eingehender Emails&lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark Zugriff Network7 via VPN&lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit object-group DM_INLINE_PROTOCOL_3 object-group DM_INLINE_NETWORK_11 object Network1 &lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark Webmail Zugriff aus dem Internet&lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark 8043/mail/&lt;MAILDB&gt;&lt;/MAILDB&gt;&lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit tcp any object-group DM_INLINE_NETWORK_6 object-group DM_INLINE_TCP_1 &lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark TOUR Update Zugriff&lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit tcp object-group DM_INLINE_NETWORK_7 object-group DM_INLINE_NETWORK_8 eq 4101 &lt;/P&gt;&lt;P&gt;access-list outside-in-acl remark Direkter Lotus Notes Zugriff für Society&lt;/P&gt;&lt;P&gt;access-list outside-in-acl extended permit tcp object-group DM_INLINE_NETWORK_12 object zentrale eq lotusnotes log disable &lt;/P&gt;&lt;P&gt;access-list ohne_LCC standard permit 192.168.6.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ohne_LCC standard permit 192.168.4.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ohne_LCC standard permit 192.168.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ohne_LCC standard permit 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ohne_LCC standard permit 192.168.7.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Internet_cryptomap extended permit ip object Network1 object Network20 &lt;/P&gt;&lt;P&gt;access-list DSGV_VPN_in remark Zugang &lt;/P&gt;&lt;P&gt;access-list DSGV_VPN_in extended permit ip object Network20 object-group DM_INLINE_NETWORK_9 log disable &lt;/P&gt;&lt;P&gt;access-list DSGV_VPN_in extended deny ip any any &lt;/P&gt;&lt;P&gt;access-list IBIZA_access_in extended permit object-group DM_INLINE_PROTOCOL_4 object-group DM_INLINE_NETWORK_13 object-group DM_INLINE_NETWORK_10 &lt;/P&gt;&lt;P&gt;access-list IBIZA_access_in extended permit object-group DM_INLINE_PROTOCOL_5 any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging asdm-buffer-size 512&lt;/P&gt;&lt;P&gt;logging trap warnings&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;logging facility 23&lt;/P&gt;&lt;P&gt;logging host LAN Notes-Backup&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;logging rate-limit 1 9999999 message 313004&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu IBIZA 1500&lt;/P&gt;&lt;P&gt;mtu Internet-LTE 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN-Clients-Pool 192.168.236.10-192.168.236.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no monitor-interface Internet&lt;/P&gt;&lt;P&gt;no monitor-interface LAN&lt;/P&gt;&lt;P&gt;no monitor-interface IBIZA&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 300&lt;/P&gt;&lt;P&gt;nat (Internet,LAN) source static mail mail destination static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt;nat (Internet,IBIZA) source static mail mail destination static DM_INLINE_NETWORK_3 DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static any any destination static VPN-Netzwerke VPN-Netzwerke&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static DM_INLINE_NETWORK_4 DM_INLINE_NETWORK_4 destination static mail mail&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Netze Netze destination static IBIZA IBIZA&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Network1 Network1 destination static Network20 Network20&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Network1 Network1 destination static Network7 Network7&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Network1 Network1 destination static ASA-Outside ASA-Outside&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Network2 Network2 destination static Network7 Network7&lt;/P&gt;&lt;P&gt;nat (LAN,any) source static Network1 Network1 destination static HoBre-Heim-AP HoBre-Heim-AP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network AP-Schmidt&lt;/P&gt;&lt;P&gt; nat (LAN,Internet) static interface service tcp 4101 4101 &lt;/P&gt;&lt;P&gt;object network Alle_Netze_192_168_0_0&lt;/P&gt;&lt;P&gt; nat (LAN,Internet) dynamic interface&lt;/P&gt;&lt;P&gt;object network zentrale&lt;/P&gt;&lt;P&gt; nat (LAN,Internet) static interface service tcp lotusnotes lotusnotes &lt;/P&gt;&lt;P&gt;object network Zentrale-webmail&lt;/P&gt;&lt;P&gt; nat (any,Internet) static interface service tcp https 8043 &lt;/P&gt;&lt;P&gt;object network Notes-Service&lt;/P&gt;&lt;P&gt; nat (LAN,Internet) static interface service tcp smtp smtp &lt;/P&gt;&lt;P&gt;access-group outside-in-acl in interface Internet&lt;/P&gt;&lt;P&gt;access-group LAN_access_in in interface LAN&lt;/P&gt;&lt;P&gt;access-group IBIZA_access_in in interface IBIZA&lt;/P&gt;&lt;P&gt;route Internet 0.0.0.0 0.0.0.0 80.150.243.41 1&lt;/P&gt;&lt;P&gt;route IBIZA IBIZA-SERVER 255.255.255.255 IBIZA-BINTEC-ROUTER 1&lt;/P&gt;&lt;P&gt;route IBIZA XX.115.17.40 255.255.255.248 IBIZA-BINTEC-ROUTER 1&lt;/P&gt;&lt;P&gt;route LAN LCC-Bonn 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.3.