<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 vlan cannot reach wan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966362#M435608</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm setting up vlan and inter-vlan routing in my lab. My vlan work well (routing between them and dhcp relay) on the LAN side of the ASA but they cannot reach internet trough the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read a lot about this issue and tried different configurations but i can't solve it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2112611" target="_blank"&gt;Exemple of what i read and tried &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here my ASA settings :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Note : I know that the physical interface musn't have an &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/455803"&gt;@ip&lt;/a&gt; but my present network needs one to work. I'll fix this during my next tests.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CISCOASA&lt;/P&gt;&lt;P&gt;domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;enable password *********** encrypted&lt;/P&gt;&lt;P&gt;passwd ********** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.2 mediaserv&lt;/P&gt;&lt;P&gt;name 192.168.2.200 Routeur-Fullsave description Routeur Fullsave&lt;/P&gt;&lt;P&gt;name 91.197.164.8 Serveur-streaming description Serveur de streaming distant&lt;/P&gt;&lt;P&gt;name 193.252.220.135 FM47&lt;/P&gt;&lt;P&gt;name 79.174.207.220 SNCF&lt;/P&gt;&lt;P&gt;name 80.13.227.86 TLSEFM&lt;/P&gt;&lt;P&gt;name 79.174.204.201 ALTITUDE&lt;/P&gt;&lt;P&gt;name 212.234.48.67 BDX&lt;/P&gt;&lt;P&gt;name 192.168.4.254 Freebox description Freebox&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif WAN_FREE&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.4.253 255.255.255.0 standby 192.168.4.250&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description connexion vers le LAN via switch cisco&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.4 255.255.255.0 standby 192.168.0.6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.31&lt;/P&gt;&lt;P&gt; vlan 31&lt;/P&gt;&lt;P&gt; nameif vlan_postes&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.31.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.200&lt;/P&gt;&lt;P&gt; vlan 200&lt;/P&gt;&lt;P&gt; nameif vlan_winradio&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.250 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Connexion Free et fibre&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif WAN_Fibre&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.2.253 255.255.255.0 standby 192.168.2.250&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;boot system t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://192.168.0.2/modifpass" target="_blank"&gt;ftp://192.168.0.2/modifpass&lt;/A&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network Acces-distant&lt;/P&gt;&lt;P&gt; network-object host FM47&lt;/P&gt;&lt;P&gt; network-object host SNCF&lt;/P&gt;&lt;P&gt; network-object host TLSEFM&lt;/P&gt;&lt;P&gt; network-object host BDX&lt;/P&gt;&lt;P&gt;object-group network MM-Acces-distant&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service RAdmin tcp&lt;/P&gt;&lt;P&gt; description Port RAdmin&lt;/P&gt;&lt;P&gt; port-object eq 4899&lt;/P&gt;&lt;P&gt;access-list LAN_pnat_outbound extended permit ip host 192.168.0.56 171.16.135.216 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.97.80 255.255.255.248 171.16.135.216 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip any 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.187 192.168.248.0 255.255.255.0 inactive&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.56 192.168.248.0 255.255.255.0 inactive&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound extended permit ip any 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3389 inactive&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3390 inactive&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 4899&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound.20 extended permit ip any 192.168.3.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 extended permit ip object-group MM-Acces-distant object-group Acces-distant&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list streaming extended permit ip any host Serveur-streaming&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl_1 standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 extended permit tcp any host 192.168.4.253 eq 4899&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging from-address ******&lt;/P&gt;&lt;P&gt;logging recipient-address ******&lt;/P&gt;&lt;P&gt;mtu WAN_FREE 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu WAN_Fibre 1500&lt;/P&gt;&lt;P&gt;mtu vlan_postes 1500&lt;/P&gt;&lt;P&gt;mtu vlan_winradio 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool RemoteConn 192.168.3.1-192.168.3.128 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt; failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface STATEFUL Ethernet0/3&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover interface ip STATEFUL 10.0.0.1 255.255.255.252 