<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5520 VPN tunnel up but not traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054356#M396192</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Angelo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the show run NAT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Nov 2012 17:14:57 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-11-02T17:14:57Z</dc:date>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054355#M396186</link>
      <description>&lt;P&gt;We just migrated from a single 5510 to a dual (failover)&amp;nbsp; 5520, It seems that everything is working except the remote VPN. We can establish a tunnel and authenticate as local users, (going to LDAP when all is working) but no traffic is passing. I know I am overlooking something but cant see it. &lt;/P&gt;&lt;P&gt;Hope somebody might have an idea on what I need to do.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show cry ipsec sa"&lt;/P&gt;&lt;P&gt;interface: outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: SYSTEM_DEFAULT_CRYPTO_MAP, seq num: 65535, local addr: 209.155.149.122&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.64.4.100/255.255.255.255/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 74.94.229.238, username: afanaras&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic allocated peer ip: 10.64.4.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 1733, #pkts decrypt: 1733, #pkts verify: 1733&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 209.155.149.122, remote crypto endpt.: 74.94.229.238&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 74, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 048CF11B&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : 260FEA7B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x260FEA7B (638577275)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 217088, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 24094&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0xFFFFFFFF 0xFFFFFFFF&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x048CF11B (76345627)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac no compression &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 217088, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 24094&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap: &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054355#M396186</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2019-03-12T00:18:12Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054356#M396192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Angelo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide the show run NAT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 17:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054356#M396192</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-02T17:14:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054357#M396195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Julio&lt;/P&gt;&lt;P&gt;this is what i get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run nat"&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054357#M396195</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2012-11-02T18:20:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054358#M396199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the access-list inside_nat_0_outbund&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also can you let me know what is the subnet behind the other ASA or VPN tunnel endpoint?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:22:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054358#M396199</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-02T18:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054359#M396203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The other end is a cisco client from a laptop, the ASA subnet outside is 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;the access list has all of our network as you can see&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound; 358 elements; name hash: 0x467c8ce4&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 1 extended permit ip Romulus-Internal 255.255.255.0 host 192.0.101.31 (hitcnt=0) 0xbe9f54ae &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 2 extended permit ip object-group DM_INLINE_NETWORK_5 object-group DM_INLINE_NETWORK_6 0x71e1e20d &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Romulus-Internal 255.255.255.0 (hitcnt=0) 0xbb6a746c &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Millender-Internal 255.255.255.0 (hitcnt=0) 0x6e2d0535 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 WCCCD-Internal 255.255.255.0 (hitcnt=0) 0x27acd775 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Sumpter-Internal 255.255.255.0 (hitcnt=0) 0x52aa2d76 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 FocusHope-Internal 255.255.255.0 (hitcnt=0) 0x0d958156 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Cadillac-Internal 255.255.255.0 (hitcnt=0) 0xc1cfceea &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Colo-Internal 255.255.255.0 (hitcnt=0) 0xc51970cd &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Romulus-VOIP 255.255.255.0 (hitcnt=0) 0x980f49c6 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 FocusHope-VOIP 255.255.255.0 (hitcnt=0) 0xc5044452 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Cadillac-VOIP 255.255.255.0 (hitcnt=0) 0x9f9536d2 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 WCCCD-VOIP 255.255.255.0 (hitcnt=0) 0x8090481c &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Millender-VOIP 255.255.255.0 (hitcnt=0) 0x2406880a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Sumpter-VOIP 255.255.255.0 (hitcnt=0) 0x5a6618ea &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 Colo-VOIP 255.255.255.0 (hitcnt=0) 0xb5bd2bab &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 MobileBranch 255.255.255.0 (hitcnt=0) 0xa60b700d &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 SegMobile 255.255.255.0 (hitcnt=0) 0x08829018 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Romulus-Internal 255.255.255.0 192.168.249.0 255.255.255.0 (hitcnt=0) 0x3ffb9705 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Romulus-Internal 255.255.255.0 (hitcnt=0) 0xa3a6016b &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Millender-Internal 255.255.255.0 (hitcnt=0) 0x9acc25ca &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 