<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static route ASA 5505  error in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388683#M747705</link>
    <description>&lt;P&gt;&lt;SPAN class="value"&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I created a static route from my lan&amp;nbsp; 192.168.10.0 to other lan&amp;nbsp; 192.168.9.0&lt;BR /&gt;&lt;BR /&gt;the two lan´s are in vpn&amp;nbsp; but not a lan to lan cisco asa vpn.&lt;BR /&gt;&lt;BR /&gt;I can pass icmp traffic but i&amp;nbsp; can´t pass other kind of traffic. The log said: &lt;BR /&gt;&lt;BR /&gt;192.168.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.69&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Built inbound TCP connection 493601 for&amp;nbsp; inside:192.168.10.10/4186 (192.168.10.10/4186) to&amp;nbsp; inside:192.168.9.69/5900 (192.168.9.69/5900)&lt;BR /&gt;&lt;BR /&gt;192.168.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.69&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Teardown TCP connection 493601 for&amp;nbsp; inside:192.168.10.10/4186 to inside:192.168.9.69/5900 duration 0:00:00&amp;nbsp; bytes 0 TCP Reset-O&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;other&amp;nbsp; configuration that i make is to configure a static route in windows,&lt;BR /&gt;&lt;BR /&gt;route&amp;nbsp; add 192.168.9.0 mask 255.255.255.0 192.168.10.240 ....&amp;nbsp; and all work&amp;nbsp; perfect.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;more info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have two net´s. 192.168.10.0 and 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco asa is over&amp;nbsp; 192.168.10.0 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.9.0 is a remote lan.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In lan&amp;nbsp; 192.168.10.0 i have a ip 192.168.10.240 who is the gateway for the net&amp;nbsp; 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i configured a static route on cisco asa 5505 and a&amp;nbsp; exempt nat from inside host to 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don´t know why only&amp;nbsp; can make ping´s and the other traffic´s are blocked beteewn 192.168.10.0&amp;nbsp; and 192.168.9.0 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN class="value"&gt;&lt;BR /&gt;thanks a lot...&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;PRE class="prettyprint" id="codeSnippet571901"&gt; Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name X.X.X.201 &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X.X.X.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list outside_5_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address cisco@X.X.X.com&lt;BR /&gt;logging recipient-address javier.gonzalez@X.X.X.com level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 X.X.X.195-X.X.X.206 netmask 255.255.255.240&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.17 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.0 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;route inside 192.168.9.0 255.255.255.0 192.168.10.240 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.193 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http X.X.X.194 255.255.255.255 outside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer X.2.X.218 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer X.4.X.149 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer X.X.X.X &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group 8 type ipsec-l2l&lt;BR /&gt;tunnel-group 8 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 809 type ipsec-l2l&lt;BR /&gt;tunnel-group 89 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 80.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 80.1 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 2&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:eff7c4ca93450e10a40240e088e4aeb4&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm location 192.168.9.0 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;/PRE&gt;
&lt;/PRE&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:25:37 GMT</pubDate>
    <dc:creator>cuelate21</dc:creator>
    <dc:date>2019-03-11T17:25:37Z</dc:date>
    <item>
      <title>Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388683#M747705</link>
      <description>&lt;P&gt;&lt;SPAN class="value"&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I created a static route from my lan&amp;nbsp; 192.168.10.0 to other lan&amp;nbsp; 192.168.9.0&lt;BR /&gt;&lt;BR /&gt;the two lan´s are in vpn&amp;nbsp; but not a lan to lan cisco asa vpn.&lt;BR /&gt;&lt;BR /&gt;I can pass icmp traffic but i&amp;nbsp; can´t pass other kind of traffic. The log said: &lt;BR /&gt;&lt;BR /&gt;192.168.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.69&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Built inbound TCP connection 493601 for&amp;nbsp; inside:192.168.10.10/4186 (192.168.10.10/4186) to&amp;nbsp; inside:192.168.9.69/5900 (192.168.9.69/5900)&lt;BR /&gt;&lt;BR /&gt;192.168.10.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.9.69&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Teardown TCP connection 493601 for&amp;nbsp; inside:192.168.10.10/4186 to inside:192.168.9.69/5900 duration 0:00:00&amp;nbsp; bytes 0 TCP Reset-O&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;other&amp;nbsp; configuration that i make is to configure a static route in windows,&lt;BR /&gt;&lt;BR /&gt;route&amp;nbsp; add 192.168.9.0 mask 255.255.255.0 192.168.10.240 ....