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.4.0 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.5.0 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.6.0 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.7.0 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.10.0 255.255.255.0 192.168.1.252 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http server idle-timeout 15&lt;/P&gt;&lt;P&gt;http Society-NAT 255.255.255.255 Internet&lt;/P&gt;&lt;P&gt;http 80.156.188.90 255.255.255.255 Internet&lt;/P&gt;&lt;P&gt;http Network1 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;http 81.173.222.136 255.255.255.255 Internet&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sysopt connection tcpmss 0&lt;/P&gt;&lt;P&gt;sysopt noproxyarp Internet&lt;/P&gt;&lt;P&gt;sysopt noproxyarp LAN&lt;/P&gt;&lt;P&gt;sysopt noproxyarp IBIZA&lt;/P&gt;&lt;P&gt;no service resetoutbound interface IBIZA&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map Internet_dyn_map 1 match address Internet_cryptomap_65535.1&lt;/P&gt;&lt;P&gt;crypto dynamic-map Internet_dyn_map 1 set ikev1 transform-set ESP-AES-256-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 1 match address Internet_cryptomap&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 1 set pfs group5&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 1 set peer XXX.158.227.34 &lt;/P&gt;&lt;P&gt;crypto map Internet_map0 1 set ikev1 transform-set ESP-AES-256-SHA&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 1 set nat-t-disable&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 65534 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 65535 ipsec-isakmp dynamic Internet_dyn_map&lt;/P&gt;&lt;P&gt;crypto map Internet_map0 interface Internet&lt;/P&gt;&lt;P&gt;crypto ikev1 enable Internet&lt;/P&gt;&lt;P&gt;crypto ikev1 ipsec-over-tcp port 10000 &lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 5&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh Society-NAT 255.255.255.255 Internet&lt;/P&gt;&lt;P&gt;ssh Network1 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;vpdn username XXXXXXXXXXX password ***** store-local&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;vpn load-balancing &lt;/P&gt;&lt;P&gt; interface lbpublic IBIZA&lt;/P&gt;&lt;P&gt; interface lbprivate IBIZA&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun except ip-address Network1 255.255.255.0&lt;/P&gt;&lt;P&gt;threat-detection scanning-threat shun duration 3600&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ntp server 192.53.103.108 source Internet&lt;/P&gt;&lt;P&gt;ntp server 192.53.103.104 source Internet&lt;/P&gt;&lt;P&gt;tftp-server LAN DE-BN1-01 WTR-ASA5510-&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy West internal&lt;/P&gt;&lt;P&gt;group-policy West attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.7.10&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain value customer.de&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.10&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ssl-client &lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ask enable default anyconnect timeout 30&lt;/P&gt;&lt;P&gt;group-policy Network20 internal&lt;/P&gt;&lt;P&gt;group-policy Network20 attributes&lt;/P&gt;&lt;P&gt; banner none&lt;/P&gt;&lt;P&gt; wins-server value 192.168.1.10&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10&lt;/P&gt;&lt;P&gt; dhcp-network-scope none&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 3&lt;/P&gt;&lt;P&gt; vpn-idle-timeout 30&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter value DSGV_VPN_in&lt;/P&gt;&lt;P&gt; ipv6-vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns none&lt;/P&gt;&lt;P&gt; intercept-dhcp disable&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout none&lt;/P&gt;&lt;P&gt; ip-phone-bypass disable&lt;/P&gt;&lt;P&gt; leap-bypass disable&lt;/P&gt;&lt;P&gt; nem disable&lt;/P&gt;&lt;P&gt; backup-servers keep-client-config&lt;/P&gt;&lt;P&gt; msie-proxy server none&lt;/P&gt;&lt;P&gt; msie-proxy method no-modify&lt;/P&gt;&lt;P&gt; msie-proxy except-list none&lt;/P&gt;&lt;P&gt; msie-proxy local-bypass disable&lt;/P&gt;&lt;P&gt; msie-proxy pac-url none&lt;/P&gt;&lt;P&gt; vlan none&lt;/P&gt;&lt;P&gt; address-pools none&lt;/P&gt;&lt;P&gt; ipv6-address-pools none&lt;/P&gt;&lt;P&gt; smartcard-removal-disconnect enable&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list none&lt;/P&gt;&lt;P&gt;&amp;nbsp; filter none&lt;/P&gt;&lt;P&gt;&amp;nbsp; homepage none&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward disable &lt;/P&gt;&lt;P&gt;&amp;nbsp; http-proxy disable&lt;/P&gt;&lt;P&gt;&amp;nbsp; sso-server none&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl dtls enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect mtu 1406&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl keepalive 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl rekey time none&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl rekey method none&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect dpd-interval client 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect dpd-interval gateway 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ssl compression deflate&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect modules none&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect profiles none&lt;/P&gt;&lt;P&gt;&amp;nbsp; anyconnect ask enable default anyconnect timeout 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; customization value DfltCustomization&lt;/P&gt;&lt;P&gt;&amp;nbsp; keep-alive-ignore 4&lt;/P&gt;&lt;P&gt;&amp;nbsp; http-comp gzip&lt;/P&gt;&lt;P&gt;&amp;nbsp; user-storage none&lt;/P&gt;&lt;P&gt;&amp;nbsp; storage-objects value credentials,cookies&lt;/P&gt;&lt;P&gt;&amp;nbsp; storage-key none&lt;/P&gt;&lt;P&gt;&amp;nbsp; hidden-shares none&lt;/P&gt;&lt;P&gt;&amp;nbsp; smart-tunnel disable&lt;/P&gt;&lt;P&gt;&amp;nbsp; activex-relay enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-entry enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; file-browsing enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-entry enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.