<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN setup, SSL and IPsec in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455945#M856769</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I managed to get the the IP address right on IPsec, however I cannot ping anything on internal network or to connect to it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I don't have any progress on SSL anyconnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 May 2010 15:52:12 GMT</pubDate>
    <dc:creator>patrifick</dc:creator>
    <dc:date>2010-05-12T15:52:12Z</dc:date>
    <item>
      <title>VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455936#M856753</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder whether would anybody be able to help me setup VPN on our firewall.&lt;/P&gt;&lt;P&gt;What we try to achieve is to have 2 option IPsec, SSL with option to use Anyconnect cisco client.&lt;/P&gt;&lt;P&gt;I have ran a wizard and adder NAT exception but it doesn't seem to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;names&lt;BR /&gt;name 10.1.4.4 ctxsvr01&lt;BR /&gt;name 10.1.4.5 itsvr&lt;BR /&gt;name 10.1.4.10 unicornsvr&lt;BR /&gt;name 10.1.4.12 blbsvr&lt;BR /&gt;name 10.1.4.13 exchsvr&lt;BR /&gt;name 10.1.5.4 barracuda&lt;BR /&gt;name 10.1.5.15 video-conferencing-unit&lt;BR /&gt;name 192.168.1.5 ctxdmz&lt;BR /&gt;name 62.253.196.178 outside&lt;BR /&gt;name 62.253.196.179 remote-outside-179&lt;BR /&gt;name 62.253.196.180 webmail-outside-180&lt;BR /&gt;name 62.253.196.181 connect-outside-181&lt;BR /&gt;name 62.253.196.182 unicorn-outside-182&lt;BR /&gt;name 62.253.196.184 sirsi-outside-184&lt;BR /&gt;name 62.253.196.185 blb-outside-185&lt;BR /&gt;name 62.253.196.188 streaming-outside-188&lt;BR /&gt;name 62.253.196.189 video-conferencing-outside-189&lt;BR /&gt;name 82.111.186.146 sdt-rdc&lt;BR /&gt;name 150.147.68.20 sirsi-1&lt;BR /&gt;name 193.110.143.20 sirsi-2&lt;BR /&gt;name 10.1.5.16 streaming-unit&lt;BR /&gt;name 192.168.1.1 dmz&lt;BR /&gt;name 62.253.196.186 email-outside-186&lt;BR /&gt;name 62.253.196.187 Logmein-outside-187&lt;BR /&gt;name 10.1.3.11 VPN1&lt;BR /&gt;name 10.1.3.12 VPN2&lt;BR /&gt;name 10.1.3.13 VPN3&lt;BR /&gt;name 10.1.3.14 VPN4&lt;BR /&gt;name 10.1.3.15 VPN5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.5.1 255.255.0.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address dmz 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address outside 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name chathamhouse.org.uk&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network sirsi-support&lt;BR /&gt; network-object host sirsi-1&lt;BR /&gt; network-object host sirsi-2&lt;BR /&gt;object-group service backup-exec tcp&lt;BR /&gt; port-object eq 10000&lt;BR /&gt; port-object eq 3106&lt;BR /&gt; port-object eq 3527&lt;BR /&gt; port-object eq 6101&lt;BR /&gt; port-object eq 6103&lt;BR /&gt; port-object eq 6106&lt;BR /&gt;object-group service barracuda-8000 tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service blackberry-3101 tcp&lt;BR /&gt; port-object eq 3101&lt;BR /&gt;object-group service citrix-session-reliability-2598 tcp&lt;BR /&gt; port-object eq 2598&lt;BR /&gt;object-group service rdc-3389 tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service sql-1433 tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt;object-group service streaming-1935 tcp&lt;BR /&gt; port-object eq 1935&lt;BR /&gt;object-group service video-streaming-tcp-udp tcp&lt;BR /&gt; port-object eq 3230&lt;BR /&gt; port-object eq 3231&lt;BR /&gt; port-object eq 3232&lt;BR /&gt; port-object eq 3233&lt;BR /&gt; port-object eq 3234&lt;BR /&gt; port-object eq 3235&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host remote-outside-179&lt;BR /&gt; network-object host webmail-outside-180&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object host unicorn-outside-182&lt;BR /&gt; network-object host email-outside-186&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq h323&lt;BR /&gt; group-object video-streaming-tcp-udp&lt;BR /&gt; group-object streaming-1935&lt;BR /&gt;object-group service Reuters udp&lt;BR /&gt; port-object eq 10202&lt;BR /&gt; port-object eq 10302&lt;BR /&gt; port-object eq 9876&lt;BR /&gt;object-group network VPN-IP&lt;BR /&gt; network-object host VPN1&lt;BR /&gt; network-object host VPN2&lt;BR /&gt; network-object host VPN3&lt;BR /&gt; network-object host VPN4&lt;BR /&gt; network-object host VPN5&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group rdc-3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr object-group blackberry-3101 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr eq ssh &lt;BR /&gt;access-list outside_access_in extended permit tcp any host ctxdmz eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host outside eq smtp &lt;BR /&gt;access-list outside_access_in remark SQL&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group sql-1433 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host video-conferencing-outside-189 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group backup-exec &lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group Reuters &lt;BR /&gt;access-list outside_access_in extended permit tcp any host streaming-unit eq nntp &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group rdp &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq citrix-ica &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group citrix-session-reliability-2598 &lt;BR /&gt;access-list dmz_access_in extended permit object-group TCPUDP host ctxdmz 10.1.0.0 255.255.0.0 eq domain &lt;BR /&gt;access-list inside_access_in extended permit tcp host barracuda any eq smtp &lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 host ctxdmz &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 object-group VPN-IP &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 10.1.3.0 255.255.255.224 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool CH-VPN-IP 10.1.3.10-10.1.3.20 mask 255.255.0.