&amp;nbsp; and all work&amp;nbsp; perfect.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;more info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have two net´s. 192.168.10.0 and 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco asa is over&amp;nbsp; 192.168.10.0 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.9.0 is a remote lan.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In lan&amp;nbsp; 192.168.10.0 i have a ip 192.168.10.240 who is the gateway for the net&amp;nbsp; 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i configured a static route on cisco asa 5505 and a&amp;nbsp; exempt nat from inside host to 192.168.9.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don´t know why only&amp;nbsp; can make ping´s and the other traffic´s are blocked beteewn 192.168.10.0&amp;nbsp; and 192.168.9.0 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN class="value"&gt;&lt;BR /&gt;thanks a lot...&lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;PRE class="prettyprint" id="codeSnippet571901"&gt; Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name X.X.X.201 &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X.X.X.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list outside_5_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address cisco@X.X.X.com&lt;BR /&gt;logging recipient-address javier.gonzalez@X.X.X.com level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 X.X.X.195-X.X.X.206 netmask 255.255.255.240&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.17 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.0 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.X.X.X.net" target="_blank"&gt;www.X.X.X.net&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group outbound in interface inside&lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;route inside 192.168.9.0 255.255.255.0 192.168.10.240 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.193 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http X.X.X.194 255.255.255.255 outside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer X.2.X.218 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer X.4.X.149 &lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer X.X.X.X &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group 8 type ipsec-l2l&lt;BR /&gt;tunnel-group 8 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 809 type ipsec-l2l&lt;BR /&gt;tunnel-group 89 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 80.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 80.1 ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 2&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:eff7c4ca93450e10a40240e088e4aeb4&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm location 192.168.9.0 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;/PRE&gt;
&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:25:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388683#M747705</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2019-03-11T17:25:37Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388684#M747707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This seems to be due to asymmetric routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a system on the LAN (&lt;SPAN class="value"&gt;192.168.10.&lt;/SPAN&gt;X) is initiating a connection to &lt;SPAN class="value"&gt;192.168.9.x, the SYN packet is taking the path like this&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;system(192.168.10.x) &amp;gt;&amp;gt; ASA &amp;gt;&amp;gt; Router (10.240) &amp;gt;&amp;gt; system(&lt;SPAN class="value"&gt;192.168.9.x)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;But the reply packet from system(&lt;SPAN class="value"&gt;192.168.9.x) is directly reaching the system in 192.168.10.x without going thorugh the ASA firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;system(192.168.9.x) &amp;gt;&amp;gt;&amp;nbsp; Router (10.240) &amp;gt;&amp;gt; system(&lt;SPAN class="value"&gt;192.168.10.x)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, the ASA firewall is sending a RST to the system(in 192.168.10.x) as the firewall doesn't see any reply for the SYN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you can do is either put the Router (10.240) to some other interface (different IP subnet) of the ASA firewall.or, use a L3 switch to connect the LAN and the router (10.240)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 16:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388684#M747707</guid>
      <dc:creator>dhananjoy chowdhury</dc:creator>