&lt;/P&gt;&lt;P&gt;&amp;nbsp; smart-tunnel auto-signon disable&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt;group-policy Society2 internal&lt;/P&gt;&lt;P&gt;group-policy Society2 attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.7.10&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list none&lt;/P&gt;&lt;P&gt; default-domain value customer.de&lt;/P&gt;&lt;P&gt;group-policy Society internal&lt;/P&gt;&lt;P&gt;group-policy Society attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.7.10&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/P&gt;&lt;P&gt; password-storage enable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Networks_West&lt;/P&gt;&lt;P&gt; default-domain value customer.de&lt;/P&gt;&lt;P&gt;group-policy ezVPN_HBre_Home internal&lt;/P&gt;&lt;P&gt;group-policy ezVPN_HBre_Home attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.1.20&lt;/P&gt;&lt;P&gt; vpn-access-hours none&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 1&lt;/P&gt;&lt;P&gt; vpn-idle-timeout none&lt;/P&gt;&lt;P&gt; vpn-session-timeout none&lt;/P&gt;&lt;P&gt; vpn-filter none&lt;/P&gt;&lt;P&gt; ipv6-vpn-filter none&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; password-storage enable&lt;/P&gt;&lt;P&gt; ip-comp enable&lt;/P&gt;&lt;P&gt; re-xauth disable&lt;/P&gt;&lt;P&gt; group-lock none&lt;/P&gt;&lt;P&gt; pfs enable&lt;/P&gt;&lt;P&gt; ipsec-udp enable&lt;/P&gt;&lt;P&gt; ipsec-udp-port 10000&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Split_Networks_West&lt;/P&gt;&lt;P&gt; split-dns value customer.de&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout none&lt;/P&gt;&lt;P&gt; ip-phone-bypass enable&lt;/P&gt;&lt;P&gt; leap-bypass enable&lt;/P&gt;&lt;P&gt; nem enable&lt;/P&gt;&lt;P&gt; vlan none&lt;/P&gt;&lt;P&gt; nac-settings none&lt;/P&gt;&lt;P&gt; smartcard-removal-disconnect enable&lt;/P&gt;&lt;P&gt;group-policy ezVPN_Berlin internal&lt;/P&gt;&lt;P&gt;group-policy ezVPN_Berlin attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.10 192.168.1.20&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Network20&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout none&lt;/P&gt;&lt;P&gt; ip-phone-bypass disable&lt;/P&gt;&lt;P&gt; leap-bypass disable&lt;/P&gt;&lt;P&gt; nem enable&lt;/P&gt;&lt;P&gt;username root password XXXXXXXXXXXXXXXXXXXXXX encrypted privilege 15&lt;/P&gt;&lt;P&gt;username root attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy DfltGrpPolicy&lt;/P&gt;&lt;P&gt; vpn-simultaneous-logins 0&lt;/P&gt;&lt;P&gt; vpn-session-timeout 1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec &lt;/P&gt;&lt;P&gt; password-storage disable&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_Berlin type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_Berlin general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy ezVPN_Berlin&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_Berlin ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group Society type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Society general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-Clients-Pool&lt;/P&gt;&lt;P&gt; default-group-policy Society&lt;/P&gt;&lt;P&gt;tunnel-group Society ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group West type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group West general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN-Clients-Pool&lt;/P&gt;&lt;P&gt; default-group-policy West&lt;/P&gt;&lt;P&gt;tunnel-group West ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group XXX.158.227.34 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group XXX.158.227.34 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy West_VPN_DSG&lt;/P&gt;&lt;P&gt;tunnel-group XXX.158.227.34 ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group WTR_SSL type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_HBre_Home type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_HBre_Home general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy GroupPolicy1&lt;/P&gt;&lt;P&gt;tunnel-group ezVPN_HBre_Home ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map dynamic-filter-snoop &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;Cryptochecksum:6a5a94f2fcd80c8566747a7fb726efb1&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;asdm location Alle_Netze_192_168_0_0 255.255.0.0 LAN&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 11:08:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184887#M361483</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2013-02-26T11:08:59Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184888#M361485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is so much configuration I am not exactly sure which "tunnel-group" was the one used for this EzVPN connection without looking through it some more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general if the VPN is Full Tunnel where all the connections are forwarded from the remote site to the local site, you will need a NAT configuration to permit that traffic to flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems you have NAT configuration related to "LAN" interface only (I personally try to avoid using the "any" keywords in my NAT configurations to avoid any wierd/wrong behaviour)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the basic configuration format to allow VPN -&amp;gt; IBIZA traffic would be to configure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network IBIZA-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object &lt;LINK network="" /&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object &lt;ACTUAL network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/ACTUAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-NETWORK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet &lt;VPN network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (IBIZA,Internet) source static IBIZA-NETWORKS IBIZA-NETWORKS destination static VPN-NETWORK