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp connect-outside-181 3389 itsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface smtp barracuda smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh barracuda ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp blb-outside-185 3101 blbsvr 3101 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp unicorn-outside-182 www unicornsvr www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp streaming-outside-188 1935 streaming-unit 1935 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Logmein-outside-187 nntp streaming-unit nntp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp sirsi-outside-184 3389 unicornsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp video-conferencing-outside-189 h323 video-conferencing-unit h323 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp webmail-outside-180 https exchsvr https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,outside) tcp remote-outside-179 https ctxdmz https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (inside,outside) video-conferencing-outside-189 video-conferencing-unit netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255 &lt;BR /&gt;static (dmz,inside) remote-outside-179 ctxdmz netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.253.196.177 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;http sdt-rdc 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy CH-VPN internal&lt;BR /&gt;group-policy CH-VPN attributes&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt;group-policy CH-VPN-IP internal&lt;BR /&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; dns-server value 10.1.4.9 10.1.4.5&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value riia.local&lt;BR /&gt;username sdt.support password T2e5gsVDBxSeG5hI encrypted privilege 0&lt;BR /&gt;username sdt.support attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;username leet password 1HQqUS.HfJJHjs12 encrypted privilege 0&lt;BR /&gt;username leet attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN type remote-access&lt;BR /&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN-IP type remote-access&lt;BR /&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN-IP&lt;BR /&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.4.13&lt;BR /&gt;prompt hostname context&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455936#M856753</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2019-03-11T17:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455937#M856755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Try to use a different subnet for your vpn pool, currently it's in the same subnet as your inside interface (/16 subnet).&lt;/P&gt;&lt;P&gt;Currently: ip local pool CH-VPN-IP 10.1.3.10-10.1.3.20 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;Change it to the following eg: ip local pool CH-VPN-IP 10.3.3.10-10.3.3.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need to change the NAT exemption to:&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 10.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) IPSec client should work. Have you tried, where is it failing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) For SSL VPN Client (AnyConnect), you have to upload the AnyConnect software to the ASA, and install the software. From the configuration, it has not been installed yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the sample configuration to setup AnyConnect (SSL VPN Client) for your reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808efbd2.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00808efbd2.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 12:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455937#M856755</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-12T12:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455938#M856756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying to change the CH-VPN-IP but I get the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"IP address pool cannot be edited beause is used by - connection profile CH-VPN and CH-VPN-IP"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding the error for IPsec from the log I get&lt;/P&gt;&lt;P&gt;1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.294&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000001&lt;BR /&gt;Starting IKE Phase 1 Negotiation&lt;/P&gt;&lt;P&gt;2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.300&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000013&lt;BR /&gt;SENDING &amp;gt;&amp;gt;&amp;gt; ISAKMP OAK AG (SA, KE, NON, ID, VID(Xauth), VID(dpd), VID(Frag), VID(Nat-T), VID(Unity)) to 62.253.196.178&lt;/P&gt;&lt;P&gt;3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.349&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000014&lt;BR /&gt;RECEIVING &amp;lt;&amp;lt;&amp;lt; ISAKMP OAK AG (SA, KE, NON, ID, HASH, VID(Unity), VID(Xauth), VID(Nat-T), NAT-D, NAT-D, VID(Frag), VID(?)) from 62.253.196.178&lt;/P&gt;&lt;P&gt;4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Warning/3 IKE/0xE3000057&lt;BR /&gt;The received HASH payload cannot be verified&lt;/P&gt;&lt;P&gt;5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Warning/2 IKE/0xE300007E&lt;BR /&gt;Hash verification failed... may be configured with invalid group password.