<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Webserver  is not able to access from outside the network, V in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462010#M733766</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Siva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason you're not able to access the inside network from the VPN clients, is because your NAT 0 statement looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the reason that you lose Internet when connecting with VPN is because there's no split-tunneling configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split-tunneling extended permit ip 192.168.100.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy ciscovpn attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; split-tunnel-network-list value split-tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ciscovpn general-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default-group-policy ciscovpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 May 2010 23:27:53 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-05-17T23:27:53Z</dc:date>
    <item>
      <title>Webserver  is not able to access from outside the network, VPN in not accepting</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1461999#M733746</link>
      <description>&lt;P&gt;Hi Gurus,&lt;/P&gt;&lt;P&gt;My webserver is not able to access from outside the network. Also cisco vpn is not acceepting any connection.&lt;/P&gt;&lt;P&gt;For Webserver internal address is 192.168.1.2 =&amp;gt; 64.168.82.251&lt;/P&gt;&lt;P&gt;My configuration is given below, please help&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 64.168.82.250 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list inside_access_in extended permit tcp any any object-group DM_INLINE_&lt;BR /&gt;TCP_1&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.10.100.0 255.255.255.&lt;BR /&gt;128&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 10&lt;BR /&gt;.10.100.0 255.255.255.128&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.251 object-&lt;BR /&gt;group DM_INLINE_TCP_2&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool vpnpool 10.10.100.1-10.10.100.100 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (outside,inside) 64.168.82.251 192.168.1.2 netmask 255.255.255.255&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 64.168.82.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set TRANS_ESP_3DES_SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 60&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;BR /&gt;dhcpd dns 4.2.2.1 4.2.2.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; dns-server value 4.2.2.2 4.2.2.1&lt;BR /&gt; vpn-tunnel-protocol l2tp-ipsec&lt;BR /&gt; default-domain value test.local&lt;BR /&gt;group-policy CiscoASA internal&lt;BR /&gt;group-policy CiscoASA attributes&lt;BR /&gt; dns-server value 4.2.2.2&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt;group-policy ciscoasa internal&lt;BR /&gt;group-policy ciscoasa attributes&lt;BR /&gt; dns-server value 4.2.2.2&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt;username siva password xaI3t+nY5wjYQ2thSKJfoQ== nt-encrypted privilege 0&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group CiscoASA type ipsec-ra&lt;BR /&gt;tunnel-group CiscoASA general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy CiscoASA&lt;BR /&gt;tunnel-group ciscoasa type ipsec-ra&lt;BR /&gt;tunnel-group ciscoasa general-attributes&lt;BR /&gt; address-pool vpnpool&lt;BR /&gt; default-group-policy ciscoasa&lt;BR /&gt;tunnel-group ciscoasa ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:1f9bd65614b7affc944713d8d0f5d7ac&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa#&lt;BR /&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:44:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1461999#M733746</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2019-03-11T17:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462000#M733747</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command: &lt;BR /&gt;static (outside,inside) 64.168.82.251 192.168.1.2 netmask 255.255.255.255&lt;BR /&gt;Should look like this: &lt;BR /&gt;static (inside,outside) 64.168.82.251 192.168.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;That should take care of the web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the VPN client: &lt;BR /&gt;Enable the command: &lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;And post the output from: &lt;BR /&gt;sh cry isa sa&lt;BR /&gt;sh cry ips sa&lt;/P&gt;&lt;P&gt;When attempting to connect from the VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 02:36:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462000#M733747</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-13T02:36:39Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462001#M733748</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Webserver - : I have changed the static to (inside, outside), still it did not work, any more help will be really appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN: --&amp;nbsp;&amp;nbsp; Here is the output &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081;"&gt;ciscoasa(config)# sh cry isa sa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081;"&gt;There are no isakmp sas&lt;BR /&gt;ciscoasa(config)# sh cry ips sa&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081;"&gt;There are no ipsec sas&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081;"&gt;I have observed the log while connecting the VPN and it show some mismatching. Here is below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;All IPSec SA proposals found unacceptable!&lt;/P&gt;&lt;P&gt;3 May 12 2010 22:28:35 713902&amp;nbsp;&amp;nbsp;&amp;nbsp; Group = ciscoasa, Username = siva, IP = 99.20.130.132, QM FSM error (P2 struct &amp;amp;0x437a098, mess id 0x3b6718ce)!