<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Natting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759991#M532384</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the answer below work for you too Luis?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 27 Aug 2011 23:39:51 GMT</pubDate>
    <dc:creator>Arvo Bowen</dc:creator>
    <dc:date>2011-08-27T23:39:51Z</dc:date>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759984#M532375</link>
      <description>&lt;P&gt;I'm having issues with getting traffic from my VPN client (IP 10.71.2.2) to my inside local network client (IP 10.71.1.11).&amp;nbsp; I have my config attached.&amp;nbsp; Is there something I'm missing?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:17:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759984#M532375</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2019-03-11T21:17:40Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759985#M532376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arvo, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try adding this for the NAT bypass: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network INSIDE_LAN&lt;/P&gt;&lt;P&gt;subnet 10.71.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VPN-pool &lt;/P&gt;&lt;P&gt;subnet 10.71.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static INSIDE_LAN INSIDE_LAN destination static VPN-pool VPN-pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then test again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know how it goes. Thanks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raga &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Aug 2011 19:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759985#M532376</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-26T19:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759986#M532377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That didn't seem to work... &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the following...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN-INSIDE&lt;/P&gt;&lt;P&gt; subnet 10.71.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description Local area network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN-VPN&lt;/P&gt;&lt;P&gt; subnet 10.71.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description All VPN clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-INSIDE LAN-INSIDE destination static LAN-VPN LAN-VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*No errors popup in the log... &lt;SPAN __jive_emoticon_name="confused" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 00:32:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759986#M532377</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-27T00:32:46Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759987#M532378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #333333; font-family: arial, helvetica, sans-serif; font-size: 10pt; text-align: left; padding: 8px;"&gt;My latest config...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(2) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ACS-000-ROU2&lt;/P&gt;&lt;P&gt;domain-name MYDOMAIN.LOCAL&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 21&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 31&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 100&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 100&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 100&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport trunk allowed vlan 1,31&lt;/P&gt;&lt;P&gt; switchport mode trunk&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.71.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; description All outgoing traffic to the internet&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 12.12.30.204 255.255.255.224 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan21&lt;/P&gt;&lt;P&gt; nameif dmz_ftp&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.71.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan31&lt;/P&gt;&lt;P&gt; nameif corp&lt;/P&gt;&lt;P&gt; security-level 10&lt;/P&gt;&lt;P&gt; ip address 10.71.3.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa842-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 10.71.1.3&lt;/P&gt;&lt;P&gt; domain-name MYDOMAIN.LOCAL&lt;/P&gt;&lt;P&gt;object network LAN-INSIDE&lt;/P&gt;&lt;P&gt; subnet 10.71.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description My Business Name local area network&lt;/P&gt;&lt;P&gt;object network LAN-VPN&lt;/P&gt;&lt;P&gt; subnet 10.71.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; description All VPN clients&lt;/P&gt;&lt;P&gt;object network ASA-INSIDE&lt;/P&gt;&lt;P&gt; host 10.71.1.1&lt;/P&gt;&lt;P&gt; description ASA 5505's IP address&lt;/P&gt;&lt;P&gt;object network ACS-000-APB2&lt;/P&gt;&lt;P&gt; host 10.71.1.11&lt;/P&gt;&lt;P&gt; description User&lt;/P&gt;&lt;P&gt;object service 63210&lt;/P&gt;&lt;P&gt; service tcp source eq 63210 &lt;/P&gt;&lt;P&gt; description 63210&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 10.22.161.4&lt;/P&gt;&lt;P&gt; network-object host 10.61.1.13&lt;/P&gt;&lt;P&gt;access-list outside_access_in remark Allow ping replys from outside to inside (hosts on the internet)&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit ip any 10.71.