<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote user cannot access the inside corporate network using any in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838885#M459766</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lourdes Anne,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad to hear that worked out for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"May I ask the reason for removing the static nat: &lt;/P&gt;&lt;P&gt;static (inside,inside) 172.30.20.0 172.30.10.0 netmask 255.255.255.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW sees that IP segment comes from outside interface but your above statement tells FW to translate it to inside, which is a contradictory rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate, any help post, so that it will be a helpful tip for someone else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 Feb 2012 13:53:27 GMT</pubDate>
    <dc:creator>rizwanr74</dc:creator>
    <dc:date>2012-02-09T13:53:27Z</dc:date>
    <item>
      <title>Remote user cannot access the inside corporate network using anyconnect vpn</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838880#M459758</link>
      <description>&lt;P&gt;Hi guys, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me why i can't access the servers that is on the corporate network that is located on the trust side of the ssg140 firewall using anyconnect vpn.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my network topology goes like these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dmz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \/&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; \/&lt;/P&gt;&lt;P&gt;ASA5510 ------- SSG140 ------- INTERNET ------ REMOTE USER&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | &amp;lt;-------- trust &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt; CORPORATE NETWORK (where the servers are located)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config on asa:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.0(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name thpal.local&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.30.10.236 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 40&lt;/P&gt;&lt;P&gt; ip address 192.168.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 192.168.1.1&lt;/P&gt;&lt;P&gt; domain-name thpal.local&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list inside_access_out extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_access_out_1 extended permit ip any any inactive&lt;/P&gt;&lt;P&gt;access-list inside_access_out_1 extended permit icmp any any echo-reply inactive&lt;/P&gt;&lt;P&gt;access-list SPLITTUNNEL standard permit 172.30.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list SPLITTUNNEL standard permit 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip 172.30.20.0 255.255.255.0 172.30.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip 172.30.10.0 255.255.255.0 172.30.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool ANYPOOL 172.30.20.60-172.30.20.65 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (inside) 1 172.30.20.20-172.30.20.25 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;global (inside) 2 203.167.x.x netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound_1&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.30.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,inside) 203.167.x.x 172.30.10.236 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,inside) 172.30.20.0 172.30.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group inside_access_out_1 out interface inside&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 172.30.10.1 1&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 172.30.10.236 tunneled&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.30.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.200.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.200.2-192.168.200.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable inside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-2.4.1012-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; port-forward remoteaccess 2300 192.168.1.1 telnet telnet to ssg5&lt;/P&gt;&lt;P&gt; port-forward remoteaccess 2100 192.168.1.236 ftp connects to ftp&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLITTUNNEL&lt;/P&gt;&lt;P&gt; default-domain value thpal.local&lt;/P&gt;&lt;P&gt;group-policy CLIENTLESS_SSL_POLICY internal&lt;/P&gt;&lt;P&gt;group-policy CLIENTLESS_SSL_POLICY attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec&lt;/P&gt;&lt;P&gt; default-domain value thpal.local&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value ssl_services&lt;/P&gt;&lt;P&gt;group-policy ANYCON internal&lt;/P&gt;&lt;P&gt;group-policy ANYCON attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 192.168.1.1&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLITTUNNEL&lt;/P&gt;&lt;P&gt; default-domain value thpal.local&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value ssl_services&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward disable&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default svc&lt;/P&gt;&lt;P&gt;username Sally password kjqjVsSlNIa.DGOu encrypted privilege 15&lt;/P&gt;&lt;P&gt;username Sally attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy ANYCON&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward auto-start remoteaccess&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value ssl_services&lt;/P&gt;&lt;P&gt;username Louanne password 0IoElNJ1cQv7RJiy encrypted privilege 15&lt;/P&gt;&lt;P&gt;username Louanne attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy ANYCON&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; port-forward auto-start remoteaccess&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value ssl_services&lt;/P&gt;&lt;P&gt;username Jonathan password 4DZSa0919GBhEyiT encrypted&lt;/P&gt;&lt;P&gt;username Jonathan attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy ANYCON&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; url-list value ssl_services&lt;/P&gt;&lt;P&gt;username Rommel password 6hWsMiVOi2o1KyzI encrypted privilege 15&lt;/P&gt;&lt;P&gt;username Larry password m98u9t2E8Jrzu96P