<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can't access server on different subnet (ASA issue I believe) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766877#M531545</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm still getting the same response.&amp;nbsp; Have a mistyped something somewhere?&amp;nbsp; I even tried pinging the server to see if other traffic would show up since we removed the eq 80 command.&amp;nbsp; Or does this mean it's not an issue with the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again sir.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Sep 2011 18:03:35 GMT</pubDate>
    <dc:creator>mitchell helton</dc:creator>
    <dc:date>2011-09-08T18:03:35Z</dc:date>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766865#M531525</link>
      <description>&lt;P&gt;First off, let me preface this by saying that I'm a novice when it comes to firewalls and more specifically, the ASA.&amp;nbsp; I do however, have an above average understanding of switches/routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5510 running 8.3 and recently I've decided to clean up the last admin's mess.&amp;nbsp; All hosts and servers are on the same subnet, multiple subnets on the same VLAN... and a slew of other problems.&amp;nbsp; Anyway, I recently placed the IT department on another subnet to test some things out before I migrated other departments to different networks.&amp;nbsp; Everything seems to be working as it should be with the exception of one of our servers.&amp;nbsp; The IT subnet is 192.168.150.0/24 and the problem server is on the 192.168.10.xxx network.&amp;nbsp; I'm guessing the issue lies somewhere in the fact this server does have a static NAT and is accessible from the public.&amp;nbsp; Let me give you an overview of what our network looks like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISP ----&amp;gt;ASA-----&amp;gt;3750-----&amp;gt;2960&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My workstation is directly plugged into the 3750 switch, and the server is plugged into the 2960.&amp;nbsp; I'm able to ping this server by both IP and hostname.&amp;nbsp; However, I cannot access port 80 by IP or hostname.&amp;nbsp; The users that are on the 192.168.10 and 192.168.11 (sadly both of those are on the same VLAN) network are able to access this server without a problem.&amp;nbsp; Thinking logically, I thought I would send a packet from my workstation, it would head to the layer 3 switch's VLAN interface corresponding to my subnet, realize the .10 network is directly connected and then forward the packet straight to the server.&amp;nbsp; However, it doesn't seem to be working that way.&amp;nbsp; It look like it's being routed to the ASA then being dropped.&amp;nbsp; I guess there's an access rule or firewall rule preventing me from getting to the server.&amp;nbsp; Is there a specific part of my config you will need to see... or do I need to post all of it?&amp;nbsp; Thanks for your time.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766865#M531525</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2019-03-11T21:21:58Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766866#M531527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you might need to post the config in order to nail the situation. What you might be doing is u-turning on the firewall and we might need&amp;nbsp; to configure it so that the ASA allows the packets back into the same interface. What I would like to know is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you accessing the server on public ip?&lt;/P&gt;&lt;P&gt;Are both the source and destination on the same interface of the ASA?&lt;/P&gt;&lt;P&gt;Are you able to access the server on private ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this info along with config should be good enough to get started on it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 14:06:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766866#M531527</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T14:06:19Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766867#M531529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the quick response sir!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to access the private IP which is 192.168.10.59.&amp;nbsp; I cannot access the public IP either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our ASA connects to our internal network on the 192.168.15.xxx subnet which is connected to the 3750 switch.&amp;nbsp; The server resides on the 2960 switch which is directly connected to the 3750.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot access the server, via http or https, with any name or IP address.&amp;nbsp; I can however ping the server by name AND IP.&amp;nbsp; The hosts on the .11 and .10 networks are able to access the server without a problem.&amp;nbsp; My machine is on the .150 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.3(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxx&lt;/P&gt;&lt;P&gt;enable password 5UAWulVGFDL9UTag encrypted&lt;/P&gt;&lt;P&gt;passwd 5UAWulVGFDL9UTag encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; description WAN connection to Internet&lt;/P&gt;&lt;P&gt; nameif WAN&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address xxx.xxx.xxx.xxx 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; description LAN connection to internal network&lt;/P&gt;&lt;P&gt; nameif LAN&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.15.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; description DMZ&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.50.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa832-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup WAN&lt;/P&gt;&lt;P&gt;dns domain-lookup LAN&lt;/P&gt;&lt;P&gt;dns domain-lookup management&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 192.168.10.200&lt;/P&gt;&lt;P&gt; domain-name xxxxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 192.168.10.59 &lt;/P&gt;&lt;P&gt; host 192.168.10.59&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network All_Inside_Networks &lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network NAT-Pool &lt;/P&gt;&lt;P&gt; range xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;object network Nat_pool &lt;/P&gt;&lt;P&gt; range xxx.xxx.xxx.xxx xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.15.0_24 &lt;/P&gt;&lt;P&gt; subnet 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_192.168.250.0_25 &lt;/P&gt;&lt;P&gt; subnet 192.168.250.0 255.255.255.128&lt;/P&gt;&lt;P&gt;object network 192.168.10.0 &lt;/P&gt;&lt;P&gt; subnet 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 10.1.5.0 &lt;/P&gt;&lt;P&gt; subnet 10.1.