<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN traffic flow problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664499#M535254</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad :/! I restarted the ASA, now it works &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;!!&lt;/P&gt;&lt;H4&gt;Thanks for all the help! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/H4&gt;&lt;P&gt;Much appreciated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Jul 2011 06:19:11 GMT</pubDate>
    <dc:creator>JohanKardell</dc:creator>
    <dc:date>2011-07-28T06:19:11Z</dc:date>
    <item>
      <title>VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664494#M535249</link>
      <description>&lt;P&gt;I'm having some trouble with getting cisco vpn traffic to flow from a remote site that's using NAT to my home Cisco VPN connection, the connection is established, but I can't do anything with my VPN connection, ping, and reach my home network is not working, the only thing I can reach is Internet, since I'm using Split Tunneling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried to connect from my iPhone to my home VPN, and that's no problem, I can then reach all resources on my home network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also tried to set up a new VPN connection, on my home ASA, without Split Tunneling, and can then only reach my public ip at my home ASA, that's, only ping it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote site is using a cisco firewall as well, but the problem is that I can't provide or get into that firewall, there should not however be any restrictions for outgoing VPN traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sorry for not being able to provide all information, my question is more If there's is anything in my config that could cause this behavior?&lt;/P&gt;&lt;P&gt;I do however understand that there's most certainly something on the remote network that's stopping me, and I do understand that there's very little information I'm providing, just curious, and wondering If someone can take a &lt;SPAN style="text-decoration: underline;"&gt;quick glance&lt;/SPAN&gt; at my config... See if there's anything that's wrong.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I'm not however asking you to solve my problem, this is more a question see If I have configured anything strange / wrong.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks so much!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here's my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname UsersASA&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.30.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 95.95.95.7 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.16.30.0 255.255.255.0 172.16.30.32 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list MSS_EXCEEDED_ACL extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list VPN-SPLIT-TUNNEL remark VPN SPLIT TUNNEL&lt;/P&gt;&lt;P&gt;access-list VPN-SPLIT-TUNNEL standard permit 172.16.30.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tcp-map MSS-MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; exceed-mss allow&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 8192&lt;/P&gt;&lt;P&gt;logging console notifications&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN 172.16.30.33-172.16.30.38 mask 255.255.255.248&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 95.95.95.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.30.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.30.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.30.10-172.16.30.30 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 95.95.95.52 95.95.95.67 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 432000 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain HOME interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;group-policy VPNHOME internal&lt;/P&gt;&lt;P&gt;group-policy VPNHOME attributes&lt;/P&gt;&lt;P&gt; dns-server value 95.95.95.52 95.95.95.67&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VPN-SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; split-dns value 95.95.95.52 95.95.95.67&lt;/P&gt;&lt;P&gt; msie-proxy method no-proxy&lt;/P&gt;&lt;P&gt;username admin password XXXXXXXX encrypted privilege 15&lt;/P&gt;&lt;P&gt;username User password XXXXXXXX encrypted privilege 0&lt;/P&gt;&lt;P&gt;username User attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy VPNHOME&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt; default-group-policy VPNHOME&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map MSS_EXCEEDED_MAP&lt;/P&gt;&lt;P&gt; match access-list MSS_EXCEEDED_ACL&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class MSS_EXCEEDED_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options MSS-MAP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command perfmon&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command ping&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command who&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command packet-tracer&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command import&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command running-config&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command reload&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command mode&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command firewall&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command cpu&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vlan&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ipv6&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ospf&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command eigrp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpnclient&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command blocks&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command wccp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command webvpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command module&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command uauth&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command compression&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command privilege&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:f450c4621b8c6a366d3067c05313b959&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:02:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664494#M535249</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2019-03-11T21:02:44Z</dc:date>
    </item>
    <item>
      <title>VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664495#M535250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Johan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To begin with, please assign a vpn pool with different range, say for example 10.10.10.0 255.255.255.0. Overlapping pools with internal network or in same range is not recommended even if you use different subnet mask. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly enable "crypto isakmp nat-traversal", right now you have "no crypto isakmp nat-traversal".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 07:17:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664495#M535250</guid>
      <dc:creator>Parminder Sian</dc:creator>