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended deny tcp object ACS-000-APB2 object-group DM_INLINE_NETWORK_1 log disable &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Allow ssh from the inside to the ASA (used to admin the ASA)&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp object LAN-INSIDE object ASA-INSIDE eq ssh &lt;/P&gt;&lt;P&gt;access-list inside_access_in remark Allow all tcp and ping traffic from inside to outside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object LAN-INSIDE any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz_ftp 1500&lt;/P&gt;&lt;P&gt;mtu corp 1500&lt;/P&gt;&lt;P&gt;ip local pool GRM_VPN_IP_POOL 10.71.2.2-10.71.2.253&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-INSIDE LAN-INSIDE destination static LAN-VPN LAN-VPN&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static ACS-000-APB2 interface service 63210 63210&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface description Used to preform a port address translation on traffic going from the inside int to the outside int&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 12.12.30.193 255&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server GRM_AUTH_GROUP protocol kerberos&lt;/P&gt;&lt;P&gt;aaa-server GRM_AUTH_GROUP (inside) host 10.71.1.3&lt;/P&gt;&lt;P&gt; kerberos-realm MYDOMAIN.LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console GRM_AUTH_GROUP LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 10.71.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint MY_BUSINESS_NAME&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; subject-name O=My Business Name,C=US,St=TX,L="Somewhere, TX"&lt;/P&gt;&lt;P&gt; keypair mydomain.local&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca certificate chain MY_BUSINESS_NAME&lt;/P&gt;&lt;P&gt; certificate 69b2564e&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308202ca 30820233 a0030201 02020469 b2564e30 0d06092a 864886f7 0d010105 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 05003077 31153013 06035504 07130c4e 6f726372 6f73732c 20474131 0b300906 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03550408 13024741 310b3009 06035504 06130255 53311530 13060355 040a130c &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 41637320 4e6f7263 726f7373 312d302b 06092a86 4886f70d 01090216 1e414353 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2d303030 2d524f55 322e4143 532d4154 4c414e54 412e4c4f 43414c30 1e170d31 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31303832 36303530 3233385a 170d3231 30383233 30353032 33385a30 77311530 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13060355 0407130c 4e6f7263 726f7373 2c204741 310b3009 06035504 08130247 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 41310b30 09060355 04061302 55533115 30130603 55040a13 0c416373 204e6f72 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 63726f73 73312d30 2b06092a 864886f7 0d010902 161e4143 532d3030 302d524f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 55322e41 43532d41 544c414e 54412e4c 4f43414c 30819f30 0d06092a 864886f7 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0d010101 05000381 8d003081 89028181 00908394 7143ba7c e5e01486 0bdd4c5d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ecb01961 8b6cfdae 02daf9cc 1d34e63e 23adcacb 81797e22 306cf3ff 628affa2 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e281e7fd 6ee0aee0 9d98d69d 91d3edd0 63fcac93 b76a3df1 d26a6af7 8ceef157 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8f767a97 19744eeb 1f2b32ba 0358697d 88c7b850 785db121 a2677c83 2389dd14 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f687e4a1 e5b6c628 af0d0832 6db59505 4d020301 0001a363 3061300f 0603551d &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 130101ff 04053003 0101ff30 0e060355 1d0f0101 ff040403 02018630 1f060355 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1d230418 30168014 952d0a89 9fa0eaab d0efcbe6 faf03ae0 0517e28e 301d0603 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 551d0e04 16041495 2d0a899f a0eaabd0 efcbe6fa f03ae005 17e28e30 0d06092a &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 864886f7 0d010105 05000381 81005938 70b2c186 50459016 c7b245aa 1166d6fc &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ba6a3959 0f090b87 bd66a43c 9f7f9d82 f908b612 8ce6c67c affba5b7 08fa277f &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 65b95fb5 31019677 f9b3ec4e c78c7c42 4199e84d 70419209 2a3fce73 9757718b &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 877a8c96 a1d08464 1c6cf64b 18a16ea6 881a50db d03f6959 433518e4 159d4ed0 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 957f95a7 79fb2284 0e4cf306 a2af&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ikev1 enable outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 10&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 20&lt;/P&gt;&lt;P&gt; authentication rsa-sig&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 50&lt;/P&gt;&lt;P&gt; authentication rsa-sig&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 60&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-192&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 70&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 80&lt;/P&gt;&lt;P&gt; authentication rsa-sig&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 90&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 100&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 110&lt;/P&gt;&lt;P&gt; authentication rsa-sig&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 120&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 130&lt;/P&gt;&lt;P&gt; authentication crack&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 140&lt;/P&gt;&lt;P&gt; authentication rsa-sig&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 150&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 10.71.