<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Anyconnect ASA cannot access internal network or internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975235#M409968</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Split tunnel ACL is incorrect, you should add the internal LAN subnets, not the VPN pool subnets and also add the correct NONAT ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access the 172.16.1.0/24 subnet, then add the following:&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 172.16.1.0 255.255.255.0 10.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the following split tunnel ACL:&lt;/P&gt;&lt;P&gt;access-list split-smart standard permit ip 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, try to see if you can ping 172.16.1.200 after adding the above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 04 Aug 2012 08:58:34 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-08-04T08:58:34Z</dc:date>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975231#M409961</link>
      <description>&lt;P&gt;After connecting via anyconnect client 2.5, I cannot access my internal network or internet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;My Host is getting ip address of 10.2.2.1/24 &amp;amp; gw:10.2.2.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 172.16.1.200 EOCVLAN198 description EOC VLAN 198&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description to EOCATT7200-G0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description to EOC-Inside&lt;/P&gt;&lt;P&gt; switchport access vlan 198&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.21.24.23 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan198&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone PST -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name riversideca.gov&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit icmp any interface inside &lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit icmp any interface outside &lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit icmp interface outside any &lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit ip 172.16.1.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list inside_acl extended permit ip 10.0.0.0 255.0.0.0 any &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.10.10.0 255.255.255.0 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.2.2.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.10.86.0 255.255.255.0 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.2.2.0 255.255.255.0 10.10.86.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.80.1.0 255.255.255.0 10.2.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split-tunnel standard permit 172.16.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list split-smart standard permit any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool SSLClientPool 10.2.2.1-10.2.2.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-649.bin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_acl in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.21.24.23 1&lt;/P&gt;&lt;P&gt;route inside 10.0.0.0 255.0.0.0 EOCVLAN198 1&lt;/P&gt;&lt;P&gt;route inside 192.168.1.0 255.255.255.0 EOCVLAN198 1&lt;/P&gt;&lt;P&gt;route inside 192.168.100.0 255.255.255.0 EOCVLAN198 1&lt;/P&gt;&lt;P&gt;route inside 192.168.211.0 255.255.255.0 EOCVLAN198 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-dart-win-2.5.3055-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy SSLCLientPolicy internal&lt;/P&gt;&lt;P&gt;group-policy SSLCLientPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.10.86.128 10.10.86.129&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value split-smart&lt;/P&gt;&lt;P&gt; default-domain value yourname.tld&lt;/P&gt;&lt;P&gt; address-pools value SSLClientPool&lt;/P&gt;&lt;P&gt;username test password P4ttSyrm33SV8TYp encrypted privilege 15&lt;/P&gt;&lt;P&gt;username admin password fOGXfuUK21gWxwO6 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group SSLClientProfile type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group SSLClientProfile general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy SSLCLientPolicy&lt;/P&gt;&lt;P&gt;tunnel-group SSLClientProfile webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias EOCSSL enable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt;class-map IPS&lt;/P&gt;&lt;P&gt;class-map my-ips-class&lt;/P&gt;&lt;P&gt;class-map test1&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips inline fail-close&lt;/P&gt;&lt;P&gt; class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection decrement-ttl&lt;/P&gt;&lt;P&gt;policy-map my-ips-policy&lt;/P&gt;&lt;P&gt; class my-ips-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; ips promiscuous fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;p&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa#&amp;nbsp;&amp;nbsp;&amp;nbsp; show log&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:03: %ASA-6-302014: Teardown TCP connection 60662 for outside:10.2.2.1/62706 to outside:74.125.224.228/443 duration 0:00:00 bytes 0 Flow is a loopback (test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:09: %ASA-6-302015: Built inbound UDP connection 60664 for outside:10.2.2.1/49768 (10.2.2.1/49768) to inside:10.10.86.128/53 (10.10.86.128/53) (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:09: %ASA-6-302014: Teardown TCP connection 60665 for outside:10.2.2.1/62706 to outside:74.125.224.228/443 duration 0:00:00 bytes 0 Flow is a loopback (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:10: %ASA-6-302015: Built inbound UDP connection 60666 for outside:10.2.2.1/49768 (10.2.2.1/49768) to inside:10.10.86.129/53 (10.10.86.129/53) (test)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Aug 02 2012 21:34:11: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:10.2.2.1/62708 dst inside:192.248.248.120/443 denied due to NAT reverse path failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:21: %ASA-6-302015: Built inbound UDP connection 60668 for outside:10.2.2.1/50715 (10.2.2.1/50715) to inside:10.10.86.128/53 (10.10.86.128/53) (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:21: %ASA-6-302015: Built inbound UDP connection 60669 for outside:10.2.2.1/64333 (10.2.2.1/64333) to inside:10.10.86.128/53 (10.10.86.128/53) (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:22: %ASA-6-302015: Built inbound UDP connection 60670 for outside:10.2.2.1/50715 (10.2.2.1/50715) to inside:10.10.86.129/53 (10.10.86.129/53) (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:22: %ASA-6-302016: Teardown UDP connection 60474 for outside:10.2.2.1/50367 to