<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote access VPN Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804423#M530951</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I did think of this and got it checked. Thansk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Nov 2011 22:29:06 GMT</pubDate>
    <dc:creator>David.Pellat</dc:creator>
    <dc:date>2011-11-10T22:29:06Z</dc:date>
    <item>
      <title>Remote access VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804420#M530937</link>
      <description>&lt;P&gt;Hi, We have an issue where by we connect to various customers and the Cisco IPSEC remote access works fine from our LAN through an ASA5505 to a customer site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have 1 customer that we have some issues with. We can connect&amp;nbsp; from the LAN through to the customers VPN, authenticate and establish a tunnel but in we cannot pass traffic. When we try from outside of the office on a public internet connection the VPN works fine. ANy ideas what could cause this issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Below is a copy of the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.3.201 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address x.x.x.x 255.255.255.0 &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;object-group network Offsite-Authorised-VPNPoints&lt;BR /&gt;network-object x.x.x.x 255.255.255.255&lt;BR /&gt;network-object x.x.x.x&amp;nbsp; 255.255.255.255&lt;BR /&gt;network-object x.x.x.x 255.255.255.255&lt;BR /&gt;network-object x.x.x.x 255.255.255.255&lt;BR /&gt;network-object x.x.x.x 255.255.255.255&lt;BR /&gt;network-object x.x.x.x 255.255.255.255&lt;/P&gt;&lt;P&gt;object-group network Onsite-Authorised-VPNPoints&lt;BR /&gt;network-object 192.168.3.0 255.255.255.0&lt;BR /&gt;object-group service VPNports&lt;BR /&gt;service-object udp eq isakmp &lt;BR /&gt;service-object tcp eq 10000 &lt;BR /&gt;service-object udp eq 4500 &lt;BR /&gt;service-object gre &lt;BR /&gt;service-object esp &lt;BR /&gt;service-object tcp eq pptp &lt;/P&gt;&lt;P&gt;access-list INSIDE extended permit tcp 192.168.3.0 255.255.255.0 host 4.35.174.43 eq 445 &lt;BR /&gt;access-list INSIDE extended deny object-group Blocked-MS-ports any any &lt;BR /&gt;access-list INSIDE extended permit object-group VPNports object-group Onsite-Authorised-VPNPoints object-group Offsite-Authorised-VPNPoints &lt;BR /&gt;access-list INSIDE extended permit tcp object-group Outbound-SMTP-Servers any eq smtp &lt;BR /&gt;access-list INSIDE extended deny tcp 192.168.3.0 255.255.255.0 any eq smtp &lt;BR /&gt;access-list INSIDE extended permit ip 192.168.3.0 255.255.255.0 any &lt;BR /&gt;access-list INSIDE extended deny ip any any &lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 192.168.3.0 255.255.255.0&lt;BR /&gt;static (outside,inside) tcp 192.168.3.177 www 0.0.0.0 8800 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 203.x.x.x 192.168.3.204 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,outside) 203.x.x.x 192.168.3.207 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,outside) 203.x.x.x 192.168.3.118 netmask 255.255.255.255 dns &lt;BR /&gt;static (inside,outside) 203.x.x.x 192.168.3.52 netmask 255.255.255.255 dns &lt;BR /&gt;access-group INSIDE in interface inside&lt;BR /&gt;access-group OUTSIDE in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 203.x.x.x 1&lt;/P&gt;&lt;P&gt;crypto isakmp nat-traversal 30&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 1024&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect pptp &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;&amp;nbsp; inspect ils &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:24:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804420#M530937</guid>
      <dc:creator>David.Pellat</dc:creator>
      <dc:date>2019-03-11T21:24:13Z</dc:date>
    </item>
    <item>
      <title>Remote access VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804421#M530945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most likely the VPN server has not had NAT-T enabled, hence it is using ESP packet for Phase 2.&lt;/P&gt;&lt;P&gt;When you are connecting from the outside, it doesn't go through a PAT device, hence it works just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find out if NAT-T is enabled on the VPN server and enable it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 08:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804421#M530945</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-09-14T08:44:43Z</dc:date>
    </item>
    <item>
      <title>Remote access VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804422#M530947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another possibility is that, since you say that this remote access connection works fine for other customers, it is possible that your local LAN subnet is the same as the remote end LAN Subnet, for example if your LAN is 10.1.1.0/24, and the remote LAN is the same, when you connect via VPN Client, when you attempt to access resources on the remote LAN, your local machine thinks you are trying to access resources on your local subnet, so it never makes it over the RA VPN tunnel.&amp;nbsp; This would explain it working from a public Internet connection, but not within your office.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 13:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804422#M530947</guid>
      <dc:creator>Scott Conklin</dc:creator>
      <dc:date>2011-09-14T13:23:28Z</dc:date>
    </item>
    <item>
      <title>Remote access VPN Issue</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804423#M530951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I did think of this and got it checked. Thansk&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Nov 2011 22:29:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-issue/m-p/1804423#M530951</guid>
      <dc:creator>David.Pellat</dc:creator>
      <dc:date>2011-11-10T22:29:06Z</dc:date>
    </item>
  </channel>
</rss>