      <dc:date>2010-03-24T16:31:15Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388685#M747709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have 2 options. The first one would be configure U-turn like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.9.0 192.168.9.0&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the second option and the best one for me would be changing the default gateway of the computers in the 192.168.10 to the IP of the router. 192.168.10.240.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THis is failing because the 3 way handshake. The first option will allow you to initiate tcp connections from your local LAN to the Remote LAN but NOT for he Remote LAN to your local LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would try the second option if not you will have to add the route in all your computers.&lt;/P&gt;&lt;P&gt;route&amp;nbsp; add 192.168.9.0 mask 255.255.255.0 192.168.10.24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 16:37:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388685#M747709</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-03-24T16:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388686#M747711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.9.0 192.168.9.0&lt;/P&gt;&lt;P&gt;global (inside) 1&amp;nbsp; interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but not work....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second option work ok but NOT for he Remote LAN to your my LAN...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANKS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 17:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388686#M747711</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-03-24T17:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388687#M747720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dhananjoy chowdhury&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if i put de gateway 192.168.10.240 y other subet would be better to configure?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 17:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388687#M747720</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-03-24T17:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388688#M747721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;I forgot that you need the command.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;SPAN style="text-decoration: underline;"&gt;same-security-traffic permit intra-interface.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;Try it.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;To permit communication from your remote LAN to your local LAN and vice-versa you will need to use a "host" network&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;Outside------ASA------inside--------Router------192.168.9.0/24&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;|&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;|&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;192.168.10.0/24&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;Commands&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;static (inside,inside) 192.168.100.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P class="MsoPlainText"&gt;static (inside,inside) 192.168.90.0 192.168.9.0 netmask 255.255.255.0&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;NOTE: 192.168.90.0/24 and 192.168.100.0/24 are unused networks.&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;With this commands the communication will work from both ways, the only thing to consider is that if 192.168.9.0/24 wants to communicate with&lt;/P&gt;&lt;P class="MsoPlainText"&gt;192.168.10.0/24 the traffic will have to be sent to 192.168.100.0/24 and if&lt;/P&gt;&lt;P class="MsoPlainText"&gt;192.168.10.0/24 wants to communicate with 192.168.9.0/24 the traffic will have to be sent to 192.168.90.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;PD:Thanks to Torchris for the example.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 17:39:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388688#M747721</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-03-24T17:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388689#M747722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try &lt;SPAN style="text-decoration: underline;"&gt;same-security-traffic permit&amp;nbsp; intra-interface.&lt;/SPAN&gt;&amp;nbsp; but fail...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a question... why icmp traffic work perfect and other traffic fails??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sorry, i´m spanish and my english is not good...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 19:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388689#M747722</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-03-24T19:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388690#M747727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Javier,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command "same-security-traffic permit intra-interface" was already there in the original config you had posted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The answer to your query is in my previous post.&lt;/P&gt;&lt;P&gt;Ping will work, but tcp sessions will not because it uses a 3 way handshake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whenever the router (10.254) replies to a host in the segment 10.x it will not send the packet to the Gateway (ASA fw).&lt;/P&gt;&lt;P&gt;Instead it will forward directly to the host because they are in the same subnet and vlan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 19:47:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388690#M747727</guid>
      <dc:creator>dhananjoy chowdhury</dc:creator>
      <dc:date>2010-03-24T19:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388691#M747730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Javier yo soy de costa rica. Hagamos algo. Pegue la configuracion actual para asi verla nuevamente. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 19:50:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388691#M747730</guid>
