<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cant access internal network resources through Remote Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199443#M835719</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please try two things: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Try entering the command: crypto isakmp nat-t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, see if you can ping anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Get rid of the permit any statement in the split tunnel ACL and enter the specific network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AINC_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also modify the nat0 access-list with the same rule permitting 192.168.0.0 255.255.255.0 to 192.168.10.0 255.255.255.0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 14 May 2009 16:50:15 GMT</pubDate>
    <dc:creator>jj27</dc:creator>
    <dc:date>2009-05-14T16:50:15Z</dc:date>
    <item>
      <title>Cant access internal network resources through Remote Access VPN</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199442#M835718</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a remote access VPN setup on an ASA5510. I am making a connection using Cisco VPN client (5.0.04.300).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to make the connection and authenticate, but I am not able to access any of the local resources. I can't ping them or access in anyway. If I go into the statistics screen of the VPN client, it shows no LAN routes and and the only route I see is for 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's interesting is that one of the machines on the internal network can ping the machine that has initiated the VPN. In fact, I was able to Remote Desktop into it from the internal network.  So I can access the VPN client from the internal network, but not the otherway around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I initially configured the VPN using the ASDM wizard. (not sure that makes a difference)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a partial config of the information that is relevant to the VPN.  Please let me know if you need more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal network is 192.168.0.X and the VPN network is 192.168.10.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks...Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AINC_splitTunnelAcl standard permit any&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip any 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool REMOTE_POOL 192.168.10.50-192.168.10.150 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy AINC internal&lt;/P&gt;&lt;P&gt;group-policy AINC attributes&lt;/P&gt;&lt;P&gt; dns-server value 192.168.0.3&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value AINC_splitTunnelAcl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpn-group-policy AINC&lt;/P&gt;&lt;P&gt;tunnel-group AINC type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group AINC general-attributes&lt;/P&gt;&lt;P&gt; address-pool REMOTE_POOL&lt;/P&gt;&lt;P&gt; default-group-policy AINC&lt;/P&gt;&lt;P&gt;tunnel-group AINC ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:32:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199442#M835718</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2019-03-11T15:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cant access internal network resources through Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199443#M835719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please try two things: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Try entering the command: crypto isakmp nat-t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, see if you can ping anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Get rid of the permit any statement in the split tunnel ACL and enter the specific network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AINC_splitTunnelAcl standard permit 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should also modify the nat0 access-list with the same rule permitting 192.168.0.0 255.255.255.0 to 192.168.10.0 255.255.255.0.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 May 2009 16:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199443#M835719</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2009-05-14T16:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cant access internal network resources through Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199444#M835720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank-you...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto command didn't fix it, but as soon as I modified the access-list, it worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question...What if I want my remote VPN clients to have the ability to administer machines in the DMS (10.30.30.0) from the inside? What would I need to add to make that happen as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 May 2009 17:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199444#M835720</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2009-05-14T17:14:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cant access internal network resources through Remote Access</title>
      <link>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199445#M835721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need to add another line to your split tunnel access list permitting that network and also put that network in the NAT0 access list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From there, make sure your ASA has a route to that network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 May 2009 17:19:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cant-access-internal-network-resources-through-remote-access-vpn/m-p/1199445#M835721</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2009-05-14T17:19:15Z</dc:date>
    </item>
  </channel>
</rss>

