<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic &amp;quot;Duplicate IP address&amp;quot; with ASA inside interface - proxyarp/VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909773#M457301</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig, I don't believe so.&amp;nbsp; The VPN pool was functioning perfectly right up till I disabled proxyarp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Apr 2012 07:57:53 GMT</pubDate>
    <dc:creator>Le Gazman</dc:creator>
    <dc:date>2012-04-06T07:57:53Z</dc:date>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909771#M457299</link>
      <description>&lt;P&gt;We've had issues with our Exchange 2010 server (running on ESXi 4.1) since its default gateway was changed to our new ASA 5510.&amp;nbsp; They manifested as frequent Outlook client connection dropouts or as IP address conflicts whenever Exchange was rebooted.&amp;nbsp; The temporary fix was to disable the Exchange server NIC, bounce the ASA and enable the server's NIC again.&amp;nbsp; We saw poor performance from Exchange after a while again, but after some research and testing I realised that disabling proxyarp on the inside interface fixed the problem permanently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However I've now realised that the client VPN no longer routes properly because proxyarp is disabled on the inside interface, so I still have a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone think of a way to stop the ASA grabbing hold of the Exchange server's IP address, but allow the VPN traffic to come in on the inside interface?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:51:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909771#M457299</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2019-03-11T22:51:19Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909772#M457300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; HI Gareth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have the VPN pool address overlapping the lan addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 07:56:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909772#M457300</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-04-06T07:56:16Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909773#M457301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig, I don't believe so.&amp;nbsp; The VPN pool was functioning perfectly right up till I disabled proxyarp.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 07:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909773#M457301</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2012-04-06T07:57:53Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909774#M457302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Gareth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to post the configuration, omit any sensitive inforation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 08:11:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909774#M457302</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-04-06T08:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: "Duplicate IP address" with ASA inside interface - proxyarp/</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909775#M457303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the edited config.&amp;nbsp; Basically the Exchange server has a NAT rule to allow http/https/smtp, which is how the ARP issue arose.&amp;nbsp; Would the ARPRetryCount command be any use, if I enable proxyarp again?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;: Written by enable_15 at 11:01:37.416 UTC Tue Apr 3 2012&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ASA Version 8.2(5) &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;hostname &lt;REMOVED&gt;&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;enable password xxxxxxxxxxxxxxxx encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;passwd xxxxxxxxxxxxxxxx encrypted&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;names&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;name 10.48.254.0 vpnclients-network&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;name &lt;REMOVED&gt; srvex01-external&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;name 10.48.1.3 srvex01-internal&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;name &lt;REMOVED&gt; scotty-external&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address &lt;REMOVED&gt; 255.255.255.248 &lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 10.48.1.254 255.255.0.0 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no nameif&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no security-level&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no ip address&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/3&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no nameif&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no security-level&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no ip address&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Management0/0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; shutdown&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif management&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; no ip address&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; management-only&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ftp mode passive&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; port-object eq www&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; port-object eq https&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; port-object eq smtp&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list inside_nat0_outbound extended permit ip any vpnclients-network 255.255.255.192 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_access_in extended permit tcp any host srvex01-external object-group DM_INLINE_TCP_1 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;pager lines 24&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;logging asdm informational&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu outside 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu inside 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;mtu management 1500&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip local pool vpnclients 10.48.254.1-10.48.254.32 mask 255.255.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;icmp deny any outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no asdm history enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;arp timeout 14400&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (outside) 101 interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 101 0.0.0.0 0.0.0.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (inside,outside) srvex01-external srvex01-internal netmask 255.255.255.255 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (outside,inside) srvex01-internal srvex01-external netmask 255.255.255.255 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-group outside_access_in in interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;route outside 0.0.0.0 0.0.0.0 &lt;REMOVED&gt; 1&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout xlate 3:00:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;timeout floating-conn 0:00:00&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http server enable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;http 10.48.0.0 255.255.0.0 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server location&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no snmp-server contact&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;sysopt noproxyarp inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime seconds 28800&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto map outside_map interface outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto isakmp enable outside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto isakmp policy 10&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; authentication pre-share&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; encryption 3des&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; hash sha&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; group 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; lifetime 86400&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;telnet timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssh timeout 5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;console timeout 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection basic-threat&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics access-list&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ntp server 10.48.1.2 source inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;webvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;group-policy DfltGrpPolicy attributes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; banner value ** Warning: you are connecting to the &lt;REMOVED&gt; network. **&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; banner value &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; banner value This connection is for authorised users only.