standby 10.0.0.2&lt;/P&gt;&lt;P&gt;no monitor-interface management&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (WAN_FREE) 1 interface&lt;/P&gt;&lt;P&gt;global (WAN_Fibre) 1 interface&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (LAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (LAN,WAN_Fibre) tcp interface 4899 192.168.0.56 4899 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (vlan_postes,WAN_Fibre) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (WAN_Fibre,vlan_postes) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group WAN_FREE_access_in_1 in interface WAN_FREE&lt;/P&gt;&lt;P&gt;access-group WAN_Access_In2 in interface WAN_Fibre&lt;/P&gt;&lt;P&gt;route WAN_Fibre 0.0.0.0 0.0.0.0 Routeur-Fullsave 64 track 1&lt;/P&gt;&lt;P&gt;route WAN_FREE 0.0.0.0 0.0.0.0 Freebox 62&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 LAN&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho Routeur-Fullsave interface WAN_Fibre&lt;/P&gt;&lt;P&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 match address LAN_nat0_inbound.20&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE 20 ipsec-isakmp dynamic FREE_dyn_map&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE interface WAN_Fibre&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_SSLMM&lt;/P&gt;&lt;P&gt; enrollment terminal&lt;/P&gt;&lt;P&gt; subject-name CN=CISCOASA&lt;/P&gt;&lt;P&gt;&amp;nbsp; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Free&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Fibre&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Free&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Fibre&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname&lt;/P&gt;&lt;P&gt;crypto isakmp enable WAN_Fibre&lt;/P&gt;&lt;P&gt;crypto isakmp enable management&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.128 LAN&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access LAN&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 192.168.0.1 LAN&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_postes&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_winradio&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Fibre WAN_Fibre&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Free WAN_FREE&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;group-policy Mediameet internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;group-policy MediaSSL internal&lt;/P&gt;&lt;P&gt;group-policy MediaSSL attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;username ******* password ****** encrypted privilege 0&lt;/P&gt;&lt;P&gt;username ********* attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map WinRadio-class&lt;/P&gt;&lt;P&gt; description limitation bande Passante Ã&amp;nbsp; 1Mbits/s&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map Streaming-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map SITES-DISTANTS&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match access-list global_mpc_1&lt;/P&gt;&lt;P&gt;class-map global-class1&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match port tcp range 3389 3390&lt;/P&gt;&lt;P&gt;class-map global-class2&lt;/P&gt;&lt;P&gt; description PrÃ©paration streaming 2mbps&lt;/P&gt;&lt;P&gt; match port tcp range 9252 9256&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt; policy-map global-policy&lt;/P&gt;&lt;P&gt; description default_inspection&lt;/P&gt;&lt;P&gt; class global-class1&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class2&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 2097000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 2097000 1500&lt;/P&gt;&lt;P&gt; class SITES-DISTANTS&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;policy-map WinRadio-policy&lt;/P&gt;&lt;P&gt; class WinRadio-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 1024000 1500&lt;/P&gt;&lt;P&gt;policy-map Streaming-policy&lt;/P&gt;&lt;P&gt; class Streaming-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 3072000 1536&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname priority state&lt;/P&gt;&lt;P&gt;Cryptochecksum:*************&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize for my english and thank you for your interest.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:12:35 GMT</pubDate>
    <dc:creator>Mediadeshaies</dc:creator>
    <dc:date>2019-03-11T23:12:35Z</dc:date>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966362#M435608</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm setting up vlan and inter-vlan routing in my lab. My vlan work well (routing between them and dhcp relay) on the LAN side of the ASA but they cannot reach internet trough the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read a lot about this issue and tried different configurations but i can't solve it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/thread/2112611" target="_blank"&gt;Exemple of what i read and tried &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here my ASA settings :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Note : I know that the physical interface musn't have an &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/455803"&gt;@ip&lt;/a&gt; but my present network needs one to work. I'll fix this during my next tests.