      <dc:creator>Diego Armando Cambronero Arias</dc:creator>
      <dc:date>2010-03-24T19:50:05Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388692#M747734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __default_attr="plain" __jive_macro_name="code" class="jive_text_macro jive_macro_code"&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 7.2(4) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password EhxQ5dBfvkyaUj52 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 192.168.10.8 W2K3-X32-SP&lt;BR /&gt;name X.X.X.201 &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt;&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X.X.X.194 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; no forward interface Vlan1&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.12.1 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DNS1&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; timeout 30&lt;BR /&gt; name-server W2K3-X32-SP&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list INSIDE_ACL_OUT extended permit ip any any &lt;BR /&gt;access-list 100 extended permit udp any any eq domain &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp &lt;BR /&gt;access-list 100 extended permit tcp any any eq ftp-data &lt;BR /&gt;access-list 100 extended permit tcp any any eq https &lt;BR /&gt;access-list 100 extended permit tcp any any eq 3389 &lt;BR /&gt;access-list 100 extended permit tcp any any eq www &lt;BR /&gt;access-list 100 extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inbound extended permit tcp any interface outside eq 3389 &lt;BR /&gt;access-list RDP extended permit tcp any interface outside eq 3389 log &lt;BR /&gt;access-list RDP extended permit tcp interface outside interface inside eq 3389 &lt;BR /&gt;access-list outside_5_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list outbound extended permit ip any any &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;BR /&gt;access-list outside_3_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list outside_4_cryptomap extended permit ip 192.168.10.0 255.255.255.0 192.168.4.0 255.255.255.0 &lt;BR /&gt;access-list outside_acl extended permit ip 192.168.10.0 255.255.255.0 192.168.9.0 255.255.255.0 &lt;BR /&gt;access-list inside_acl extended permit ip any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address cisco@&lt;BR /&gt;logging recipient-address&amp;nbsp; level errors&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip local pool pool1 192.168.10.70-192.168.10.75 mask 255.255.255.0&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 X.X.X.195-X.X.X.206 netmask 255.255.255.240&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; ftp 192.168.10.10 ftp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; ftp-data 192.168.10.10 ftp-data netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.197 3389 192.168.10.9 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.200 https 192.168.10.9 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; https W2K3-X32-SP https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; www W2K3-X32-SP www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp &lt;A href="https://community.cisco.com/www.xxxx.com" target="_blank"&gt;www.xxxx.com&lt;/A&gt; domain W2K3-X32-SP domain netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.198 https 192.168.10.13 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.202 3389 192.168.10.10 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp X.X.X.200 www 192.168.10.14 www netmask 255.255.255.255 &lt;BR /&gt;access-group 100 in interface outside&lt;BR /&gt;route inside 192.168.9.0 255.255.255.0 192.168.10.240 1&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.193 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.255 inside&lt;BR /&gt;http 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;http X.X.X.194 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-NOAUT esp-3des esp-none &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 88.&lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 3 match address outside_3_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 80.&lt;BR /&gt;crypto map outside_map 3 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 3 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map 4 match address outside_4_cryptomap&lt;BR /&gt;crypto map outside_map 4 set peer 80.1 &lt;BR /&gt;crypto map outside_map 4 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map 4 set security-association lifetime seconds 172800&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable inside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 80000&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 172800&lt;BR /&gt;crypto isakmp nat-traversal&amp;nbsp; 15&lt;BR /&gt;crypto isakmp disconnect-notify&lt;BR /&gt;crypto isakmp reload-wait&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;l2tp tunnel hello 120&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.10.90-192.168.10.100 inside&lt;BR /&gt;dhcpd dns 154.15.255.134 154.15.255.130 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;group-policy DefaultRAGroup internal&lt;BR /&gt;group-policy DefaultRAGroup attributes&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; banner none&lt;BR /&gt; wins-server none&lt;BR /&gt; dns-server none&lt;BR /&gt; dhcp-network-scope none&lt;BR /&gt; vpn-access-hours none&lt;BR /&gt; vpn-simultaneous-logins 3&lt;BR /&gt; vpn-idle-timeout none&lt;BR /&gt; vpn-session-timeout none&lt;BR /&gt; vpn-filter none&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec webvpn&lt;BR /&gt; password-storage disable&lt;BR /&gt; ip-comp disable&lt;BR /&gt; re-xauth disable&lt;BR /&gt; group-lock none&lt;BR /&gt; pfs disable&lt;BR /&gt; ipsec-udp disable&lt;BR /&gt; ipsec-udp-port 10000&lt;BR /&gt; split-tunnel-policy tunnelall&lt;BR /&gt; split-tunnel-network-list none&lt;BR /&gt; default-domain none&lt;BR /&gt; split-dns none&lt;BR /&gt; intercept-dhcp 255.255.255.255 disable&lt;BR /&gt; secure-unit-authentication disable&lt;BR /&gt; user-authentication disable&lt;BR /&gt; user-authentication-idle-timeout none&lt;BR /&gt; ip-phone-bypass disable&lt;BR /&gt; leap-bypass disable&lt;BR /&gt; nem disable&lt;BR /&gt; backup-servers keep-client-config&lt;BR /&gt; msie-proxy server none&lt;BR /&gt; msie-proxy method no-modify&lt;BR /&gt; msie-proxy except-list none&lt;BR /&gt; msie-proxy local-bypass disable&lt;BR /&gt; nac disable&lt;BR /&gt; nac-sq-period 300&lt;BR /&gt; nac-reval-period 86400&lt;BR /&gt; nac-default-acl none&lt;BR /&gt; address-pools none&lt;BR /&gt; smartcard-removal-disconnect enable&lt;BR /&gt; client-firewall none&lt;BR /&gt; client-access-rule none&lt;BR /&gt; webvpn&lt;BR /&gt;&amp;nbsp; functions url-entry&lt;BR /&gt;&amp;nbsp; html-content-filter none&lt;BR /&gt;&amp;nbsp; homepage none&lt;BR /&gt;&amp;nbsp; keep-alive-ignore 4&lt;BR /&gt;&amp;nbsp; http-comp gzip&lt;BR /&gt;&amp;nbsp; filter none&lt;BR /&gt;&amp;nbsp; url-list none&lt;BR /&gt;&amp;nbsp; customization value DfltCustomization&lt;BR /&gt;&amp;nbsp; port-forward none&lt;BR /&gt;&amp;nbsp; port-forward-name value Application Access&lt;BR /&gt;&amp;nbsp; sso-server none&lt;BR /&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information&lt;BR /&gt;&amp;nbsp; svc none&lt;BR /&gt;&amp;nbsp; svc keep-installer installed&lt;BR /&gt;&amp;nbsp; svc keepalive none&lt;BR /&gt;&amp;nbsp; svc rekey time none&lt;BR /&gt;&amp;nbsp; svc rekey method none&lt;BR /&gt;&amp;nbsp; svc dpd-interval client none&lt;BR /&gt;&amp;nbsp; svc dpd-interval gateway none&lt;BR /&gt;&amp;nbsp; svc compression deflate&lt;BR /&gt;tunnel-group DefaultL2LGroup ipsec-attributes&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group DefaultRAGroup general-attributes&lt;BR /&gt; address-pool pool1&lt;BR /&gt; default-group-policy DefaultRAGroup&lt;BR /&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; isakmp keepalive threshold 30 retry 2&lt;BR /&gt;tunnel-group 88. type ipsec-l2l&lt;BR /&gt;tunnel-group 88. ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 80. type ipsec-l2l&lt;BR /&gt;tunnel-group 80. ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;tunnel-group 80. type ipsec-l2l&lt;BR /&gt;tunnel-group 80.ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect dns &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 217.76.146.62&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:349f3cb2d9b5c0c998b3d2c3f577dd74&lt;BR /&gt;: end&lt;BR /&gt;asdm image disk0:/asdm-524.bin&lt;BR /&gt;asdm location 192.168.9.0 255.255.255.0 inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is my actual configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks!! gracias!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 22:38:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388692#M747734</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-03-24T22:38:09Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388693#M747743</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;3 way handshake could be&amp;nbsp; off? i think not...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what you considered is the bes solution? configure de gateway in other subnet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Mar 2010 22:47:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388693#M747743</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-03-24T22:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: Static route ASA 5505  error</title>
      <link>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388694#M747750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed the asa configuration. Now I configure a DMZ vlan, but i can´t surf over internet from remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my new configuration are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.9.0 255.255.255.0&amp;nbsp; --&amp;gt;&amp;nbsp; remote network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.20.0 255.255.255.0 --&amp;gt;&amp;nbsp; DMZ network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.10.0 255.255.255.0 --&amp;gt; inside network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;88.88.88.80&amp;nbsp; 255.255.255.240 --&amp;gt; Outside network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how i can configure the dmz network to permit traffic&lt;SPAN class="short_text" id="result_box"&gt;&lt;SPAN style="background-color: #ffffff;" title="entre"&gt; between remote network, DMZ and Outside?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Apr 2010 11:38:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-route-asa-5505-error/m-p/1388694#M747750</guid>
      <dc:creator>cuelate21</dc:creator>
      <dc:date>2010-04-05T11:38:12Z</dc:date>
    </item>
  </channel>
</rss>