inside:10.10.86.128/53 duration 0:02:01 bytes 40 (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:22: %ASA-6-302016: Teardown UDP connection 60475 for outside:10.2.2.1/60325 to inside:10.10.86.128/53 duration 0:02:01 bytes 46 (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:22: %ASA-6-302015: Built inbound UDP connection 60671 for outside:10.2.2.1/64333 (10.2.2.1/64333) to inside:10.10.86.129/53 (10.10.86.129/53) (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:22: %ASA-6-302014: Teardown TCP connection 60672 for outside:10.2.2.1/62713 to outside:74.125.224.228/443 duration 0:00:00 bytes 0 Flow is a loopback (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:23: %ASA-6-302016: Teardown UDP connection 60477 for outside:10.2.2.1/50367 to inside:10.10.86.129/53 duration 0:02:01 bytes 40 (test)&lt;/P&gt;&lt;P&gt;Aug 02 2012 21:34:23: %ASA-6-302016: Teardown UDP connection 60479 for outside:10.2.2.1/60325 to inside:10.10.86.129/53 duration 0:02:01 bytes 46 (test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show vpn-sessiondb svc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Session Type: SVC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Username&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : test&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Index&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 21&lt;/P&gt;&lt;P&gt;Assigned IP&amp;nbsp; : 10.2.2.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Public IP&amp;nbsp;&amp;nbsp;&amp;nbsp; : 76.95.186.82&lt;/P&gt;&lt;P&gt;Protocol&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Clientless SSL-Tunnel DTLS-Tunnel&lt;/P&gt;&lt;P&gt;License&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SSL VPN&lt;/P&gt;&lt;P&gt;Encryption&amp;nbsp;&amp;nbsp; : RC4 AES128&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hashing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA1&lt;/P&gt;&lt;P&gt;Bytes Tx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 13486&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Bytes Rx&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 136791&lt;/P&gt;&lt;P&gt;Group Policy : SSLCLientPolicy&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Tunnel Group : SSLClientProfile&lt;/P&gt;&lt;P&gt;Login Time&amp;nbsp;&amp;nbsp; : 21:26:21 PDT Thu Aug 2 2012&lt;/P&gt;&lt;P&gt;Duration&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 0h:08m:41s&lt;/P&gt;&lt;P&gt;Inactivity&amp;nbsp;&amp;nbsp; : 0h:00m:00s&lt;/P&gt;&lt;P&gt;NAC Result&amp;nbsp;&amp;nbsp; : Unknown&lt;/P&gt;&lt;P&gt;VLAN Mapping : N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : none&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:37:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975231#M409961</guid>
      <dc:creator>aparikh</dc:creator>
      <dc:date>2019-03-11T23:37:50Z</dc:date>
    </item>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975232#M409963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can add the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 10.2.2.0 255.255.255.0 1.21.24.23 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;because you have 10.0.0.0/8 route pointing to the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2012 08:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975232#M409963</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-03T08:55:27Z</dc:date>
    </item>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975233#M409965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also, do you need split tunnel, or are you trying to send all traffic to the ASA? because you have "permit any" for your split tunnel acl, that's why i asked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to send the VPN internet traffic towards the ASA too, then you need to configure:&lt;/P&gt;&lt;P&gt;nat (outside) 1 10.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to send the VPN internet traffic directly off local internet, then you would need to configure the correct split tunnel acl to only include subnet behind the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2012 08:58:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975233#M409965</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-03T08:58:00Z</dc:date>
    </item>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975234#M409966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It did not work. &lt;/P&gt;&lt;P&gt;I added the "&lt;/P&gt;&lt;P&gt;route outside 10.2.2.0 255.255.255.0 1.21.24.23 1"&lt;/P&gt;&lt;P&gt;I also added "access-list split-smart standard permit ip 10.2.2.0 255.255.255.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not care about the split-tuunel. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MY Laptop IP address: 10.2.2.1, SM:255.255.255.0 GW:10.2.2.2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2012 22:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975234#M409966</guid>
      <dc:creator>aparikh</dc:creator>
      <dc:date>2012-08-03T22:56:15Z</dc:date>
    </item>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975235#M409968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Split tunnel ACL is incorrect, you should add the internal LAN subnets, not the VPN pool subnets and also add the correct NONAT ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access the 172.16.1.0/24 subnet, then add the following:&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 172.16.1.0 255.255.255.0 10.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then the following split tunnel ACL:&lt;/P&gt;&lt;P&gt;access-list split-smart standard permit ip 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lastly, try to see if you can ping 172.16.1.200 after adding the above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Aug 2012 08:58:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975235#M409968</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-08-04T08:58:34Z</dc:date>
    </item>
    <item>
      <title>Anyconnect ASA cannot access internal network or internet</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975236#M409969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is working.&lt;/P&gt;&lt;P&gt;I added the "address-pool" under the tunnel-group xxx general-attribute"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for taking time to respond. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Aug 2012 20:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-asa-cannot-access-internal-network-or-internet/m-p/1975236#M409969</guid>
      <dc:creator>aparikh</dc:creator>
      <dc:date>2012-08-04T20:56:10Z</dc:date>
    </item>
  </channel>
</rss>