&amp;nbsp; If you are not authorised to use this connection you should disconnect immediately.&amp;nbsp; For acceptable use guidelines please refer to the Company IT Policy (HR 062).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;group-policy clientvpn internal&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;group-policy clientvpn attributes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; dns-server value 10.48.1.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; vpn-tunnel-protocol IPSec &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; default-domain value &lt;REMOVED&gt;.local&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;username &lt;REMOVED&gt; password oMmrrMbNRhqeKCzM encrypted privilege 0&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;username &lt;REMOVED&gt; attributes&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; vpn-group-policy clientvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;username &lt;REMOVED&gt; password CPuKILOZBCZIv1IN encrypted privilege 0&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;username &lt;REMOVED&gt; attributes&lt;/REMOVED&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; vpn-group-policy clientvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tunnel-group clientvpn type remote-access&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tunnel-group clientvpn general-attributes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; address-pool vpnclients&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; default-group-policy clientvpn&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tunnel-group clientvpn ipsec-attributes&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; pre-shared-key *&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;class-map inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; match default-inspection-traffic&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map type inspect dns preset_dns_map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; parameters&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum client auto&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; message-length maximum 512&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;policy-map global_policy&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; class inspection_default&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ftp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 h225 &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect h323 ras &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rsh &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect rtsp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sqlnet &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sunrpc &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect xdmcp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect netbios &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect tftp &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; inspect ip-options &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;service-policy global_policy global&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;prompt hostname context &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;no call-home reporting anonymous&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Cryptochecksum:fc67b04ada9eb738b4a9f63b93cb1400&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 08:30:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909775#M457303</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2012-04-06T08:30:05Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909776#M457304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gareth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your configuration the inside network has a class B so the VPN clients are assigned address that overlap with the assigned addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="overlap"&gt;&lt;STRONG&gt;Overlapping Private Networks&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;If you are unable to access the internal network after the tunnel establishment, check the IP address assigned to the VPN client that overlaps with the internal network behind the head-end device.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Always make sure that the IP addresses in the pool to be assigned for the VPN clients, the internal network of the head-end device and the VPN Client internal network must be in different networks. You can assign the same major network with different subnets, but sometimes the routing issues occur.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 09:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909776#M457304</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-04-06T09:01:34Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909777#M457305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig, so perhaps the VPN only worked correctly beforehand was&amp;nbsp; because the proxyarp was making up the shortfall?&amp;nbsp; Would you suggest a&amp;nbsp; completely different subnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 10:26:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909777#M457305</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2012-04-06T10:26:01Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909778#M457306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That sounds correct, yeah I would use a different subnet (not used anywhere in the network). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 11:23:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909778#M457306</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-04-06T11:23:25Z</dc:date>
    </item>
    <item>
      <title>"Duplicate IP address" with ASA inside interface - proxyarp/VPN</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909779#M457307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig, I think you're right as I've found another thread with a similar issue to mine and the same answer - &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/message/885685#885685"&gt;https://supportforums.cisco.com/message/885685#885685&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried changing the vpnclients subnet to something completely different and it really upset one of our older switches on the LAN and caused chaos! &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The business is really busy this weekend with easter, so I'll wait till next week before trying this again and cycling the old switch afterwards if need be.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Apr 2012 12:33:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909779#M457307</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2012-04-06T12:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: "Duplicate IP address" with ASA inside interface - proxyarp/</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909780#M457308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Craig you were spot on.&amp;nbsp; I also had to go into Routing and Remote Access on our old ISA server (the LAN's current default gateway) and create a static route for the VPN traffic before I could close out the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 13:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909780#M457308</guid>
      <dc:creator>Le Gazman</dc:creator>
      <dc:date>2012-04-12T13:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: "Duplicate IP address" with ASA inside interface - proxyarp/</title>
      <link>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909781#M457309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gareth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, thats good to hear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Craig&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Apr 2012 14:33:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/quot-duplicate-ip-address-quot-with-asa-inside-interface/m-p/1909781#M457309</guid>
      <dc:creator>craig bache</dc:creator>
      <dc:date>2012-04-12T14:33:46Z</dc:date>
    </item>
  </channel>
</rss>