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CISCOASA&lt;/P&gt;&lt;P&gt;domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;enable password *********** encrypted&lt;/P&gt;&lt;P&gt;passwd ********** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.2 mediaserv&lt;/P&gt;&lt;P&gt;name 192.168.2.200 Routeur-Fullsave description Routeur Fullsave&lt;/P&gt;&lt;P&gt;name 91.197.164.8 Serveur-streaming description Serveur de streaming distant&lt;/P&gt;&lt;P&gt;name 193.252.220.135 FM47&lt;/P&gt;&lt;P&gt;name 79.174.207.220 SNCF&lt;/P&gt;&lt;P&gt;name 80.13.227.86 TLSEFM&lt;/P&gt;&lt;P&gt;name 79.174.204.201 ALTITUDE&lt;/P&gt;&lt;P&gt;name 212.234.48.67 BDX&lt;/P&gt;&lt;P&gt;name 192.168.4.254 Freebox description Freebox&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif WAN_FREE&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.4.253 255.255.255.0 standby 192.168.4.250&lt;/P&gt;&lt;P&gt; !&lt;/P&gt;&lt;P&gt; interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description connexion vers le LAN via switch cisco&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.0.4 255.255.255.0 standby 192.168.0.6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.31&lt;/P&gt;&lt;P&gt; vlan 31&lt;/P&gt;&lt;P&gt; nameif vlan_postes&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.31.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.200&lt;/P&gt;&lt;P&gt; vlan 200&lt;/P&gt;&lt;P&gt; nameif vlan_winradio&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.250 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Connexion Free et fibre&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif WAN_Fibre&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 192.168.2.253 255.255.255.0 standby 192.168.2.250&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;boot system t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://192.168.0.2/modifpass" target="_blank"&gt;ftp://192.168.0.2/modifpass&lt;/A&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network Acces-distant&lt;/P&gt;&lt;P&gt; network-object host FM47&lt;/P&gt;&lt;P&gt; network-object host SNCF&lt;/P&gt;&lt;P&gt; network-object host TLSEFM&lt;/P&gt;&lt;P&gt; network-object host BDX&lt;/P&gt;&lt;P&gt;object-group network MM-Acces-distant&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service RAdmin tcp&lt;/P&gt;&lt;P&gt; description Port RAdmin&lt;/P&gt;&lt;P&gt; port-object eq 4899&lt;/P&gt;&lt;P&gt;access-list LAN_pnat_outbound extended permit ip host 192.168.0.56 171.16.135.216 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.97.80 255.255.255.248 171.16.135.216 255.255.255.248&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip any 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.187 192.168.248.0 255.255.255.0 inactive&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.56 192.168.248.0 255.255.255.0 inactive&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound extended permit ip any 192.168.0.128 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3389 inactive&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3390 inactive&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 4899&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound.20 extended permit ip any 192.168.3.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 extended permit ip object-group MM-Acces-distant object-group Acces-distant&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list streaming extended permit ip any host Serveur-streaming&lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl_1 standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 extended permit tcp any host 192.168.4.253 eq 4899&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging from-address ******&lt;/P&gt;&lt;P&gt;logging recipient-address ******&lt;/P&gt;&lt;P&gt;mtu WAN_FREE 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu WAN_Fibre 1500&lt;/P&gt;&lt;P&gt;mtu vlan_postes 1500&lt;/P&gt;&lt;P&gt;mtu vlan_winradio 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool RemoteConn 192.168.3.1-192.168.3.128 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt; failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface STATEFUL Ethernet0/3&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover interface ip STATEFUL 10.0.0.1 255.255.255.252 standby 10.0.0.2&lt;/P&gt;&lt;P&gt;no monitor-interface management&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (WAN_FREE) 1 interface&lt;/P&gt;&lt;P&gt;global (WAN_Fibre) 1 interface&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (LAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (LAN,WAN_Fibre) tcp interface 4899 192.168.0.56 4899 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (vlan_postes,WAN_Fibre) 192.168.31.0 192.168.31.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (WAN_Fibre,vlan_postes) 192.168.2.0 192.168.2.