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network 192.168.11.0 &lt;/P&gt;&lt;P&gt; subnet 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 192.168.150.0 &lt;/P&gt;&lt;P&gt; subnet 192.168.150.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 10.1.5.0&lt;/P&gt;&lt;P&gt; network-object host 10.1.50.0&lt;/P&gt;&lt;P&gt; network-object host 10.1.51.0&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object icmp&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 1755 &lt;/P&gt;&lt;P&gt; service-object tcp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt; service-object udp destination eq 1755 &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt; service-object gre &lt;/P&gt;&lt;P&gt; service-object tcp destination eq pptp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_3&lt;/P&gt;&lt;P&gt; service-object tcp destination eq 5222 &lt;/P&gt;&lt;P&gt; service-object tcp destination eq www &lt;/P&gt;&lt;P&gt; service-object tcp destination eq ssh &lt;/P&gt;&lt;P&gt; service-object udp destination range 10000 20000 &lt;/P&gt;&lt;P&gt; service-object udp destination eq 4569 &lt;/P&gt;&lt;P&gt; service-object udp destination eq sip &lt;/P&gt;&lt;P&gt; service-object udp destination range 3000 3200 &lt;/P&gt;&lt;P&gt; service-object tcp destination eq sip &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_4&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object udp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq https &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_5&lt;/P&gt;&lt;P&gt; service-object gre &lt;/P&gt;&lt;P&gt; service-object tcp destination eq pptp &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_1 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_10 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_11 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_2 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_3 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_4 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_5 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_6 tcp&lt;/P&gt;&lt;P&gt; port-object eq 5150&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_7 tcp&lt;/P&gt;&lt;P&gt; port-object eq 3101&lt;/P&gt;&lt;P&gt; port-object eq 995&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_8 tcp&lt;/P&gt;&lt;P&gt; port-object eq pop3&lt;/P&gt;&lt;P&gt; port-object eq smtp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_9 tcp&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt; port-object eq 88&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_12 tcp&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq 5150&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_13 tcp&lt;/P&gt;&lt;P&gt; port-object eq 5150&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_14 tcp&lt;/P&gt;&lt;P&gt; port-object eq 5150&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_TCP_15 tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_6&lt;/P&gt;&lt;P&gt; service-object icmp &lt;/P&gt;&lt;P&gt; service-object tcp destination eq 3389 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list WAN_access_in remark xxxxxxxxx&lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit tcp any object 192.168.10.59 eq www &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit object-group DM_INLINE_PROTOCOL_1 any object 192.168.10.2 inactive &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit object-group DM_INLINE_SERVICE_4 any object 192.168.10.59 &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit tcp any object 192.168.10.192 eq www inactive &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit object-group DM_INLINE_SERVICE_5 any object 192.168.10.221 &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit ip any object-group DM_INLINE_NETWORK_1 inactive &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit tcp host 10.1.10.0 any object-group DM_INLINE_TCP_11 inactive &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit icmp any any echo &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit icmp any any traceroute &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit icmp any any echo-reply &lt;/P&gt;&lt;P&gt;access-list WAN_access_in extended permit icmp any object 192.168.10.214 echo-reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.15.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 10.1.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.101.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.102.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPNUsers_splitTunnelAcl standard permit 192.168.150.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list LAN_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging list VPN_Logs level informational class vpn&lt;/P&gt;&lt;P&gt;logging monitor notifications&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging history VPN_Logs&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;logging mail alerts&lt;/P&gt;&lt;P&gt;logging from-address xxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;logging recipient-address xxxxxxxxxxxxxxx level critical&lt;/P&gt;&lt;P&gt;logging facility 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging host LAN 192.168.150.97&lt;/P&gt;&lt;P&gt;logging permit-hostdown&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 106100&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;flow-export destination LAN 192.168.10.224 2055&lt;/P&gt;&lt;P&gt;mtu WAN 1500&lt;/P&gt;&lt;P&gt;mtu LAN 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip local pool VPNDHCP 192.168.250.1-192.168.250.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-634-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source static 192.168.10.0 192.168.10.0 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (WAN,WAN) source static NETWORK_OBJ_192.168.15.0_24 NETWORK_OBJ_192.168.15.0_24 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source static 192.168.11.0 192.168.11.0 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source static 10.1.5.0 10.1.5.0 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source static 192.168.100.0 192.168.100.0 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) source static 192.168.150.0 192.168.150.0 destination static NETWORK_OBJ_192.168.250.0_25 NETWORK_OBJ_192.168.250.0_25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 192.168.10.59&lt;/P&gt;&lt;P&gt; nat (LAN,WAN) static xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (LAN,WAN) after-auto source dynamic All_Inside_Networks interface&lt;/P&gt;&lt;P&gt;access-group WAN_access_in in interface WAN&lt;/P&gt;&lt;P&gt;access-group LAN_access_in in interface LAN&lt;/P&gt;&lt;P&gt;route WAN 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx xxx&lt;/P&gt;&lt;P&gt;route LAN 10.1.5.0 255.255.255.