      <dc:date>2011-07-26T07:17:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664496#M535251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you so much! I'll try this as soon as possible tomorrow &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2011 14:39:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664496#M535251</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2011-07-26T14:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664497#M535252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It kind of works :)!&lt;/P&gt;&lt;P&gt;I can now reach the resources on my lan from the remote site, for example I have a disk at 172.16.30.2 that I can reach when connected to the vpn, one problem though, I can't reach rescoures that's on my asa's dhcp scoop.... from the vpn client.. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have applied 10.10.10.0/24 to my vpn client pool..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is now my current config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname KardesASA&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;enable password XXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.30.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 95.95.95.7 255.255.255.128 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd XXXXXXXXXX encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CEST 1&lt;/P&gt;&lt;P&gt;clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt; protocol-object udp&lt;/P&gt;&lt;P&gt; protocol-object tcp&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.16.30.0 255.255.255.0 10.10.10.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list MSS_EXCEEDED_ACL extended permit tcp any any &lt;/P&gt;&lt;P&gt;access-list VPN-SPLIT-TUNNEL remark VPN SPLIT TUNNEL&lt;/P&gt;&lt;P&gt;access-list VPN-SPLIT-TUNNEL standard permit 172.16.30.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tcp-map MSS-MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; exceed-mss allow&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging buffer-size 8192&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered notifications&lt;/P&gt;&lt;P&gt;logging asdm notifications&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;ip local pool VPN 10.10.10.1-10.10.10.30 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-625-53.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 95.95.95.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.30.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.30.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 172.16.30.10-172.16.30.30 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 95.95.95.52 95.95.95.67 interface inside&lt;/P&gt;&lt;P&gt;dhcpd lease 432000 interface inside&lt;/P&gt;&lt;P&gt;dhcpd domain kardellskillby interface inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;group-policy VPNHOME internal&lt;/P&gt;&lt;P&gt;group-policy VPNHOME attributes&lt;/P&gt;&lt;P&gt; dns-server value 95.95.95.52 95.95.95.67&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value VPN-SPLIT-TUNNEL&lt;/P&gt;&lt;P&gt; default-domain value kardellskillbyvpn&lt;/P&gt;&lt;P&gt; split-dns value 95.95.95.52 95.95.95.67 &lt;/P&gt;&lt;P&gt; msie-proxy method no-proxy&lt;/P&gt;&lt;P&gt;username admin password XXXXXXXXXXX encrypted privilege 15&lt;/P&gt;&lt;P&gt;username Karde password XXXXXXXXXXX encrypted privilege 0&lt;/P&gt;&lt;P&gt;username Karde attributes&lt;/P&gt;&lt;P&gt; vpn-group-policy VPNHOME&lt;/P&gt;&lt;P&gt; vpn-group-policy VPNHOME&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN&lt;/P&gt;&lt;P&gt; default-group-policy VPNHOME&lt;/P&gt;&lt;P&gt;tunnel-group VPNHOME ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map MSS_EXCEEDED_MAP&lt;/P&gt;&lt;P&gt; match access-list MSS_EXCEEDED_ACL&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp error &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt; class MSS_EXCEEDED_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options MSS-MAP&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command perfmon&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command ping&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command who&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode exec command packet-tracer&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command import&lt;/P&gt;&lt;P&gt;privilege show level 5 mode exec command running-config&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command reload&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command mode&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command firewall&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command cpu&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vlan&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ipv6&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command failover&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ospf&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command eigrp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpnclient&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command vpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command blocks&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command wccp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command webvpn&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command module&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command uauth&lt;/P&gt;&lt;P&gt;privilege show level 3 mode exec command compression&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command interface&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command clock&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command access-list&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ip&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command asdm&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command route&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command aaa&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command ssh&lt;/P&gt;&lt;P&gt;privilege show level 3 mode configure command dhcpd&lt;/P&gt;&lt;P&gt;privilege show level 5 mode configure command privilege&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command dns-hosts&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command aaa-server&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode exec command crypto&lt;/P&gt;&lt;P&gt;privilege cmd level 3 mode configure command failover&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command logging&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command arp&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command crypto&lt;/P&gt;&lt;P&gt;privilege clear level 3 mode configure command aaa-server&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:aaa1f198bf3fbf223719e7920273dc2e&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS!!!!!!!!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 08:03:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664497#M535252</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2011-07-27T08:03:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664498#M535253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Johan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the default gateway on the the pc's or server those pick the ip from asa's dhcp scope? It should internal ip address of ASA i.e 172.16.30.1. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if it is and still dosent work, try adding a static route on these machines i.e to reach vpn pool go to asa inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Jul 2011 12:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664498#M535253</guid>
      <dc:creator>Parminder Sian</dc:creator>
      <dc:date>2011-07-27T12:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN traffic flow problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664499#M535254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My bad :/! I restarted the ASA, now it works &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;!!&lt;/P&gt;&lt;H4&gt;Thanks for all the help! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/H4&gt;&lt;P&gt;Much appreciated!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Jul 2011 06:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-traffic-flow-problem/m-p/1664499#M535254</guid>
      <dc:creator>JohanKardell</dc:creator>
      <dc:date>2011-07-28T06:19:11Z</dc:date>
    </item>
  </channel>
</rss>