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group WAN_FREE_access_in_1 in interface WAN_FREE&lt;/P&gt;&lt;P&gt;access-group WAN_Access_In2 in interface WAN_Fibre&lt;/P&gt;&lt;P&gt;route WAN_Fibre 0.0.0.0 0.0.0.0 Routeur-Fullsave 64 track 1&lt;/P&gt;&lt;P&gt;route WAN_FREE 0.0.0.0 0.0.0.0 Freebox 62&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt; timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 LAN&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho Routeur-Fullsave interface WAN_Fibre&lt;/P&gt;&lt;P&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 match address LAN_nat0_inbound.20&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE 20 ipsec-isakmp dynamic FREE_dyn_map&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE interface WAN_Fibre&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_SSLMM&lt;/P&gt;&lt;P&gt; enrollment terminal&lt;/P&gt;&lt;P&gt; subject-name CN=CISCOASA&lt;/P&gt;&lt;P&gt;&amp;nbsp; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Free&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Fibre&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Free&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Fibre&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname&lt;/P&gt;&lt;P&gt;crypto isakmp enable WAN_Fibre&lt;/P&gt;&lt;P&gt;crypto isakmp enable management&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.128 LAN&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access LAN&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 192.168.0.1 LAN&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_postes&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_winradio&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Fibre WAN_Fibre&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Free WAN_FREE&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;group-policy Mediameet internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;group-policy MediaSSL internal&lt;/P&gt;&lt;P&gt;group-policy MediaSSL attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp; [...]&lt;/P&gt;&lt;P&gt;username ******* password ****** encrypted privilege 0&lt;/P&gt;&lt;P&gt;username ********* attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt; [...]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map WinRadio-class&lt;/P&gt;&lt;P&gt; description limitation bande Passante Ã&amp;nbsp; 1Mbits/s&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map Streaming-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map SITES-DISTANTS&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match access-list global_mpc_1&lt;/P&gt;&lt;P&gt;class-map global-class1&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match port tcp range 3389 3390&lt;/P&gt;&lt;P&gt;class-map global-class2&lt;/P&gt;&lt;P&gt; description PrÃ©paration streaming 2mbps&lt;/P&gt;&lt;P&gt; match port tcp range 9252 9256&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt; policy-map global-policy&lt;/P&gt;&lt;P&gt; description default_inspection&lt;/P&gt;&lt;P&gt; class global-class1&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class2&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 2097000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 2097000 1500&lt;/P&gt;&lt;P&gt; class SITES-DISTANTS&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;policy-map WinRadio-policy&lt;/P&gt;&lt;P&gt; class WinRadio-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 1024000 1500&lt;/P&gt;&lt;P&gt;policy-map Streaming-policy&lt;/P&gt;&lt;P&gt; class Streaming-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 3072000 1536&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname priority state&lt;/P&gt;&lt;P&gt;Cryptochecksum:*************&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I apologize for my english and thank you for your interest.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:12:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966362#M435608</guid>
      <dc:creator>Mediadeshaies</dc:creator>
      <dc:date>2019-03-11T23:12:35Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966363#M435609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;which particular vlan can't access the Internet?&lt;/P&gt;&lt;P&gt;you would need to have a NAT statement for those vlans so it gets PATed to the WAN_FREE interface IP Address (public IP) to be able to reach the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far, only the following interface will have access to the internet:&lt;/P&gt;&lt;P&gt;LAN and vlan_postes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (LAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2012 07:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966363#M435609</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-28T07:56:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966364#M435610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jennifer Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually, only vlan_postes needs to access the internet. So i set the NAT but it doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand very well what you mean by &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; so it gets PATed to the WAN_FREE interface IP Address (public IP) to be able to reach the internet.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Do i have to set something more than &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (LAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (vlan_postes) 1 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (vlan_postes) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;? &lt;/P&gt;&lt;P&gt;Or may my ACL be the problem ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2012 08:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966364#M435610</guid>