&lt;/P&gt;&lt;P&gt;3 May 12 2010 22:28:35 713902&amp;nbsp;&amp;nbsp;&amp;nbsp; Group = ciscoasa, Username = siva, IP = 99.20.130.132, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;4 May 12 2010 22:28:35 113019&amp;nbsp;&amp;nbsp;&amp;nbsp; Group = ciscoasa, Username = siva, IP = 99.20.130.132, Session disconnected. Session Type: IPSec, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: Phase 2 Mismatch&lt;/P&gt;&lt;P&gt;5 May 12 2010 22:28:35 713904&amp;nbsp;&amp;nbsp;&amp;nbsp; IP = 99.20.130.132, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/message/3071637"&gt;Re: Webserver&amp;nbsp; is not able to access from outside the network, VPN in not accepting&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 06:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462001#M733748</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-13T06:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462002#M733749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check with the command: &lt;BR /&gt;sh access-list inside_access_in&lt;BR /&gt;that port 80 traffic is getting hitted to the ACL from the outside. &lt;BR /&gt;This is because if I do a ''telnet 64.168.82.251 80'' the traffic seems to hit the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question:&lt;BR /&gt;Can you reach the webserver from inside the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the VPN: &lt;BR /&gt;Phase 2 is not matching. &lt;BR /&gt;Please post the output from:&lt;BR /&gt;debug cry ipse 127&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 14:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462002#M733749</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-13T14:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462003#M733751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;I just reconfigured the VPN part and client is able to connect the VPN successfully. But two problmes still facing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN client is not able to ping or access any resources from INISIDE the network. VPN disconnects after 30 minutes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still working on the webserver access from aoutside part.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be highly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Siva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 06:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462003#M733751</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-14T06:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462004#M733753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Siva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just tested to browse: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://64.168.82.251"&gt;http://64.168.82.251&lt;/A&gt;&lt;SPAN&gt;, and it works OK (it's the Apache 2 Test Page). Seems like the webserver is now up and working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the VPN access, to ping the internal subnet after you are connected, please add the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp nat-traversal 25&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp; class inspection_default&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you ping 192.168.1.1 after connected via VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 08:24:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462004#M733753</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-14T08:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462005#M733756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Morning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I fixed the webserver access from outside yesterday. It was the NAT issue and below lines added (it might help someone too, so I am pasting).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN style="text-decoration: underline;"&gt;Static nat for webserver&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;static (inside,outside) 64.168.82.251 192.168.1.50 netmask 255.255.255.255&lt;BR /&gt;access-list outside_access_in permit tcp any host 64.168.82.251&amp;nbsp; 80&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For VPN , I am&amp;nbsp; connecting from home, receiving the IP from VPN-POOL (10.10.100.2) and I can ping locally. But not any other IP address such as&lt;/P&gt;&lt;P&gt;192.168.1.1, 4.2.2.2.&amp;nbsp;&amp;nbsp;&amp;nbsp; Even local internet won't work if I connect VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 13:55:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462005#M733756</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-14T13:55:11Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462006#M733758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad for the webserver.&lt;/P&gt;&lt;P&gt;For the VPN, check if by adding the commands:&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;crypto isakmp nat-t&lt;/P&gt;&lt;P&gt;sysopt connection permit-vpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you PING 192.168.1.1 now?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that anything else that you want to reach has a default gateway pointing to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 14:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462006#M733758</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-14T14:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462007#M733760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have added the commands.&amp;nbsp; VPN connecting and receiving the IP address from the Pool.&amp;nbsp; Still cant ping the inside hosts.&amp;nbsp; Please Help......&lt;/P&gt;&lt;P&gt;===========================================================================&lt;/P&gt;&lt;P&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password ibUNfy.Nk1xsLSb/ encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.1.60 Windows-Server description 192.168.1.60&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 64.168.82.250 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 10.10.