VPN-NETWORK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wether there is something else in the configuration that would need changing I dont know yet. Should look through the configurations a bit more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify the "tunnel-group" being used? Is it the one using "Society" group-policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 11:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184888#M361485</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T11:22:35Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184889#M361486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for having a look at the config already. Indeed the Tunnel Group using "Society" is the correct one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 14:07:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184889#M361486</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2013-02-26T14:07:11Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184890#M361487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So below should be the &lt;STRONG&gt;"tunnel-group"&lt;/STRONG&gt; and &lt;STRONG&gt;"group-policy"&lt;/STRONG&gt; related to this connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group Society type remote-access&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group Society general-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; address-pool VPN-Clients-Pool&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; default-group-policy Society&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group Society ipsec-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ikev1 pre-shared-key *****&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group-policy Society internal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;group-policy Society attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; dns-server value 192.168.1.10 192.168.7.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vpn-tunnel-protocol ikev1 ikev2 l2tp-ipsec ssl-client ssl-clientless&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; password-storage enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip-comp enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; pfs enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ipsec-udp enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ipsec-udp-port 10000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; split-tunnel-policy tunnelspecified&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; split-tunnel-network-list value Split_Networks_West&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; default-domain value customer.de&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the above there is a Split Tunnel configuration on the VPN connection and the ACL specifying the Split Tunnel is below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.7.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.2.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.5.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.4.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit 192.168.6.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine that list doesnt contain the networks needed to reach the IBIZA networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems to me tthat you would alteast need the previous NAT configuration I suggested and addition to the above Split Tunnel ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit &lt;IBIZA link="" network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IBIZA&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list Split_Networks_West standard permit &lt;IBIZA network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/IBIZA&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network IBIZA-NETWORKS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object &lt;LINK network="" /&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object &lt;ACTUAL network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/ACTUAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-NETWORK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet &lt;VPN network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (IBIZA,Internet) source static IBIZA-NETWORKS IBIZA-NETWORKS destination static VPN-NETWORK VPN-NETWORK&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I've left the actual network/address segments unspecified. You should just use the actual networks you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Those should atleast be some things you need for the traffic to flow from VPN to IBIZA and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2013 07:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184890#M361487</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-27T07:38:18Z</dc:date>
    </item>
    <item>
      <title>ASA5510: Routing from ezVPN Client to non-LAN Zone</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184891#M361488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning and Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the NAT Rule did the trick. I had seen the problem with the Splitz-Tunneling too and tried but it did not help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT Rule you proposed helped me fix the Problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your kind support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dirk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2013 10:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-routing-from-ezvpn-client-to-non-lan-zone/m-p/2184891#M361488</guid>
      <dc:creator>society-gmbh</dc:creator>
      <dc:date>2013-02-28T10:54:05Z</dc:date>
    </item>
  </channel>
</rss>