      <dc:creator>Mediadeshaies</dc:creator>
      <dc:date>2012-05-28T08:19:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966365#M435611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you have not applied the global-policy yet:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service-policy global-policy global&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try to ping 4.2.2.2 and see if you get a reply.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2012 09:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966365#M435611</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-28T09:29:25Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966366#M435612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jennifer Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried to apply what you said, it displayed this message:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ERROR: Class global-class1 has 'priority' set without 'priority-queue' in any interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;So i tried this : &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CISCOASA/pri/act(config)# policy-map global-policy&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CISCOASA/pri/act(config)# no class global-cass1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it displayed : &lt;/P&gt;&lt;P&gt;&lt;EM&gt;ERROR: % class-map global-class1 is being used&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My knowledge about ASA and policy in general is really poor. So i'm a bit lost &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have any idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2012 12:12:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966366#M435612</guid>
      <dc:creator>Mediadeshaies</dc:creator>
      <dc:date>2012-05-28T12:12:23Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966367#M435613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just create a new policy and apply it as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; policy-map global_policy&lt;/P&gt;&lt;P&gt;class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt; service-policy global_policy global&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 May 2012 12:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966367#M435613</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-28T12:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966368#M435614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jennifer Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here the configuration after i tried your solution. New lines appeared but ping still not working (4.2.2.2 or 8.8.8.8).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note : i removed the @IP from the physical interface ethernet 0/1 before to do the test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 10:19:52.898 CEDT Tue May 29 2012&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname CISCOASA&lt;/P&gt;&lt;P&gt;domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;enable password *********** encrypted&lt;/P&gt;&lt;P&gt;passwd *********** encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.0.2 mediaserv&lt;/P&gt;&lt;P&gt;name 192.168.2.200 Routeur-Fullsave description Routeur Fullsave&lt;/P&gt;&lt;P&gt;name 91.197.164.8 Serveur-streaming description Serveur de streaming distant&lt;/P&gt;&lt;P&gt;name 193.252.220.135 FM47&lt;/P&gt;&lt;P&gt;name 79.174.207.220 SNCF&lt;/P&gt;&lt;P&gt;name 80.13.227.86 TLSEFM&lt;/P&gt;&lt;P&gt;name 79.174.204.201 ALTITUDE&lt;/P&gt;&lt;P&gt;name 212.234.48.67 BDX&lt;/P&gt;&lt;P&gt;name 192.168.4.254 Freebox description Freebox&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description Ex liaison Altitude Telecom&lt;/P&gt;&lt;P&gt; nameif WAN_FREE&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.4.253 255.255.255.0 standby 192.168.4.250 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description connexion vers le LAN via switch cisco&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.31&lt;/P&gt;&lt;P&gt; vlan 31&lt;/P&gt;&lt;P&gt; nameif vlan_postes&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.31.