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route LAN 10.1.10.0 255.255.254.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route LAN 10.1.20.0 255.255.254.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route LAN 10.1.30.0 255.255.254.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route WAN 10.1.50.0 255.255.255.0 xxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;route WAN 10.1.51.0 255.255.255.0 xxxxxxxxxxx&lt;/P&gt;&lt;P&gt;route LAN 10.1.160.0 255.255.240.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.0.0 255.255.0.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;route LAN 192.168.150.0 255.255.255.0 192.168.15.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt; action terminate&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record "Allow VPN Access"&lt;/P&gt;&lt;P&gt; description "Allow VPN access to AD group VPN Users"&lt;/P&gt;&lt;P&gt;aaa-server DC protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server DC (LAN) host 192.168.10.200&lt;/P&gt;&lt;P&gt; ldap-base-dn dc=xxxxxx,dc=local&lt;/P&gt;&lt;P&gt; ldap-scope subtree&lt;/P&gt;&lt;P&gt; ldap-naming-attribute sAMAccountName&lt;/P&gt;&lt;P&gt; ldap-login-password *****&lt;/P&gt;&lt;P&gt; ldap-login-dn cn=xxxxxxxxx,ou=domain resources,dc=xxxxxxx,dc=local&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http 192.168.15.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;http 192.168.250.0 255.255.255.0 WAN&lt;/P&gt;&lt;P&gt;http 192.168.150.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;snmp-server host LAN 192.168.10.224 community ***** udp-port 161&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;snmp-server contact xxxxxxxxx&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps syslog&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec start stop&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity config-change fru-insert fru-remove&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map WAN_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map WAN_map interface WAN&lt;/P&gt;&lt;P&gt;crypto isakmp enable WAN&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.150.0 255.255.255.0 LAN&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics&lt;/P&gt;&lt;P&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable WAN&lt;/P&gt;&lt;P&gt; smart-tunnel list AllExternalApplications All-Applications * platform windows&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; smart-tunnel enable AllExternalApplications&lt;/P&gt;&lt;P&gt;group-policy VPNUsers internal&lt;/P&gt;&lt;P&gt;group-policy VPNUsers attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.10.200 192.168.10.201&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VPNUsers_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value xxxxxxxxx&lt;/P&gt;&lt;P&gt;username admin password jSoYj.edDiNeZnUo encrypted privilege 15&lt;/P&gt;&lt;P&gt;username sycom password VnaY6K57B2JxJva3 encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group VPNUsers type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group VPNUsers general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPNDHCP&lt;/P&gt;&lt;P&gt; authentication-server-group DC&lt;/P&gt;&lt;P&gt; default-group-policy VPNUsers&lt;/P&gt;&lt;P&gt; password-management&lt;/P&gt;&lt;P&gt;tunnel-group VPNUsers webvpn-attributes&lt;/P&gt;&lt;P&gt; radius-reject-message&lt;/P&gt;&lt;P&gt;tunnel-group VPNUsers ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *****&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map global-class1&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; description Netflow to VS-2&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect http &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect mgcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect snmp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt; class global-class1&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 192.168.10.224&lt;/P&gt;&lt;P&gt;policy-map type inspect im IM_Inspection&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;smtp-server 192.168.10.213&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;hpm topN enable&lt;/P&gt;&lt;P&gt;Cryptochecksum:51747c5d5bacf63fc394658b9f4ccccf&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 14:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766867#M531529</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T14:39:52Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766868#M531531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you quickly give this a shot and let me know:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network public_ip&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 1.1.1.1&amp;nbsp; ------------------&amp;gt; public ip of server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network private_ip&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.50.xx&amp;nbsp;&amp;nbsp;&amp;nbsp; -----------------&amp;gt; private ip of server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (LAN,LAN) source dynamic any interface destination static public_ip private_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and also add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 14:49:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766868#M531531</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T14:49:01Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766869#M531533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is in a production environment and currently EVERYONE but the IT subnet is working as they should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this have any impact on anyone else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 15:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766869#M531533</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T15:10:26Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766870#M531535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mitch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config would not hamper any other traffic, I am not really sure how the IT subnet is working fine, since I do not see any nat statement for it on the ASA, is the IT subnet behind the LAN interface only? I would suggest you first test whether the packets hits the ASA LAN interface, when you access it from IT subnet, just to make sure that all the routing is done by the firewall. You can test it by using the captures:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-1222"&gt;https://supportforums.cisco.com/docs/DOC-1222&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 15:22:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766870#M531535</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T15:22:10Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766871#M531537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had some problems come up... finishing them up then I will test this and post back.