<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: access to inside from ASA vpn client with the same IP addres in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552632#M610345</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand your problem.&lt;/P&gt;&lt;P&gt;The VPN pool and the internal segment are not overlapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Sep 2010 21:06:14 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-09-28T21:06:14Z</dc:date>
    <item>
      <title>access to inside from ASA vpn client with the same IP addressing</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552631#M610341</link>
      <description>&lt;P&gt;I need give the network ip pool client vpn 10.70.253.0/24, and the network in inside is 10.70.255.0/24, when I connect VPN client from internet I can reach all network in the LAN&amp;nbsp; but the segment 10.70.255.0 is imposible.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;How I can do a walkarround of this problem?. I can`t change the network of pool vpn.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552631#M610341</guid>
      <dc:creator>jaime.gonzalez</dc:creator>
      <dc:date>2019-03-11T18:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: access to inside from ASA vpn client with the same IP addres</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552632#M610345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't understand your problem.&lt;/P&gt;&lt;P&gt;The VPN pool and the internal segment are not overlapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 21:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552632#M610345</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-28T21:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: access to inside from ASA vpn client with the same IP addres</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552633#M610349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, but, If i try to reach other network it work, please see the config below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Admin extended permit ip host 9.9.9.9 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit icmp 10.70.255.0 255.255.255.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit ip 10.70.255.0 255.255.255.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit ip 145.125.0.0 255.255.0.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit ip 129.0.0.0 255.0.0.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit icmp 145.125.0.0 255.255.0.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;access-list Admin extended permit icmp 129.0.0.0 255.0.0.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;ip local pool Admin 10.70.253.1-10.70.253.254 mask 255.255.255.0&lt;BR /&gt;group-policy Admin internal&lt;BR /&gt;group-policy Admin attributes&lt;BR /&gt; split-tunnel-network-list value Admin&lt;BR /&gt; address-pools value Admin&lt;BR /&gt;tunnel-group Admin type remote-access&lt;BR /&gt;tunnel-group Admin general-attributes&lt;BR /&gt; address-pool Admin&lt;BR /&gt; default-group-policy Admin&lt;BR /&gt;tunnel-group Admin ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the "debug icmp trace" show a correct response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 22:07:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552633#M610349</guid>
      <dc:creator>jaime.gonzalez</dc:creator>
      <dc:date>2010-09-28T22:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: access to inside from ASA vpn client with the same IP addres</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552634#M610351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you also have the traffic between 10.70.255.0 255.255.255.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;included in the NONAT ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, you have something like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NAME permit ip 10.70.255.0 255.255.255.0 10.70.253.0 255.255.255.0 &lt;BR /&gt;nat (inside) 0 access-list NAME&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The debug icmp trace shows requests/responses fine?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question.&lt;/P&gt;&lt;P&gt;The 10.70.255.0/24 has a default gateway which points to the ASA's internal IP?&lt;/P&gt;&lt;P&gt;If there's a router in between you might want to check if that device is blocking this traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the result of the packet tracer from the VPN client when connected to the 10.70.255.0/24 network?&lt;/P&gt;&lt;P&gt;Do you see packets encrypted/decrypted for that security association?&amp;nbsp; sh cry ips sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 22:18:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552634#M610351</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-09-28T22:18:43Z</dc:date>
    </item>
    <item>
      <title>Re: access to inside from ASA vpn client with the same IP addres</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552635#M610354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made a mistake with the information , the network inside is 10.70.0.0/16 and the ip pool vpn is 10.70.253.0....sorry. I beleave it is overlaping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it`s the result of&amp;nbsp; :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&amp;nbsp; &lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read about and I`m fear the ASA&amp;nbsp; see an attempt of spoofing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Sep 2010 23:14:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552635#M610354</guid>
      <dc:creator>jaime.gonzalez</dc:creator>
      <dc:date>2010-09-28T23:14:44Z</dc:date>
    </item>
    <item>
      <title>Re: access to inside from ASA vpn client with the same IP addres</title>
      <link>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552636#M610356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you paste the entire output of the packet-tracer? You might have to disable "ip verify reverse-path INTERFACE" on the interface you are getting that error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 00:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-to-inside-from-asa-vpn-client-with-the-same-ip-addressing/m-p/1552636#M610356</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-09-29T00:06:41Z</dc:date>
    </item>
  </channel>
</rss>