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.200&lt;/P&gt;&lt;P&gt; vlan 200&lt;/P&gt;&lt;P&gt; nameif vlan_winradio&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.250 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description Connexion Free et fibre&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif WAN_Fibre&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 192.168.2.253 255.255.255.0 standby 192.168.2.250 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; description LAN Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;boot system t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://192.168.0.2/modifpass" rel="nofollow"&gt;ftp://192.168.0.2/modifpass&lt;/A&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa821-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name MEDIAMEETING&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network Acces-distant&lt;/P&gt;&lt;P&gt; network-object host FM47&lt;/P&gt;&lt;P&gt; network-object host SNCF&lt;/P&gt;&lt;P&gt; network-object host TLSEFM&lt;/P&gt;&lt;P&gt; network-object host BDX&lt;/P&gt;&lt;P&gt;object-group network MM-Acces-distant&lt;/P&gt;&lt;P&gt; network-object 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service RAdmin tcp&lt;/P&gt;&lt;P&gt; description Port RAdmin&lt;/P&gt;&lt;P&gt; port-object eq 4899&lt;/P&gt;&lt;P&gt;access-list LAN_pnat_outbound extended permit ip host 192.168.0.56 171.16.135.216 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list WAN_FIBRE_access_in remark AccÂ&amp;#143;s RAdmin depuis WAN - Principal&lt;/P&gt;&lt;P&gt;access-list WAN_FIBRE_access_in remark AccÂ&amp;#143;s RAdmin depuis WAN - Principal&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.97.80 255.255.255.248 171.16.135.216 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip any 192.168.0.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.0.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.187 192.168.248.0 255.255.255.0 inactive &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip host 192.168.0.56 192.168.248.0 255.255.255.0 inactive &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.0.0 255.255.255.0 192.168.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in remark AccÂ&amp;#143;s RAdmin depuis WAN - Secours&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in remark AccÂ&amp;#143;s RAdmin depuis WAN - Secours&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound extended permit ip any 192.168.0.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl standard permit 192.168.31.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3389 inactive &lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 3390 inactive &lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 extended permit tcp any host 192.168.2.253 eq 4899 &lt;/P&gt;&lt;P&gt;access-list WAN_Access_In2 remark Acces RAdmin Principal&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_inbound.20 extended permit ip any 192.168.3.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list global_mpc_1 extended permit ip object-group MM-Acces-distant object-group Acces-distant &lt;/P&gt;&lt;P&gt;access-list global_mpc_1 remark exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt;access-list streaming extended permit ip any host Serveur-streaming &lt;/P&gt;&lt;P&gt;access-list Mediameet_splitTunnelAcl_1 standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 extended permit tcp any host 192.168.4.253 eq 4899 &lt;/P&gt;&lt;P&gt;access-list WAN_FREE_access_in_1 remark Acces RAdmin de secours&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging from-address *****************&lt;/P&gt;&lt;P&gt;logging recipient-address **************level emergencies&lt;/P&gt;&lt;P&gt;mtu WAN_FREE 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu vlan_postes 1500&lt;/P&gt;&lt;P&gt;mtu vlan_winradio 1500&lt;/P&gt;&lt;P&gt;mtu WAN_Fibre 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool RemoteConn 192.168.3.1-192.168.3.128 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface STATEFUL Ethernet0/3&lt;/P&gt;&lt;P&gt;failover replication http&lt;/P&gt;&lt;P&gt;failover interface ip STATEFUL 10.0.0.1 255.255.255.252 standby 10.0.0.2&lt;/P&gt;&lt;P&gt;no monitor-interface management&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-641.bin&lt;/P&gt;&lt;P&gt;asdm location ALTITUDE 255.255.255.255 LAN&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (WAN_FREE) 1 interface&lt;/P&gt;&lt;P&gt;global (WAN_Fibre) 1 interface&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (LAN) 0 access-list LAN_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (LAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 192.168.31.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (LAN,WAN_Fibre) tcp interface 4899 192.168.0.56 4899 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (vlan_postes,WAN_Fibre) 192.168.31.0 192.168.31.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (WAN_Fibre,vlan_postes) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-group WAN_FREE_access_in_1 in interface WAN_FREE&lt;/P&gt;&lt;P&gt;access-group WAN_Access_In2 in interface WAN_Fibre&lt;/P&gt;&lt;P&gt;route WAN_Fibre 0.0.0.0 0.0.0.0 Routeur-Fullsave 64 track 1&lt;/P&gt;&lt;P&gt;route WAN_FREE 0.0.0.0 0.0.0.0 Freebox 128&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.0.0 255.255.0.0 LAN&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;sla monitor 1&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho Routeur-Fullsave interface WAN_Fibre&lt;/P&gt;&lt;P&gt;sla monitor schedule 1 life forever start-time now&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 40 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map WAN_dyn_map 60 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 match address