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ssh&lt;BR /&gt; port-object eq telnet&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; port-object eq ftp&lt;BR /&gt; port-object eq ftp-data&lt;BR /&gt;access-list ciscovpn_splitTunnelAcl standard permit any&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 10.10.50.0 255.255.255.1&lt;BR /&gt;92&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.251 object-&lt;BR /&gt;group DM_INLINE_TCP_1 inactive&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.252 object-&lt;BR /&gt;group DM_INLINE_TCP_2 inactive&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.252 eq 3389&lt;BR /&gt; inactive&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.253 eq pptp&lt;BR /&gt; inactive&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool ciscovpn-pool 10.10.50.1-10.10.50.50 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) 64.168.82.251 192.168.1.50 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 64.168.82.252 192.168.1.4 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 64.168.82.253 Windows-Server netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 64.168.82.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 99.20.130.132 255.255.255.255 outside&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 25&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 99.20.130.132 255.255.255.255 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;BR /&gt;dhcpd dns 4.2.2.1 4.2.2.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy ciscovpn internal&lt;BR /&gt;group-policy ciscovpn attributes&lt;BR /&gt; dns-server value 4.2.2.1 4.2.2.2&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value ciscovpn_splitTunnelAcl&lt;BR /&gt;username siva password j/596TABe3tp0Rk9 encrypted privilege 0&lt;BR /&gt;username siva attributes&lt;BR /&gt; vpn-group-policy ciscovpn&lt;BR /&gt;tunnel-group ciscovpn type ipsec-ra&lt;BR /&gt;tunnel-group ciscovpn general-attributes&lt;BR /&gt; address-pool ciscovpn-pool&lt;BR /&gt; default-group-policy ciscovpn&lt;BR /&gt;tunnel-group ciscovpn ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;BR /&gt;&amp;nbsp; inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:adb49ff11e18f4ce1d260f6edda06fce&lt;BR /&gt;: end&lt;BR /&gt;ciscoa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 23:32:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462007#M733760</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-14T23:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462008#M733762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You still have not answered me if from the VPN clients you can PING 192.168.1.1?&lt;/P&gt;&lt;P&gt;And if 192.168.1.1 is the deafult gateway for the local LAN behind the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 May 2010 01:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462008#M733762</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-15T01:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462009#M733764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry for the late reply.&lt;/P&gt;&lt;P&gt;I could not ping 192.168.1.1 or any IP. But VPN is connecting successfully. ANother thing I had noticed is after connecting VPN I could not browse locally Also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see my current configuration attached in txt file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 23:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462009#M733764</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-17T23:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462010#M733766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Siva,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason you're not able to access the inside network from the VPN clients, is because your NAT 0 statement looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.100.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the reason that you lose Internet when connecting with VPN is because there's no split-tunneling configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split-tunneling extended permit ip 192.168.100.0 255.255.255.0&lt;BR /&gt;192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy ciscovpn attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; split-tunnel-policy tunnelspecified&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; split-tunnel-network-list value split-tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ciscovpn general-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; default-group-policy ciscovpn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 23:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462010#M733766</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-17T23:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462011#M733768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Internet access is working now. But still not able to ping 192.168.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanks againg for your time and help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is the current configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4)&lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 64.168.82.250 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq ssh&lt;BR /&gt; port-object eq telnet&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; description rdp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt; group-object rdp&lt;BR /&gt; port-object eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.253 eq pptp&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 64.168.82.252 object-&lt;BR /&gt;group DM_INLINE_TCP_2&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 64.168.82.251 object-&lt;BR /&gt;group DM_INLINE_TCP_1&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 19&lt;BR /&gt;2.168.100.0 255.255.255.128&lt;BR /&gt;access-list split-tunneling extended permit ip 192.168.100.0 255.255.255.0 192.1&lt;BR /&gt;68.100.0 255.255.255.128&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool cisco-vpn 192.168.100.1-192.168.100.100&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) 64.168.82.252 192.168.1.4 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 64.168.82.251 192.168.1.50 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 64.168.82.253 192.168.1.60 netmask 255.255.255.255&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 64.168.82.