&lt;/P&gt;&lt;P&gt;6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Warning/2 IKE/0xE300009B&lt;BR /&gt;Failed to authenticate peer (Navigator:915)&lt;/P&gt;&lt;P&gt;7&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000013&lt;BR /&gt;SENDING &amp;gt;&amp;gt;&amp;gt; ISAKMP OAK INFO (NOTIFY:INVALID_HASH_INFO) to 62.253.196.178&lt;/P&gt;&lt;P&gt;8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000013&lt;BR /&gt;SENDING &amp;gt;&amp;gt;&amp;gt; ISAKMP OAK INFO (NOTIFY:AUTH_FAILED) to 62.253.196.178&lt;/P&gt;&lt;P&gt;9&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Warning/2 IKE/0xE30000A7&lt;BR /&gt;Unexpected SW error occurred while processing Aggressive Mode negotiator:(Navigator:2263)&lt;/P&gt;&lt;P&gt;10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:47.355&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000017&lt;BR /&gt;Marking IKE SA for deletion&amp;nbsp; (I_Cookie=9D7AA76E5551780B R_Cookie=A0499047502140BF) reason = DEL_REASON_IKE_NEG_FAILED&lt;/P&gt;&lt;P&gt;11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:48.359&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x6300004B&lt;BR /&gt;Discarding IKE SA negotiation (I_Cookie=9D7AA76E5551780B R_Cookie=A0499047502140BF) reason = DEL_REASON_IKE_NEG_FAILED&lt;/P&gt;&lt;P&gt;12&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13:37:48.379&amp;nbsp; 05/12/10&amp;nbsp; Sev=Info/4 IKE/0x63000001&lt;BR /&gt;IKE received signal to terminate VPN connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 12:39:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455938#M856756</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T12:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455939#M856757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For IPSec, it seems that you have entered invalid group password as per the following errorr:&lt;/P&gt;&lt;P&gt;Hash verification failed... may be configured with invalid group&amp;nbsp; password.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check that you use the pre-shared key as the group password for IPSec VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To change the IP Pool, you would need to remove it first as follows:&lt;/P&gt;&lt;P&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt;&amp;nbsp; no address-pool CH-VPN-IP&lt;/P&gt;&lt;P&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt;&amp;nbsp; no address-pool CH-VPN-IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make the changes, and reapply it:&lt;/P&gt;&lt;P&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt;&amp;nbsp;&amp;nbsp; address-pool CH-VPN-IP&lt;/P&gt;&lt;P&gt;tunnel-group CH-VPN-IP&amp;nbsp; general-attributes&lt;BR /&gt;&amp;nbsp;&amp;nbsp; address-pool CH-VPN-IP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 12:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455939#M856757</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-12T12:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455940#M856758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- sorry I cannot find the setting where I can change the password.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;- I have uploaded a image the the firewall and the SLL client was installed correctly on my PC however it cannot connect either&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;error: AnyConnect was not able to establish a connecttion to the specified secure gateway. Please try connectin again.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name 10.1.4.4 ctxsvr01&lt;BR /&gt;name 10.1.4.5 itsvr&lt;BR /&gt;name 10.1.4.10 unicornsvr&lt;BR /&gt;name 10.1.4.12 blbsvr&lt;BR /&gt;name 10.1.4.13 exchsvr&lt;BR /&gt;name 10.1.5.4 barracuda&lt;BR /&gt;name 10.1.5.15 video-conferencing-unit&lt;BR /&gt;name 192.168.1.5 ctxdmz&lt;BR /&gt;name 62.253.196.178 outside&lt;BR /&gt;name 62.253.196.179 remote-outside-179&lt;BR /&gt;name 62.253.196.180 webmail-outside-180&lt;BR /&gt;name 62.253.196.181 connect-outside-181&lt;BR /&gt;name 62.253.196.182 unicorn-outside-182&lt;BR /&gt;name 62.253.196.184 sirsi-outside-184&lt;BR /&gt;name 62.253.196.185 blb-outside-185&lt;BR /&gt;name 62.253.196.188 streaming-outside-188&lt;BR /&gt;name 62.253.196.189 video-conferencing-outside-189&lt;BR /&gt;name 82.111.186.146 sdt-rdc&lt;BR /&gt;name 150.147.68.20 sirsi-1&lt;BR /&gt;name 193.110.143.20 sirsi-2&lt;BR /&gt;name 10.1.5.16 streaming-unit&lt;BR /&gt;name 192.168.1.1 dmz&lt;BR /&gt;name 62.253.196.186 email-outside-186&lt;BR /&gt;name 62.253.196.187 Logmein-outside-187&lt;BR /&gt;name 10.3.3.11 VPN1&lt;BR /&gt;name 10.3.3.12 VPN2&lt;BR /&gt;name 10.3.3.13 VPN3&lt;BR /&gt;name 10.3.3.14 VPN4&lt;BR /&gt;name 10.3.3.15 VPN5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.5.1 255.255.0.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address dmz 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address outside 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name chathamhouse.org.uk&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network sirsi-support&lt;BR /&gt; network-object host sirsi-1&lt;BR /&gt; network-object host sirsi-2&lt;BR /&gt;object-group service backup-exec tcp&lt;BR /&gt; port-object eq 10000&lt;BR /&gt; port-object eq 3106&lt;BR /&gt; port-object eq 3527&lt;BR /&gt; port-object eq 6101&lt;BR /&gt; port-object eq 6103&lt;BR /&gt; port-object eq 6106&lt;BR /&gt;object-group service barracuda-8000 tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service blackberry-3101 tcp&lt;BR /&gt; port-object eq 3101&lt;BR /&gt;object-group service citrix-session-reliability-2598 tcp&lt;BR /&gt; port-object eq 2598&lt;BR /&gt;object-group service rdc-3389 tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service sql-1433 tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt;object-group service streaming-1935 tcp&lt;BR /&gt; port-object eq 1935&lt;BR /&gt;object-group service video-streaming-tcp-udp tcp&lt;BR /&gt; port-object eq 3230&lt;BR /&gt; port-object eq 3231&lt;BR /&gt; port-object eq 3232&lt;BR /&gt; port-object eq 3233&lt;BR /&gt; port-object eq 3234&lt;BR /&gt; port-object eq 3235&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host remote-outside-179&lt;BR /&gt; network-object host webmail-outside-180&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object host