LAN_nat0_inbound.20&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto dynamic-map FREE_dyn_map 20 set security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE 20 ipsec-isakmp dynamic FREE_dyn_map&lt;/P&gt;&lt;P&gt;crypto map WAN_map_FREE interface WAN_Fibre&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_SSLMM&lt;/P&gt;&lt;P&gt; enrollment terminal&lt;/P&gt;&lt;P&gt; subject-name CN=CISCOASA&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Free&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; fqdn ************&lt;/P&gt;&lt;P&gt; email ****************&lt;/P&gt;&lt;P&gt; subject-name CN=ssl.666.mediameeting.net&lt;/P&gt;&lt;P&gt; ip-address ******************&lt;/P&gt;&lt;P&gt; keypair ****************&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint localtrust_Fibre&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; fqdn *******************&lt;/P&gt;&lt;P&gt; email ******************&lt;/P&gt;&lt;P&gt; subject-name CN=**************&lt;/P&gt;&lt;P&gt; ip-address ***************&lt;/P&gt;&lt;P&gt; keypair **************&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Free&lt;/P&gt;&lt;P&gt; certificate cbdcbd4f&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30820247 308201b0 a0030201 020204cb dcbd4f30 0d06092a 864886f7 0d010104 &lt;/P&gt;&lt;P&gt;*******&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain localtrust_Fibre&lt;/P&gt;&lt;P&gt; certificate b5debd4f&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082023f 308201a8 a0030201 020204b5 debd4f30 0d06092a 864886f7 0d010104 &lt;/P&gt;&lt;P&gt;******&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp identity hostname &lt;/P&gt;&lt;P&gt;crypto isakmp enable WAN_Fibre&lt;/P&gt;&lt;P&gt;crypto isakmp enable management&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;track 1 rtr 1 reachability&lt;/P&gt;&lt;P&gt;client-update enable&lt;/P&gt;&lt;P&gt;no vpn-addr-assign aaa&lt;/P&gt;&lt;P&gt;no vpn-addr-assign dhcp&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;telnet 192.168.3.0 255.255.255.128 LAN&lt;/P&gt;&lt;P&gt;telnet timeout 10&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access LAN&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcprelay server 192.168.0.1 LAN&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_postes&lt;/P&gt;&lt;P&gt;dhcprelay enable vlan_winradio&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Free WAN_FREE&lt;/P&gt;&lt;P&gt;ssl trust-point localtrust_Fibre WAN_Fibre&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable WAN_FREE&lt;/P&gt;&lt;P&gt; enable WAN_Fibre&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.5.3055-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-macosx-i386-2.5.3055-k9.pkg 2 regex "Intel Mac OS X"&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-linux-2.5.3055-k9.pkg 3 regex "Linux"&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-dart-win-2.5.3055-k9.pkg 4&lt;/P&gt;&lt;P&gt; svc profiles DefaultProfile disk0:/defaultprofile.xml&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1 8.8.8.8&lt;/P&gt;&lt;P&gt;group-policy Mediameet internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.2 192.168.0.1&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Mediameet_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value MEDIAMEETING&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 internal&lt;/P&gt;&lt;P&gt;group-policy Mediameet_1 attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Mediameet_splitTunnelAcl_1&lt;/P&gt;&lt;P&gt; default-domain value MEDIAMEETING&lt;/P&gt;&lt;P&gt;group-policy MediaSSL internal&lt;/P&gt;&lt;P&gt;group-policy MediaSSL attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.1 8.8.8.8&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Mediameet_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value MEDIAMEETING.local&lt;/P&gt;&lt;P&gt; msie-proxy method no-modify&lt;/P&gt;&lt;P&gt; vlan none&lt;/P&gt;&lt;P&gt; address-pools value RemoteConn&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list none&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc modules value dart,vpngina&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default webvpn timeout 30&lt;/P&gt;&lt;P&gt;username j.deshaies password LO5lB1rnyhGb/fvs encrypted privilege 0&lt;/P&gt;&lt;P&gt;username j.deshaies attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt;username jl.simonet password AGYq7x1Zyk3V2dQJ encrypted privilege 0&lt;/P&gt;&lt;P&gt;username jl.simonet attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt;username b.niberon password GK4IufRVHvPpPLoX encrypted privilege 0&lt;/P&gt;&lt;P&gt;username b.niberon attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt;username s.ternoir password mYWJMd1aRkM.1tjc encrypted privilege 0&lt;/P&gt;&lt;P&gt;username s.ternoir attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy Mediameet&lt;/P&gt;&lt;P&gt;username c.casse password MdCJ1tgbh5jQIiXJ encrypted privilege 15&lt;/P&gt;&lt;P&gt;username c.casse attributes&lt;/P&gt;&lt;P&gt; service-type admin&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc profiles value DefaultProfile&lt;/P&gt;&lt;P&gt;username a.hugounenq password