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;BR /&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 20&lt;BR /&gt;client-update enable&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;BR /&gt;dhcpd dns 4.2.2.2 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;group-policy ciscovpn internal&lt;BR /&gt;group-policy ciscovpn attributes&lt;BR /&gt; dns-server value 4.2.2.2&lt;BR /&gt; vpn-tunnel-protocol IPSec&lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value split-tunneling&lt;BR /&gt;username siva password j/596TABe3tp0Rk9 encrypted privilege 0&lt;BR /&gt;username siva attributes&lt;BR /&gt; vpn-group-policy ciscovpn&lt;BR /&gt;tunnel-group ciscovpn type ipsec-ra&lt;BR /&gt;tunnel-group ciscovpn general-attributes&lt;BR /&gt; address-pool cisco-vpn&lt;BR /&gt; default-group-policy ciscovpn&lt;BR /&gt;tunnel-group ciscovpn ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect esmtp&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;Cryptochecksum:c7e5ebc2e4c40ed9d7ee39b12d1aa18f&lt;BR /&gt;: end&lt;BR /&gt;ciscoasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 00:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462011#M733768</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-18T00:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462012#M733769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add this commands on the ASA and see if you can PING:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt connection permit-vpn&amp;nbsp;&amp;nbsp; --&amp;gt; this might not take it&lt;/P&gt;&lt;P&gt;crypto isakmp nat-t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Disconnect the VPN client, and connect and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 00:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462012#M733769</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-18T00:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462013#M733771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have addeded.&lt;/P&gt;&lt;P&gt;But no luck,&amp;nbsp; Could not ping 1923168.1.1 or any host inside.&amp;nbsp;&amp;nbsp; Any other suggessions?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Siva&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 00:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462013#M733771</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-18T00:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462014#M733774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Remove this command and try connecting again:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;NO&gt; crypto dynamic-map outside_dyn_map 20 set pfs group1&lt;/NO&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If still does not work, then post the output of:&lt;/P&gt;&lt;P&gt;sh cry isa sa&lt;/P&gt;&lt;P&gt;sh cry ips sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check if the ASA is receiving packets and sending packets through the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 00:48:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462014#M733774</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-18T00:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462015#M733776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# sh cry isa sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Active SA: 1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 1&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp; IKE Peer: 99.20.130.132&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type&amp;nbsp;&amp;nbsp;&amp;nbsp; : user&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Role&amp;nbsp;&amp;nbsp;&amp;nbsp; : responder&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Rekey&amp;nbsp;&amp;nbsp; : no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; State&amp;nbsp;&amp;nbsp; : AM_ACTIVE&lt;BR /&gt;ciscoasa(config)#&lt;BR /&gt;ciscoasa(config)# sh cry ips sa&lt;BR /&gt;interface: outside&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Crypto map tag: outside_dyn_map, seq num: 20, local addr: 64.168.82.250&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote ident (addr/mask/prot/port): (192.168.100.2/255.255.255.255/0/0)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current_peer: 99.20.130.132, username: siva&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic allocated peer ip: 192.168.100.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts decaps: 4, #pkts decrypt: 4, #pkts verify: 4&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; #send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local crypto endpt.: 64.168.82.250/4500, remote crypto endpt.: 99.20.130.1&lt;BR /&gt;32/4661&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; path mtu 1500, ipsec overhead 66, media mtu 1500&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; current outbound spi: 9FFDF002&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0xF407C8B6 (4094150838)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 12, crypto-map: outside_dyn_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 28798&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; outbound esp sas:&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; spi: 0x9FFDF002 (2684219394)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; transform: esp-3des esp-sha-hmac none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; in use settings ={RA, Tunnel,&amp;nbsp; NAT-T-Encaps, }&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; slot: 0, conn_id: 12, crypto-map: outside_dyn_map&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sa timing: remaining key lifetime (sec): 28794&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IV size: 8 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay detection support: Y&lt;/P&gt;&lt;P&gt;ciscoasa(config)#&lt;BR /&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the log while connecting:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6|May 17 2010|19:44:39|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1660 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:38|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1659 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:38|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1658 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:37|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1657 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:37|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1656 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:36|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1655 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:35|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1654 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:34|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1653 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:34|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1652 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:33|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1651 for outside:192.168.100.2/137 to outside:192.168.100.255/137 duration 0:00:00 bytes 0 (siva)&lt;BR /&gt;6|May 17 2010|19:44:32|335004|||NAC is disabled for host - 192.168.100.2.