unicorn-outside-182&lt;BR /&gt; network-object host email-outside-186&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq h323&lt;BR /&gt; group-object video-streaming-tcp-udp&lt;BR /&gt; group-object streaming-1935&lt;BR /&gt;object-group service Reuters udp&lt;BR /&gt; port-object eq 10202&lt;BR /&gt; port-object eq 10302&lt;BR /&gt; port-object eq 9876&lt;BR /&gt;object-group network VPN-IP&lt;BR /&gt; network-object host VPN1&lt;BR /&gt; network-object host VPN2&lt;BR /&gt; network-object host VPN3&lt;BR /&gt; network-object host VPN4&lt;BR /&gt; network-object host VPN5&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group rdc-3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr object-group blackberry-3101 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr eq ssh &lt;BR /&gt;access-list outside_access_in extended permit tcp any host ctxdmz eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host outside eq smtp &lt;BR /&gt;access-list outside_access_in remark SQL&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group sql-1433 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host video-conferencing-outside-189 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group backup-exec &lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group Reuters &lt;BR /&gt;access-list outside_access_in extended permit tcp any host streaming-unit eq nntp &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group rdp &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq citrix-ica &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group citrix-session-reliability-2598 &lt;BR /&gt;access-list dmz_access_in extended permit object-group TCPUDP host ctxdmz 10.1.0.0 255.255.0.0 eq domain &lt;BR /&gt;access-list inside_access_in extended permit tcp host barracuda any eq smtp &lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 host ctxdmz &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 object-group VPN-IP &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool CH-VPN-IP 10.3.3.10-10.3.3.20 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp connect-outside-181 3389 itsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface smtp barracuda smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh barracuda ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp blb-outside-185 3101 blbsvr 3101 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp unicorn-outside-182 www unicornsvr www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp streaming-outside-188 1935 streaming-unit 1935 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Logmein-outside-187 nntp streaming-unit nntp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp sirsi-outside-184 3389 unicornsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp video-conferencing-outside-189 h323 video-conferencing-unit h323 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp webmail-outside-180 https exchsvr https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,outside) tcp remote-outside-179 https ctxdmz https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (inside,outside) video-conferencing-outside-189 video-conferencing-unit netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255 &lt;BR /&gt;static (dmz,inside) remote-outside-179 ctxdmz netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.253.196.177 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;http sdt-rdc 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-dart-win-2.5.0217-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy CH-VPN internal&lt;BR /&gt;group-policy CH-VPN attributes&lt;BR /&gt; vpn-tunnel-protocol svc &lt;BR /&gt;group-policy CH-VPN-IP internal&lt;BR /&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; dns-server value 10.1.4.9 10.1.4.5&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; default-domain value riia.local&lt;BR /&gt;username sdt.support password T2e5gsVDBxSeG5hI encrypted privilege 0&lt;BR /&gt;username sdt.support attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;username leet password 1HQqUS.HfJJHjs12 encrypted privilege 0&lt;BR /&gt;username leet attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN type remote-access&lt;BR /&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN-IP type remote-access&lt;BR /&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN-IP&lt;BR /&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.4.13&lt;BR /&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 13:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455940#M856758</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T13:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455941#M856759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's the tunnel-group ipsec attributes:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; pre-shared-key &lt;THE-ACTUAL-GROUP-PASSWORD&gt;&lt;/THE-ACTUAL-GROUP-PASSWORD&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 13:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455941#M856759</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-12T13:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455942#M856761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have reset the password and tried again to connect but I get the same error. However when I was saving&lt;/P&gt;&lt;P&gt;the changes I also got another error: [ERROR] no isakmp ikev1-user-authentication (inside) xauth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 13:53:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455942#M856761</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T13:53:22Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455943#M856764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;well, I got a bit further, I have change the password to all lower case and I am now getting prompt for username and password&lt;/P&gt;&lt;P&gt;error: secure vpn connection terminated by peer, reason 433 - not specified by peer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems that the same error comes from both SSL and IPsec&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 14:15:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455943#M856764</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T14:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455944#M856766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I managed to get the IPsec working however when I connect I am getting an IP address on 10.3.3.x / 24 range rather the inside network range.