ItUfDhv1D9cwmFvZ encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group ********* type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group ************* ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group Mediameet type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group Mediameet general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteConn&lt;/P&gt;&lt;P&gt; default-group-policy Mediameet_1&lt;/P&gt;&lt;P&gt;tunnel-group Mediameet ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key Amandine0804&lt;/P&gt;&lt;P&gt;tunnel-group ******** type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group ********** ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key MeD1A!!M2ET1ng&lt;/P&gt;&lt;P&gt;tunnel-group SSL_MM type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group SSL_MM general-attributes&lt;/P&gt;&lt;P&gt; address-pool RemoteConn&lt;/P&gt;&lt;P&gt; authentication-server-group (LAN) LOCAL&lt;/P&gt;&lt;P&gt; default-group-policy MediaSSL&lt;/P&gt;&lt;P&gt;tunnel-group SSL_MM webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias PostesDistants enable&lt;/P&gt;&lt;P&gt;tunnel-group-map default-group Mediameet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map WinRadio-class&lt;/P&gt;&lt;P&gt; description limitation bande Passante Ã&amp;nbsp; 1Mbits/s&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map Streaming-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;class-map SITES-DISTANTS&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match access-list global_mpc_1&lt;/P&gt;&lt;P&gt;class-map global-class1&lt;/P&gt;&lt;P&gt; description exemple priorisation Prise de main Ã&amp;nbsp; distance&lt;/P&gt;&lt;P&gt; match port tcp range 3389 3390&lt;/P&gt;&lt;P&gt;class-map global-class2&lt;/P&gt;&lt;P&gt; description PrÃ©paration streaming 2mbps&lt;/P&gt;&lt;P&gt; match port tcp range 9252 9256&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;policy-map global-policy&lt;/P&gt;&lt;P&gt; description default_inspection&lt;/P&gt;&lt;P&gt; class global-class1&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class2&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 2097000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 2097000 1500&lt;/P&gt;&lt;P&gt; class SITES-DISTANTS&lt;/P&gt;&lt;P&gt;&amp;nbsp; priority&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;policy-map WinRadio-policy&lt;/P&gt;&lt;P&gt; class WinRadio-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 1024000 1500&lt;/P&gt;&lt;P&gt;policy-map Streaming-policy&lt;/P&gt;&lt;P&gt; class Streaming-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police input 1024000 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 3072000 1536&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname priority state &lt;/P&gt;&lt;P&gt;Cryptochecksum:dd605e032202ff6791c19afc056b3757&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My host ipconfig (the one which execute ping) :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@IP: 192.168.31.2&lt;/P&gt;&lt;P&gt;Defaut gateway : 192.168.31.254&lt;/P&gt;&lt;P&gt;DHCP : 192.168.0.1&lt;/P&gt;&lt;P&gt;DNS : 192.168.0.1&lt;/P&gt;&lt;P&gt;secondary DNS : 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your attention.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2012 09:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966368#M435614</guid>
      <dc:creator>Mediadeshaies</dc:creator>
      <dc:date>2012-05-29T09:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966369#M435615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why you can't ping is because you have the following configured:&lt;/P&gt;&lt;P&gt;static (vlan_postes,WAN_Fibre) 192.168.31.0 192.168.31.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;static (WAN_Fibre,vlan_postes) 192.168.2.0 192.168.2.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that you need that for your VPN, so please configure Nonat instead:&lt;/P&gt;&lt;P&gt;access-list vlan_postes_nonat permit ip 192.168.31.0 255.255.255.0 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (vlan_postes) 0 access-list vlan_postes_nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And remove the above static NAT statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate". Ping should work after the above changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2012 11:34:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966369#M435615</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-29T11:34:49Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 vlan cannot reach wan</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966370#M435616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jennifer Halim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it works! Thank you very much for your help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a good day&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 May 2012 12:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vlan-cannot-reach-wan/m-p/1966370#M435616</guid>
      <dc:creator>Mediadeshaies</dc:creator>
      <dc:date>2012-05-29T12:14:44Z</dc:date>
    </item>
  </channel>
</rss>