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 10.71.1.5-10.71.1.132 inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev2 ssl-clientless&lt;/P&gt;&lt;P&gt;group-policy VPN_GROUP_POLICY internal&lt;/P&gt;&lt;P&gt;group-policy VPN_GROUP_POLICY attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol ikev1 l2tp-ipsec &lt;/P&gt;&lt;P&gt;tunnel-group MYBUSSINESNAME type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group MYBUSSINESNAME general-attributes&lt;/P&gt;&lt;P&gt; address-pool GRM_VPN_IP_POOL&lt;/P&gt;&lt;P&gt; authentication-server-group GRM_AUTH_GROUP&lt;/P&gt;&lt;P&gt; default-group-policy VPN_GROUP_POLICY&lt;/P&gt;&lt;P&gt;tunnel-group MYBUSSINESNAME ipsec-attributes&lt;/P&gt;&lt;P&gt; ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt; ikev1 trust-point MY_BUSINESS_NAME&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home reporting anonymous prompt 2&lt;/P&gt;&lt;P&gt;Cryptochecksum:c44b2c6b077607cc0a50f38c05a3a11d&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 14:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759987#M532378</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-27T14:12:18Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759988#M532379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok try this, add the following command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then connect with the VPN client and ping 10.71.1.1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should get replies. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then ping something else on your network and grab the output of the "show crypto ipsec sa". &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post it here. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question, this ASA is the default gateway of the subnets you are trying to reach right? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 17:42:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759988#M532379</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-27T17:42:04Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759989#M532381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI , &lt;/P&gt;&lt;P&gt;BE SURE WHAT NAT RULE YOUR TRAFFIC IS HITTING , PROVIDE THE FOLLOWING :&lt;/P&gt;&lt;P&gt;PACKET-TRACER INPUT INSIDE ICMP [LOCAL INSIDE IP ADDRESS] 8 8 [YOUR VPN CLIENT IP ADDRESS] DET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DO THE FOLLOWING :&lt;/P&gt;&lt;P&gt;SHOW CRYPTO IPSEC SA PEER [PUBLIC IP ADDRESS OF THE MACHINE THAT YOU ARE CONNECTON THE VPN FROM]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SEE IF YOU GET ENCAPS AND DECAPS FOR THAT CONNCTION .&lt;/P&gt;&lt;P&gt;AFTER THOSE WE CAN CONCLUDE WHAT IS THE PROBLEM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CHEERS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 18:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759989#M532381</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2011-08-27T18:17:27Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759990#M532383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACS-000-ROU2(config)# PACKET-TRACER INPUT inside ICMP 10.71.1.11 8 8 10.71.2.2 ICMP 10.71.1.11 8 8 10.71.2.2 DET &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcb48ce80, priority=1, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=9045989, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit object-group DM_INLINE_PROTOCOL_1 object LAN-INSIDE any&lt;/P&gt;&lt;P&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;/P&gt;&lt;P&gt; protocol-object ip&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcbd93c30, priority=13, domain=permit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2088, user_data=0xc94fadc0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.71.1.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcbd9b0d0, priority=0, domain=inspect-ip-options, deny=true&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=66678, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcbd9ae38, priority=66, domain=inspect-icmp-error, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=22, user_data=0xcb3e69e0, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-INSIDE LAN-INSIDE destination static LAN-VPN LAN-VPN&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 10.71.1.11/0 to 10.71.1.11/0&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcc09e210, priority=6, domain=nat, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0xcc09dd18, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.71.1.0, mask=255.255.255.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.71.2.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt; Forward Flow based lookup yields rule:&lt;/P&gt;&lt;P&gt; in&amp;nbsp; id=0xcb3e2ed0, priority=0, domain=host-limit, deny=false&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=52786, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 78102, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Module information for forward flow ...&lt;/P&gt;&lt;P&gt;snp_fp_tracer_drop&lt;/P&gt;&lt;P&gt;snp_fp_inspect_ip_options&lt;/P&gt;&lt;P&gt;snp_fp_translate&lt;/P&gt;&lt;P&gt;snp_fp_adjacency&lt;/P&gt;&lt;P&gt;snp_fp_fragment&lt;/P&gt;&lt;P&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACS-000-ROU2(config)# show crypto ipsec sa peer 71.129.152.103&lt;/P&gt;&lt;P&gt;peer address: 71.199.156.103&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: SYSTEM_DEFAULT_CRYPTO_MAP, seq num: 65535, local addr: 12.12.30.204&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (10.71.2.2/255.255.255.255/0/0)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 71.129.152.103, username: arvo.bowen&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic allocated peer ip: 10.71.