&lt;/P&gt;&lt;P&gt;The SSL is stil not working. It prompts for username and password and after that it fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;BR /&gt;name 10.1.4.4 ctxsvr01&lt;BR /&gt;name 10.1.4.5 itsvr&lt;BR /&gt;name 10.1.4.10 unicornsvr&lt;BR /&gt;name 10.1.4.12 blbsvr&lt;BR /&gt;name 10.1.4.13 exchsvr&lt;BR /&gt;name 10.1.5.4 barracuda&lt;BR /&gt;name 10.1.5.15 video-conferencing-unit&lt;BR /&gt;name 192.168.1.5 ctxdmz&lt;BR /&gt;name 62.253.196.178 outside&lt;BR /&gt;name 62.253.196.179 remote-outside-179&lt;BR /&gt;name 62.253.196.180 webmail-outside-180&lt;BR /&gt;name 62.253.196.181 connect-outside-181&lt;BR /&gt;name 62.253.196.182 unicorn-outside-182&lt;BR /&gt;name 62.253.196.184 sirsi-outside-184&lt;BR /&gt;name 62.253.196.185 blb-outside-185&lt;BR /&gt;name 62.253.196.188 streaming-outside-188&lt;BR /&gt;name 62.253.196.189 video-conferencing-outside-189&lt;BR /&gt;name 82.111.186.146 sdt-rdc&lt;BR /&gt;name 150.147.68.20 sirsi-1&lt;BR /&gt;name 193.110.143.20 sirsi-2&lt;BR /&gt;name 10.1.5.16 streaming-unit&lt;BR /&gt;name 192.168.1.1 dmz&lt;BR /&gt;name 62.253.196.186 email-outside-186&lt;BR /&gt;name 62.253.196.187 Logmein-outside-187&lt;BR /&gt;name 10.3.3.11 VPN1&lt;BR /&gt;name 10.3.3.12 VPN2&lt;BR /&gt;name 10.3.3.13 VPN3&lt;BR /&gt;name 10.3.3.14 VPN4&lt;BR /&gt;name 10.3.3.15 VPN5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.5.1 255.255.0.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address dmz 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address outside 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name chathamhouse.org.uk&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network sirsi-support&lt;BR /&gt; network-object host sirsi-1&lt;BR /&gt; network-object host sirsi-2&lt;BR /&gt;object-group service backup-exec tcp&lt;BR /&gt; port-object eq 10000&lt;BR /&gt; port-object eq 3106&lt;BR /&gt; port-object eq 3527&lt;BR /&gt; port-object eq 6101&lt;BR /&gt; port-object eq 6103&lt;BR /&gt; port-object eq 6106&lt;BR /&gt;object-group service barracuda-8000 tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service blackberry-3101 tcp&lt;BR /&gt; port-object eq 3101&lt;BR /&gt;object-group service citrix-session-reliability-2598 tcp&lt;BR /&gt; port-object eq 2598&lt;BR /&gt;object-group service rdc-3389 tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service sql-1433 tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt;object-group service streaming-1935 tcp&lt;BR /&gt; port-object eq 1935&lt;BR /&gt;object-group service video-streaming-tcp-udp tcp&lt;BR /&gt; port-object eq 3230&lt;BR /&gt; port-object eq 3231&lt;BR /&gt; port-object eq 3232&lt;BR /&gt; port-object eq 3233&lt;BR /&gt; port-object eq 3234&lt;BR /&gt; port-object eq 3235&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host remote-outside-179&lt;BR /&gt; network-object host webmail-outside-180&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object host unicorn-outside-182&lt;BR /&gt; network-object host email-outside-186&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq h323&lt;BR /&gt; group-object video-streaming-tcp-udp&lt;BR /&gt; group-object streaming-1935&lt;BR /&gt;object-group service Reuters udp&lt;BR /&gt; port-object eq 10202&lt;BR /&gt; port-object eq 10302&lt;BR /&gt; port-object eq 9876&lt;BR /&gt;object-group network VPN-IP&lt;BR /&gt; network-object host VPN1&lt;BR /&gt; network-object host VPN2&lt;BR /&gt; network-object host VPN3&lt;BR /&gt; network-object host VPN4&lt;BR /&gt; network-object host VPN5&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group rdc-3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr object-group blackberry-3101 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr eq ssh &lt;BR /&gt;access-list outside_access_in extended permit tcp any host ctxdmz eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host outside eq smtp &lt;BR /&gt;access-list outside_access_in remark SQL&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group sql-1433 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host video-conferencing-outside-189 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group backup-exec &lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group Reuters &lt;BR /&gt;access-list outside_access_in extended permit tcp any host streaming-unit eq nntp &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group rdp &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq citrix-ica &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group citrix-session-reliability-2598 &lt;BR /&gt;access-list dmz_access_in extended permit object-group TCPUDP host ctxdmz 10.1.0.0 255.255.0.0 eq domain &lt;BR /&gt;access-list inside_access_in extended permit tcp host barracuda any eq smtp &lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 host ctxdmz &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 object-group VPN-IP &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool CH-VPN-IP 10.3.3.10-10.3.3.20 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp connect-outside-181 3389 itsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface smtp barracuda smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh barracuda ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp blb-outside-185 3101 blbsvr 3101 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp unicorn-outside-182 www unicornsvr www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp streaming-outside-188 1935 streaming-unit 1935 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Logmein-outside-187 nntp streaming-unit nntp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp sirsi-outside-184 3389 unicornsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp video-conferencing-outside-189 h323 video-conferencing-unit h323 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp webmail-outside-180 https exchsvr https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,outside) tcp remote-outside-179 https ctxdmz https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (inside,outside) video-conferencing-outside-189 video-conferencing-unit netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255 &lt;BR /&gt;static (dmz,inside) remote-outside-179 ctxdmz netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.253.196.177 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;http sdt-rdc 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-dart-win-2.5.0217-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy CH-VPN internal&lt;BR /&gt;group-policy CH-VPN attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt;group-policy CH-VPN-IP internal&lt;BR /&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; dns-server value 10.1.4.9 10.1.4.5&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; default-domain value riia.local&lt;BR /&gt;username sdt.support password cdUOkKYGfsyZgwTx encrypted privilege 0&lt;BR /&gt;username sdt.support attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;username leet password 1fJc82CICO2zAFcfTW47KQ== nt-encrypted privilege 0&lt;BR /&gt;username leet attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN type remote-access&lt;BR /&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt; address-pool (inside) CH-VPN-IP&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; authentication-server-group (inside) LOCAL&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt; default-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN-IP type remote-access&lt;BR /&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN-IP&lt;BR /&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; radius-sdi-xauth&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.4.13&lt;BR /&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 15:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455944#M856766</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T15:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455945#M856769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I managed to get the the IP address right on IPsec, however I cannot ping anything on internal network or to connect to it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I don't have any progress on SSL anyconnect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 15:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455945#M856769</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-12T15:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455946#M856772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Add the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;management-access inside&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp nat-traversal 20&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inspect icmp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and reconnect the VPN, and see if you can ping 10.1.5.1, or any other internal hosts now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 04:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455946#M856772</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-13T04:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455947#M856774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can connect on IPsec and ping the 10.1.5.1 ( firewall ) but cannot ping or connect to anything else.&lt;/P&gt;&lt;P&gt;I have also tried to test the Anyconnect and cannot connect at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ch-asa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 10.1.4.4 ctxsvr01&lt;BR /&gt;name 10.1.4.5 itsvr&lt;BR /&gt;name 10.1.4.10 unicornsvr&lt;BR /&gt;name 10.1.4.12 blbsvr&lt;BR /&gt;name 10.1.4.13 exchsvr&lt;BR /&gt;name 10.1.5.4 barracuda&lt;BR /&gt;name 10.1.5.15 video-conferencing-unit&lt;BR /&gt;name 192.168.1.5 ctxdmz&lt;BR /&gt;name 62.253.196.178 outside&lt;BR /&gt;name 62.253.196.179 remote-outside-179&lt;BR /&gt;name 62.253.196.180 webmail-outside-180&lt;BR /&gt;name 62.253.196.181 connect-outside-181&lt;BR /&gt;name 62.253.196.182 unicorn-outside-182&lt;BR /&gt;name 62.253.196.184 sirsi-outside-184&lt;BR /&gt;name 62.253.196.185 blb-outside-185&lt;BR /&gt;name 62.253.196.188 streaming-outside-188&lt;BR /&gt;name 62.253.196.189 video-conferencing-outside-189&lt;BR /&gt;name 82.111.186.146 sdt-rdc&lt;BR /&gt;name 150.147.68.20 sirsi-1&lt;BR /&gt;name 193.110.143.20 sirsi-2&lt;BR /&gt;name 10.1.5.16 streaming-unit&lt;BR /&gt;name 192.168.1.1 dmz&lt;BR /&gt;name 62.253.196.186 email-outside-186&lt;BR /&gt;name 62.253.196.187 Logmein-outside-187&lt;BR /&gt;name 10.1.3.11 VPN1&lt;BR /&gt;name 10.1.3.12 VPN2&lt;BR /&gt;name 10.1.3.13 VPN3&lt;BR /&gt;name 10.1.3.14 VPN4&lt;BR /&gt;name 10.1.3.15 VPN5&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.5.1 255.255.0.