&amp;nbsp; Thank you so much for all your time and help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IT subnet is behind the LAN interface only... all internal networks are hitting the 192.168.15.2 interface on the ASA when they are being routed externally I believe.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 16:12:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766871#M531537</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T16:12:21Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766872#M531539</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I issued the commands that you suggested but it didn't fix the problem.&amp;nbsp; Going to run the capture here in just a few minutes.&amp;nbsp; Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 16:54:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766872#M531539</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T16:54:34Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766873#M531541</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok... I ran the capture and when I do show capture in-cap and out-cap, I receive 0 packet capture, 0 packet shown as a response.&amp;nbsp; I believe I'm typing everything in correctly, but like I stated in my original post, I'm a novice when it comes to the ASA.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 17:05:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766873#M531541</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T17:05:22Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766874#M531542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post the config that you used for packet-capture??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 17:08:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766874#M531542</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T17:08:01Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766875#M531543</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE&gt;access-list cap-list permit tcp host 192.168.150.97 host 192.168.10.59 eq 80 &lt;BR /&gt;access-list cap-list permit tcp host 192.168.10.59 eq 80 host 192.168.150.97&lt;BR /&gt;&lt;BR /&gt;&lt;PRE&gt;capture in-cap interface lan access-list cap-list buffer 1000000 packet 1522&amp;nbsp; &lt;BR /&gt;capture out-cap interface wan access-list cap-list buffer 1000000 packet 1522&lt;/PRE&gt;
&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 17:45:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766875#M531543</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T17:45:10Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766876#M531544</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can open the access-list a bit and then try again:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;access-list cap-list permit tcp host 192.168.150.97 host 192.168.10.59 &lt;BR /&gt;access-list cap-list permit tcp host 192.168.10.59 host 192.168.150.97&lt;BR /&gt;&lt;BR /&gt;Try again and let me know if there are any packets onto the firewall.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Varun&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 17:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766876#M531544</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T17:54:26Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766877#M531545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm still getting the same response.&amp;nbsp; Have a mistyped something somewhere?&amp;nbsp; I even tried pinging the server to see if other traffic would show up since we removed the eq 80 command.&amp;nbsp; Or does this mean it's not an issue with the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again sir.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 18:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766877#M531545</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T18:03:35Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766878#M531546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the traffic isnt even reaching the firewall so we might need to troubleshoot why? We might need to check the routing and trace the packets on the switches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 18:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766878#M531546</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-09-08T18:08:36Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766879#M531547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the next step you recommend?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to access other servers on that subnet--even those that have static nat public IPs as well... our Spiceworks server for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I do a traceroute to the server I'm having problems with, the packet goes I suspect.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It resolves the name of the server, hits the IT subnet gateway on the 3750 (192.168.150.1) then hits the server at 192.168.10.59&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm really clueless.&amp;nbsp; I am quite certain the switches and routers are functioning properly and was almost sure it was a problem with the ASA.&amp;nbsp; Hoep you can help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 18:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766879#M531547</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T18:15:01Z</dc:date>
    </item>
    <item>
      <title>Can't access server on different subnet (ASA issue I believe)</title>
      <link>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766880#M531549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I resolved the issue and I'm so sorry you wasted so much of your time trying to help me.&amp;nbsp; It was actually an issue with CRM.&amp;nbsp; It stores a registry key with allowed internal IP addresses.&amp;nbsp; Once I added our subnet to the list everything worked fine.&amp;nbsp; Thanks again for all your help with this sir.&amp;nbsp; God bless you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Sep 2011 19:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-t-access-server-on-different-subnet-asa-issue-i-believe/m-p/1766880#M531549</guid>
      <dc:creator>mitchell helton</dc:creator>
      <dc:date>2011-09-08T19:30:24Z</dc:date>
    </item>
  </channel>
</rss>