encrypted&lt;/P&gt;&lt;P&gt;username Larry attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy CLIENTLESS_SSL_POLICY&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool ANYPOOL&lt;/P&gt;&lt;P&gt;tunnel-group CL_SSLVPN_PROFILE type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group CL_SSLVPN_PROFILE general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy CLIENTLESS_SSL_POLICY&lt;/P&gt;&lt;P&gt;tunnel-group anycon type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group anycon general-attributes&lt;/P&gt;&lt;P&gt; address-pool ANYPOOL&lt;/P&gt;&lt;P&gt; default-group-policy ANYCON&lt;/P&gt;&lt;P&gt;tunnel-group anycon webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias anycon enable&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; group-url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://203.167.x.x/anycon" target="_blank"&gt;https://203.167.x.x/anycon&lt;/A&gt;&lt;SPAN&gt; enable&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:a9e4e955d01c1504b4b85fa39e040886&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote user can established an anyconnect vpn connection to the asa and can access the local folders and internet while connected to the vpn but it cannot access the remote corporate network.&lt;/P&gt;&lt;P&gt;Any help would be much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-L.A.-&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:26:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838880#M459758</guid>
      <dc:creator>lourdesanne</dc:creator>
      <dc:date>2019-03-11T22:26:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remote user cannot access the inside corporate network using</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838881#M459759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Lourdes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you remove the following:&lt;/P&gt;&lt;P&gt;no&amp;nbsp; &lt;SPAN style="background-color: #ffffff; font-family: Arial, verdana, sans-serif; font-size: 12px;"&gt;access-group inside_access_out_1 out interface inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then give it a try.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please provide following output as well&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 172.30.20.62 1025 172.30.10.11&amp;nbsp; 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 02:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838881#M459759</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-09T02:46:20Z</dc:date>
    </item>
    <item>
      <title>Remote user cannot access the inside corporate network using any</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838882#M459760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already add the management-access inside. What should i ping?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the result of the packet tracer command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input inside tcp 172.30.20.62 1025 172.30.10.1$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 172.30.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: CP-PUNT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: WEBVPN-SVC&lt;/P&gt;&lt;P&gt;Subtype: in&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 03:00:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838882#M459760</guid>
      <dc:creator>lourdesanne</dc:creator>
      <dc:date>2012-02-09T03:00:10Z</dc:date>
    </item>
    <item>
      <title>Remote user cannot access the inside corporate network using any</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838883#M459761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please remove this static nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 172.30.20.0 172.30.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please make sure you have a static route on your inside network to push "172.30.20.0 255.255.255.0" to FW's inside interface ip address i.e. 172.30.10.236&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try it and let me know the result.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 03:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838883#M459761</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-02-09T03:09:29Z</dc:date>
    </item>
    <item>
      <title>Remote user cannot access the inside corporate network using any</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838884#M459763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rizwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did what you have suggested, and it works like magic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May I ask the reason for removing the static nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 172.30.20.0 172.30.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much and kind regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-L.A.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 03:25:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838884#M459763</guid>
      <dc:creator>lourdesanne</dc:creator>
      <dc:date>2012-02-09T03:25:31Z</dc:date>
    </item>
    <item>
      <title>Remote user cannot access the inside corporate network using any</title>
      <link>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838885#M459766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Lourdes Anne,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad to hear that worked out for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"May I ask the reason for removing the static nat: &lt;/P&gt;&lt;P&gt;static (inside,inside) 172.30.20.0 172.30.10.0 netmask 255.255.255.0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW sees that IP segment comes from outside interface but your above statement tells FW to translate it to inside, which is a contradictory rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate, any help post, so that it will be a helpful tip for someone else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 13:53:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-user-cannot-access-the-inside-corporate-network-using/m-p/1838885#M459766</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-02-09T13:53:27Z</dc:date>
    </item>
  </channel>
</rss>