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address dmz 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address outside 255.255.255.240 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 3&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone GMT 0&lt;BR /&gt;dns domain-lookup inside&lt;BR /&gt;dns domain-lookup dmz&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name chathamhouse.org.uk&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group network sirsi-support&lt;BR /&gt; network-object host sirsi-1&lt;BR /&gt; network-object host sirsi-2&lt;BR /&gt;object-group service backup-exec tcp&lt;BR /&gt; port-object eq 10000&lt;BR /&gt; port-object eq 3106&lt;BR /&gt; port-object eq 3527&lt;BR /&gt; port-object eq 6101&lt;BR /&gt; port-object eq 6103&lt;BR /&gt; port-object eq 6106&lt;BR /&gt;object-group service barracuda-8000 tcp&lt;BR /&gt; port-object eq 8000&lt;BR /&gt;object-group service blackberry-3101 tcp&lt;BR /&gt; port-object eq 3101&lt;BR /&gt;object-group service citrix-session-reliability-2598 tcp&lt;BR /&gt; port-object eq 2598&lt;BR /&gt;object-group service rdc-3389 tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group service sql-1433 tcp&lt;BR /&gt; port-object eq 1433&lt;BR /&gt;object-group service streaming-1935 tcp&lt;BR /&gt; port-object eq 1935&lt;BR /&gt;object-group service video-streaming-tcp-udp tcp&lt;BR /&gt; port-object eq 3230&lt;BR /&gt; port-object eq 3231&lt;BR /&gt; port-object eq 3232&lt;BR /&gt; port-object eq 3233&lt;BR /&gt; port-object eq 3234&lt;BR /&gt; port-object eq 3235&lt;BR /&gt;object-group service rdp tcp&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object host remote-outside-179&lt;BR /&gt; network-object host webmail-outside-180&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object host unicorn-outside-182&lt;BR /&gt; network-object host email-outside-186&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt; port-object eq h323&lt;BR /&gt; group-object video-streaming-tcp-udp&lt;BR /&gt; group-object streaming-1935&lt;BR /&gt;object-group service Reuters udp&lt;BR /&gt; port-object eq 10202&lt;BR /&gt; port-object eq 10302&lt;BR /&gt; port-object eq 9876&lt;BR /&gt;object-group network VPN-IP&lt;BR /&gt; network-object host VPN1&lt;BR /&gt; network-object host VPN2&lt;BR /&gt; network-object host VPN3&lt;BR /&gt; network-object host VPN4&lt;BR /&gt; network-object host VPN5&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group rdc-3389 &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr object-group blackberry-3101 &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_1 eq https &lt;BR /&gt;access-list outside_access_in extended permit tcp any host blbsvr eq ssh &lt;BR /&gt;access-list outside_access_in extended permit tcp any host ctxdmz eq ftp &lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_2 eq www &lt;BR /&gt;access-list outside_access_in extended permit tcp any host outside eq smtp &lt;BR /&gt;access-list outside_access_in remark SQL&lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group sql-1433 inactive &lt;BR /&gt;access-list outside_access_in extended permit tcp any host video-conferencing-outside-189 object-group DM_INLINE_TCP_1 &lt;BR /&gt;access-list outside_access_in extended permit tcp any any object-group backup-exec &lt;BR /&gt;access-list outside_access_in extended permit udp any any object-group Reuters &lt;BR /&gt;access-list outside_access_in extended permit tcp any host streaming-unit eq nntp &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group rdp &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq www &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 eq citrix-ica &lt;BR /&gt;access-list dmz_access_in extended permit tcp host ctxdmz 10.1.0.0 255.255.0.0 object-group citrix-session-reliability-2598 &lt;BR /&gt;access-list dmz_access_in extended permit object-group TCPUDP host ctxdmz 10.1.0.0 255.255.0.0 eq domain &lt;BR /&gt;access-list inside_access_in extended permit tcp host barracuda any eq smtp &lt;BR /&gt;access-list inside_access_in extended deny tcp any any eq smtp &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.0.0 255.255.0.0 host ctxdmz &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 10.1.0.0 255.255.0.0 object-group VPN-IP &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ip local pool CH-VPN-IP 10.1.3.10-10.1.3.20 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp connect-outside-181 3389 itsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface smtp barracuda smtp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp interface ssh barracuda ssh netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp blb-outside-185 3101 blbsvr 3101 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp unicorn-outside-182 www unicornsvr www netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp streaming-outside-188 1935 streaming-unit 1935 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp Logmein-outside-187 nntp streaming-unit nntp netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp sirsi-outside-184 3389 unicornsvr 3389 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp video-conferencing-outside-189 h323 video-conferencing-unit h323 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) tcp webmail-outside-180 https exchsvr https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,outside) tcp remote-outside-179 https ctxdmz https netmask 255.255.255.255&amp;nbsp; dns &lt;BR /&gt;static (dmz,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;BR /&gt;static (inside,dmz) 10.1.0.0 10.1.0.0 netmask 255.255.0.0 &lt;BR /&gt;static (inside,outside) video-conferencing-outside-189 video-conferencing-unit netmask 255.255.255.255 &lt;BR /&gt;static (inside,inside) webmail-outside-180 exchsvr netmask 255.255.255.255 &lt;BR /&gt;static (dmz,inside) remote-outside-179 ctxdmz netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.253.196.177 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;http sdt-rdc 255.255.255.255 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.1.0.0 255.255.0.0 inside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access inside&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;webvpn&lt;BR /&gt; enable outside&lt;BR /&gt; svc image