&lt;BR /&gt;5|May 17 2010|19:44:32|713120|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, PHASE 2 COMPLETED (msgid=b11432b9)&lt;BR /&gt;6|May 17 2010|19:44:32|602303|||IPSEC: An inbound remote access SA (SPI= 0x4423EA93) between 64.168.82.250 and 99.20.130.132 (user= siva) has been created.&lt;BR /&gt;6|May 17 2010|19:44:32|602303|||IPSEC: An outbound remote access SA (SPI= 0x31A07BBA) between 64.168.82.250 and 99.20.130.132 (user= siva) has been created.&lt;BR /&gt;5|May 17 2010|19:44:32|713049|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Security negotiation complete for User (siva)&amp;nbsp; Responder, Inbound SPI = 0x4423ea93, Outbound SPI = 0x31a07bba&lt;BR /&gt;5|May 17 2010|19:44:32|713075|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Overriding Initiator's IPSec rekeying duration from 2147483 to 28800 seconds&lt;BR /&gt;3|May 17 2010|19:44:32|713119|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, PHASE 1 COMPLETED&lt;BR /&gt;6|May 17 2010|19:44:30|713228|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Assigned private IP address 192.168.100.2 to remote user&lt;BR /&gt;6|May 17 2010|19:44:30|713184|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Client Type: WinNT&amp;nbsp; Client Application Version: 5.0.06.0160&lt;BR /&gt;5|May 17 2010|19:44:30|713130|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Received unsupported transaction mode attribute: 5&lt;BR /&gt;6|May 17 2010|19:44:29|113008|||AAA transaction status ACCEPT : user = siva&lt;BR /&gt;6|May 17 2010|19:44:29|113009|||AAA retrieved default group policy (ciscovpn) for user = siva&lt;BR /&gt;6|May 17 2010|19:44:29|113011|||AAA retrieved user specific group policy (ciscovpn) for user = siva&lt;BR /&gt;6|May 17 2010|19:44:29|113003|||AAA group policy for user siva is being set to ciscovpn&lt;BR /&gt;6|May 17 2010|19:44:29|113012|||AAA user authentication Successful : local database : user = siva&lt;BR /&gt;6|May 17 2010|19:44:24|713172|||Group = ciscovpn, IP = 99.20.130.132, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end&amp;nbsp;&amp;nbsp; IS&amp;nbsp;&amp;nbsp; behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end is NOT behind a NAT device&lt;BR /&gt;6|May 17 2010|19:44:24|302015|99.20.130.132|64.168.82.250|Built inbound UDP connection 1650 for outside:99.20.130.132/4549 (99.20.130.132/4549) to NP Identity Ifc:64.168.82.250/4500 (64.168.82.250/4500)&lt;BR /&gt;6|May 17 2010|19:44:24|302015|99.20.130.132|64.168.82.250|Built inbound UDP connection 1649 for outside:99.20.130.132/4548 (99.20.130.132/4548) to NP Identity Ifc:64.168.82.250/500 (64.168.82.250/500)&lt;BR /&gt;5|May 17 2010|19:44:20|713904|||IP = 99.20.130.132, Received encrypted packet with no matching SA, dropping&lt;BR /&gt;4|May 17 2010|19:44:20|113019|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Session disconnected. Session Type: IPSecOverNatT, Duration: 0h:02m:27s, Bytes xmt: 7905, Bytes rcv: 0, Reason: User Requested&lt;BR /&gt;6|May 17 2010|19:44:20|602304|||IPSEC: An outbound remote access SA (SPI= 0xDECCE24C) between 64.168.82.250 and 99.20.130.132 (user= siva) has been deleted.&lt;BR /&gt;6|May 17 2010|19:44:20|602304|||IPSEC: An inbound remote access SA (SPI= 0x7B031657) between 64.168.82.250 and 99.20.130.132 (user= siva) has been deleted.&lt;BR /&gt;5|May 17 2010|19:44:20|713050|||Group = ciscovpn, Username = siva, IP = 99.20.130.132, Connection terminated for peer siva.&amp;nbsp; Reason: Peer Terminate&amp;nbsp; Remote Proxy 192.168.100.2, Local Proxy 0.0.0.0&lt;BR /&gt;6|May 17 2010|19:44:18|302016|192.168.100.2|192.168.100.255|Teardown UDP connection 1648 for outside:192.168.100.2/138 to outside:192.168.100.255/138 duration 0:00:00 bytes 0 (siva)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 03:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462015#M733776</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-18T03:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462016#M733778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your split-tunneling list looks like this:&lt;BR /&gt;access-list split-tunneling extended permit ip 192.168.100.0 255.255.255.0 192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;Should look like this: &lt;BR /&gt;access-list split-tunneling extended permit ip 192.168.1.0 255.255.255.0 192.168.100.0 255.255.255.128&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 08:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462016#M733778</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-18T08:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462017#M733780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot. You rock. Amazing.&lt;/P&gt;&lt;P&gt;All working now &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/laugh.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 17:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462017#M733780</guid>
      <dc:creator>sivapkd100</dc:creator>
      <dc:date>2010-05-18T17:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: Webserver  is not able to access from outside the network, V</title>
      <link>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462018#M733782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Very glad to hear that is working&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you for the feedback.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 17:44:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/webserver-is-not-able-to-access-from-outside-the-network-vpn-in/m-p/1462018#M733782</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-18T17:44:55Z</dc:date>
    </item>
  </channel>
</rss>