WCCCD-Internal 255.255.255.0 (hitcnt=0) 0x1a28fdba &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Sumpter-Internal 255.255.255.0 (hitcnt=0) 0x3f664036 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 FocusHope-Internal 255.255.255.0 (hitcnt=0) 0x818eb99c &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Cadillac-Internal 255.255.255.0 (hitcnt=0) 0x15480008 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Colo-Internal 255.255.255.0 (hitcnt=0) 0x64e2113a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Romulus-VOIP 255.255.255.0 (hitcnt=0) 0x7b54786e &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 FocusHope-VOIP 255.255.255.0 (hitcnt=0) 0x69d4019a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Cadillac-VOIP 255.255.255.0 (hitcnt=0) 0x303641bd &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 WCCCD-VOIP 255.255.255.0 (hitcnt=0) 0x30b2a77d &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Millender-VOIP 255.255.255.0 (hitcnt=0) 0x1cb9e2e0 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Sumpter-VOIP 255.255.255.0 (hitcnt=0) 0x7608782a &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 Colo-VOIP 255.255.255.0 (hitcnt=0) 0x23b05d7d &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list inside_nat0_outbound line 2 extended permit ip Millender-Internal 255.255.255.0 MobileBranch 255.255.255.0 (hitcnt=0) 0x5c2eb431 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; + the rest of the networks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054359#M396203</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2012-11-02T18:36:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054360#M396206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Angelo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay got what you mean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I will need the show run ip local pool&lt;/P&gt;&lt;P&gt;and the group policy used for the tunnel-group this remote clients are connecting from&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I will be able to determine if it's a split tunnel or NAT issue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:43:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054360#M396206</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-02T18:43:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054361#M396209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can email you on your hotmail account the running config if that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show run ip local pool"&lt;/P&gt;&lt;P&gt;ip local pool PSCU 10.64.4.100-10.64.4.150 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 internal&lt;/P&gt;&lt;P&gt;group-policy GroupPolicy1 attributes&lt;/P&gt;&lt;P&gt; wins-server value 10.64.0.11&lt;/P&gt;&lt;P&gt; dns-server value 10.64.0.11 10.64.4.21&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value PSCU_Internal&lt;/P&gt;&lt;P&gt; default-domain none&lt;/P&gt;&lt;P&gt; split-dns value 10.64.0.11 &lt;/P&gt;&lt;P&gt; address-pools value PSCU&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;group-policy GroupPolicy1 internal&lt;BR /&gt;group-policy GroupPolicy1 attributes&lt;BR /&gt; wins-server value 10.64.0.11&lt;BR /&gt; dns-server value 10.64.0.11 10.64.4.21&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value PSCU_Internal&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns value 10.64.0.11 &lt;BR /&gt; address-pools value PSCU&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054361#M396209</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2012-11-02T18:53:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054362#M396211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Angelo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do that please &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; It will be way faster to fix this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 18:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054362#M396211</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-02T18:55:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054363#M396213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I upgraded the image to 8.2.(5) from 8.2.(2) since there was a known bug but the problem still persists. Clientless SSL vpn is working and passing traffic but not ipsek. When I connect with the cisco client ver. 5.0.07.0440 i can authenticate and the tunnel is up but I cannot do anything past that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 14:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054363#M396213</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2012-11-04T14:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054364#M396215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add and then give it a try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound line 1 permit ip 192.168.249.0 255.255.255.0 10.64.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 18:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054364#M396215</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-04T18:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054365#M396216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nat Traversal resolved the issue,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 19:46:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054365#M396216</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-04T19:46:47Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054366#M396218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes that took care of it.&lt;/P&gt;&lt;P&gt;Thank you so much, what a headache, it was driving me crazy.&lt;/P&gt;&lt;P&gt;Awesome!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 20:25:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054366#M396218</guid>
      <dc:creator>afanaras1961</dc:creator>
      <dc:date>2012-11-04T20:25:04Z</dc:date>
    </item>
    <item>
      <title>ASA 5520 VPN tunnel up but not traffic</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054367#M396221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Angelo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My pleasure&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Nov 2012 20:58:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-vpn-tunnel-up-but-not-traffic/m-p/2054367#M396221</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-04T20:58:43Z</dc:date>
    </item>
  </channel>
</rss>