disk0:/anyconnect-dart-win-2.5.0217-k9.pkg 1&lt;BR /&gt; svc enable&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;group-policy CH-VPN internal&lt;BR /&gt;group-policy CH-VPN attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt;group-policy CH-VPN-IP internal&lt;BR /&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; dns-server value 10.1.4.9 10.1.4.5&lt;BR /&gt; vpn-tunnel-protocol IPSec svc &lt;BR /&gt; default-domain value riia.local&lt;BR /&gt;username sdt.support password cdUOkKYGfsyZgwTx encrypted privilege 0&lt;BR /&gt;username sdt.support attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;username leet password 1fJc82CICO2zAFcfTW47KQ== nt-encrypted privilege 0&lt;BR /&gt;username leet attributes&lt;BR /&gt; vpn-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN type remote-access&lt;BR /&gt;tunnel-group CH-VPN general-attributes&lt;BR /&gt; address-pool (inside) CH-VPN-IP&lt;BR /&gt; authentication-server-group (inside) LOCAL&lt;BR /&gt; authorization-server-group LOCAL&lt;BR /&gt; authorization-server-group (inside) LOCAL&lt;BR /&gt; default-group-policy CH-VPN&lt;BR /&gt;tunnel-group CH-VPN-IP type remote-access&lt;BR /&gt;tunnel-group CH-VPN-IP general-attributes&lt;BR /&gt; address-pool CH-VPN-IP&lt;BR /&gt; default-group-policy CH-VPN-IP&lt;BR /&gt;tunnel-group CH-VPN-IP ipsec-attributes&lt;BR /&gt; pre-shared-key *****&lt;BR /&gt; radius-sdi-xauth&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;smtp-server 10.1.4.13&lt;BR /&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 08:03:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455947#M856774</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-13T08:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455948#M856778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it looks like you have changed your IP Pool to what it was before again:&lt;/P&gt;&lt;P&gt;ip local pool CH-VPN-IP 10.1.3.10-10.1.3.20 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As advised earlier, the ip pool needs to be in different subnet than your internal network. I've seen that NAT exemption access-list has also changed to 10.1.3.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please change all back to 10.3.3.0/24 subnet. Otherwise, because pool and internal subnet are in the same subnet, it will try to ARP for the ip instead of routing it towards their default gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 10:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455948#M856778</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-13T10:19:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455949#M856782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the IPsec now works I can connect to the network - many thanks for this, however is there a way that I can browse my local network as well. I have checked the option on the client but I cannot ping anything my side?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSL Anyconnect doesn't work and doesn't give me any informations where is it failing. It prompts me for username and password then it asks to confirm a certificate and&amp;nbsp; then it tries to connect after about 10s it says that it cannot connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 15:22:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455949#M856782</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-13T15:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455950#M856783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1) Are you able to ping the ASA inside interface from VPN client? ping 10.1.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You might also want to add the split tunnel policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split-acl standard permit 10.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy CH-VPN attributes&lt;BR /&gt; split-tunnel-policy tunnelspecified &lt;BR /&gt; split-tunnel-network-list value split-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy CH-VPN-IP attributes&lt;BR /&gt; split-tunnel-policy tunnelspecified &lt;BR /&gt; split-tunnel-network-list value split-acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Can you also confirm that you have changed the NAT exemption access-list to the new ip pool (10.3.3.0/24)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4) Lastly, for your internal subnets, is the ASA inside interface the default gateway? OR/ alternatively, can you add route for the pool subnet (10.3.3.0/24) on your internal router to point towards the ASA inside interface (10.1.5.1).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 09:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455950#M856783</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-14T09:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455951#M856786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the IPsec now works exactly as we want, brilliant, thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The SSL Anyconnect doesn't but I wouldn't worry about it, we can work on the IPsec without any issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take this as answered call&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 09:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455951#M856786</guid>
      <dc:creator>patrifick</dc:creator>
      <dc:date>2010-05-14T09:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN setup, SSL and IPsec</title>
      <link>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455952#M856789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great to hear, and thanks for the rating.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 May 2010 09:37:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-setup-ssl-and-ipsec/m-p/1455952#M856789</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-14T09:37:55Z</dc:date>
    </item>
  </channel>
</rss>