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 5, #pkts decrypt: 5, #pkts verify: 5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 12.12.30.204/4500, remote crypto endpt.: 71.129.152.103/4500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 82, media mtu 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 001A53ED&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current inbound spi : 68C6FE98&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x68C6FE98 (1757871768)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac no compression&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 49152, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 3574&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x000000FF&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x001A53ED (1725421)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-aes esp-sha-hmac no compression&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 49152, crypto-map: SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 3574&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 16 bytes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anti replay bitmap:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0x00000000 0x00000001&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 23:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759990#M532383</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-27T23:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759991#M532384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the answer below work for you too Luis?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 27 Aug 2011 23:39:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759991#M532384</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-27T23:39:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759992#M532385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arvo, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont see any reference to the VPN rules on the above output for the packet tracker. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you have on the client statistics undert "Tunnel Details" and "Route Details" ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you see packets encrypted? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you see as secured routes? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 04:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759992#M532385</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-30T04:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759993#M532386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems like it was working the whole time...&amp;nbsp; I asked someone else and found out that the machine I was trying to ping was simply not responding to my ping (echo) requests...&amp;nbsp; The reason I was thinking that it was not working was because I tried to ping the inside ip of the ASA itself...&amp;nbsp; For some reason I can not ping the ASA itself but I can get to everything on that network (the inside network).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 15:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759993#M532386</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-30T15:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759994#M532387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Huh, interesting &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; . &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the ASA itself will not respond to pings unless you add the following command: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;management-access inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will allow the inside interface to respond to the ICMP packets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have fun &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: Please remember to mark this question as answered. Thanks! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 15:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759994#M532387</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-30T15:19:30Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759995#M532388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually currently the ASA responds to pings on my local INSIDE interface (10.71.1.1 being the ASA) and there is nothing in the config at all about "management-access".&amp;nbsp; Though I can not ping 10.71.1.1 from my VPN client 10.71.2.2&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&amp;nbsp; any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 15:24:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759995#M532388</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-30T15:24:46Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759996#M532389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeap, That's the default behavior, the inside interface will respond from the inside LAN but not from the VPN client unless you add the management-access inside command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping from inside to inside interface: responds &lt;/P&gt;&lt;P&gt;ping from vpn to inside interface: fails &lt;/P&gt;&lt;P&gt;ping from vpn to inside interface with management access enabled: responds. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the info about it from command reference of the ASA 8.4 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt; management-access &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp2112286"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To allow management access to an interface other than the one from which you entered the ASA when using VPN, use the &lt;STRONG&gt;management-access&lt;/STRONG&gt; command in global configuration mode. To disable management access, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp2112288"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access&lt;/STRONG&gt; &lt;EM&gt;mgmt_if&lt;/EM&gt; &lt;/P&gt;&lt;P&gt; &lt;A name="wp2112289"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no management-access&lt;/STRONG&gt; &lt;EM&gt;mgmt_if&lt;/EM&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This command allows you to connect to an interface other than the one&amp;nbsp; you entered the ASA from when using a full tunnel IPSec VPN or SSL VPN&amp;nbsp; client (AnyConnect 2.x client, SVC 1.x) or across a site-to-site IPSec&amp;nbsp; tunnel. For example, if you enter the ASA from the outside interface,&amp;nbsp; this command lets you connect to the inside interface using Telnet; or&amp;nbsp; you can ping the inside interface when entering from the outside&amp;nbsp; interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp2112371"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; You can define only one management-access interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp2137211"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; With the &lt;STRONG&gt;management-access&lt;/STRONG&gt; command, an internal&amp;nbsp; interface does not accept UDP or ICMP traffic over a clear-text&amp;nbsp; interface even when the traffic was self-initiated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a good one! &lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 15:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759996#M532389</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-30T15:37:48Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759997#M532390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Luis!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, tried that and no dice.&amp;nbsp; I enabled it for the inside interface and even tried reconnecting the VPN client...&amp;nbsp; I can not ping the ASA's inside IP (10.71.1.1) AKA the gateway for my inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 19:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759997#M532390</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-30T19:47:11Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759998#M532391</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, that's weird ...&amp;nbsp; the only thing I could think of is enabling debug icmp trace and then start a continuous ping to the 10.71.1.1 and see what the ASA tells you about it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Aug 2011 20:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759998#M532391</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-30T20:12:53Z</dc:date>
    </item>
    <item>
      <title>VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759999#M532392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Arvo, you are hitting a bug man! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check it out: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtr16184"&gt;http://tools.cisco.com/Support/BugToolKit/search/getBugDetails.do?method=fetchBugDetails&amp;amp;bugId=CSCtr16184&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's why the inside interface doesnt respond even with the management access command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Someone else reported a similar problem a few minutes ago. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have fun! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: Please remember to mark this question as answered unless you have any other questions.Thx! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 18:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1759999#M532392</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-31T18:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1760000#M532393</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That worked perfectly Luis!&amp;nbsp; Thanks!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just had to open the ASDM, go to my NAT Rules inside Configuration and then edit my VPN to local lan NAT rule...&amp;nbsp; Just needed to tick (check) the last check box called "Lookup route table to locate egress interface"!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If using the CLI all you need to do is add "route-lookup" to the end of the NAT rule (before description)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ex:&lt;/P&gt;&lt;P&gt;ASA's Management-Access Interface IP address is 192.168.1.1. &lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px;" /&gt;&lt;/P&gt;&lt;P&gt;! Overlapping NAT statement:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.1.0 obj-192.168.1.0 destination&lt;/P&gt;&lt;P&gt;static obj-vpn obj-vpn&lt;/P&gt;&lt;P&gt;&lt;BR style="line-height: 11px;" /&gt;&lt;/P&gt;&lt;P&gt;! New Statement: &lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.1.0 obj-192.168.1.0 destination&lt;/P&gt;&lt;P&gt;static obj-vpn obj-vpn route-lookup&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 19:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1760000#M532393</guid>
      <dc:creator>Arvo Bowen</dc:creator>
      <dc:date>2011-08-31T19:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Natting</title>
      <link>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1760001#M532394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sweeeet. Thanks for the tips &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm glad to hear that you got it working! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a good one. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Aug 2011 19:50:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-natting/m-p/1760001#M532394</guid>
      <dc:creator>raga.fusionet</dc:creator>
      <dc:date>2011-08-31T19:50:48Z</dc:date>
    </item>
  </channel>
</rss>

