<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic When VPN Connection is up  I get no Internet traffic to home network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399579#M954350</link>
    <description>&lt;P&gt;Hey Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall ASA5506-X&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am baffled and can't figure out why when the&amp;nbsp;VPN is up to azure I lose all internet traffic on my home network. (I am complete noob to&amp;nbsp;Cisco so excuse my ignorance and i hope its something simple.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a Site to site vpn - home network to azure. I used the config script provided by azure to configure the asa with the vpn settings&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Running conifg below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA Version 9.7(1)4 &lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group Test&lt;BR /&gt; ip address pppoe &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network internal-lan&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Outside&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Network1&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Azure&lt;BR /&gt; subnet 10.1.0.0 255.255.0.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;object-group network AzureNetworksANY&lt;BR /&gt; description Azure-Virtual-Network_ANY[0/0]_Representation&lt;BR /&gt; network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network OnpremisesNetworksANY&lt;BR /&gt; description Onpremises-Network_ANY[0/0]_Representation&lt;BR /&gt; network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object internal-lan&lt;BR /&gt; network-object object obj_any&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object object Azure&lt;BR /&gt; network-object object obj_any&lt;BR /&gt;access-list Default standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Azure-ACL extended permit ip object obj_any object obj_any log notifications &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object internal-lan object Azure &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (any,outside) source dynamic Network1 interface&lt;BR /&gt;nat (inside,outside) source static obj_any obj_any destination static obj_any obj_any no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static internal-lan internal-lan destination static Azure Azure no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 no-proxy-arp route-lookup&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 212.30.7.8 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1350&lt;BR /&gt;sysopt connection preserve-vpn-flows&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal Azure-Ipsec-Tunnel-Home-40.117.138.5&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association lifetime seconds 3600&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec inner-routing-lookup&lt;BR /&gt;crypto map outside_map 1 match address Azure-ACL&lt;BR /&gt;crypto map outside_map 1 set peer 40.117.138.5 &lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal Azure-Ipsec-Tunnel-Home-40.117.138.5&lt;BR /&gt;crypto map outside_map 1 set ikev2 pre-shared-key *****&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map 1 set nat-t-disable&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 40.117.138.5 &lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 28800&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group GSY request dialout pppoe&lt;BR /&gt;vpdn group GSY localname&amp;nbsp;*****&lt;BR /&gt;vpdn group GSY ppp authentication chap&lt;BR /&gt;vpdn group VDSL request dialout pppoe&lt;BR /&gt;vpdn group VDSL localname&amp;nbsp;******&lt;BR /&gt;vpdn group VDSL ppp authentication chap&lt;BR /&gt;vpdn group Test request dialout pppoe&lt;BR /&gt;vpdn group Test localname&amp;nbsp;&lt;SPAN&gt;*******&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;vpdn group Test ppp authentication chap&lt;BR /&gt;vpdn username ******* password ***** &lt;BR /&gt;vpdn username&amp;nbsp;&lt;SPAN&gt;*******&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;password *****&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 4.4.4.4 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy AzureGroupPolicy internal&lt;BR /&gt;group-policy AzureGroupPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev2 &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;tunnel-group 40.117.138.5 type ipsec-l2l&lt;BR /&gt;tunnel-group 40.117.138.5 general-attributes&lt;BR /&gt; default-group-policy AzureGroupPolicy&lt;BR /&gt;tunnel-group 40.117.138.5 ipsec-attributes&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;no tunnel-group-map enable peer-ip&lt;BR /&gt;tunnel-group-map default-group 40.117.138.5&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:8be36f92542fdeda5023057b770e912a&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:53:00 GMT</pubDate>
    <dc:creator>jjwarr</dc:creator>
    <dc:date>2020-02-21T15:53:00Z</dc:date>
    <item>
      <title>When VPN Connection is up  I get no Internet traffic to home network</title>
      <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399579#M954350</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewall ASA5506-X&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am baffled and can't figure out why when the&amp;nbsp;VPN is up to azure I lose all internet traffic on my home network. (I am complete noob to&amp;nbsp;Cisco so excuse my ignorance and i hope its something simple.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a Site to site vpn - home network to azure. I used the config script provided by azure to configure the asa with the vpn settings&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Running conifg below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ASA Version 9.7(1)4 &lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; pppoe client vpdn group Test&lt;BR /&gt; ip address pppoe &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.2 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt; management-only&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object network obj_any&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network internal-lan&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Outside&lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network Network1&lt;BR /&gt; subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network Azure&lt;BR /&gt; subnet 10.1.0.0 255.255.0.0&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;object-group service DM_INLINE_SERVICE_4&lt;BR /&gt;object-group network AzureNetworksANY&lt;BR /&gt; description Azure-Virtual-Network_ANY[0/0]_Representation&lt;BR /&gt; network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network OnpremisesNetworksANY&lt;BR /&gt; description Onpremises-Network_ANY[0/0]_Representation&lt;BR /&gt; network-object 0.0.0.0 0.0.0.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt; network-object object internal-lan&lt;BR /&gt; network-object object obj_any&lt;BR /&gt;object-group network DM_INLINE_NETWORK_2&lt;BR /&gt; network-object object Azure&lt;BR /&gt; network-object object obj_any&lt;BR /&gt;access-list Default standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Azure-ACL extended permit ip object obj_any object obj_any log notifications &lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip object internal-lan object Azure &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (any,outside) source dynamic Network1 interface&lt;BR /&gt;nat (inside,outside) source static obj_any obj_any destination static obj_any obj_any no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static internal-lan internal-lan destination static Azure Azure no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static DM_INLINE_NETWORK_1 DM_INLINE_NETWORK_1 destination static DM_INLINE_NETWORK_2 DM_INLINE_NETWORK_2 no-proxy-arp route-lookup&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 212.30.7.8 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;sysopt connection tcpmss 1350&lt;BR /&gt;sysopt connection preserve-vpn-flows&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal Azure-Ipsec-Tunnel-Home-40.117.138.5&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-256&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt; protocol esp encryption des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt; protocol esp encryption 3des&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt; protocol esp encryption aes&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt; protocol esp encryption aes-192&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt; protocol esp encryption aes-256&lt;BR /&gt; protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association lifetime seconds 3600&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ipsec inner-routing-lookup&lt;BR /&gt;crypto map outside_map 1 match address Azure-ACL&lt;BR /&gt;crypto map outside_map 1 set peer 40.117.138.5 &lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal Azure-Ipsec-Tunnel-Home-40.117.138.5&lt;BR /&gt;crypto map outside_map 1 set ikev2 pre-shared-key *****&lt;BR /&gt;crypto map outside_map 1 set security-association lifetime seconds 3600&lt;BR /&gt;crypto map outside_map 1 set nat-t-disable&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set peer 40.117.138.5 &lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt; encryption aes-256&lt;BR /&gt; integrity sha&lt;BR /&gt; group 2&lt;BR /&gt; prf sha&lt;BR /&gt; lifetime seconds 28800&lt;BR /&gt;crypto ikev2 enable outside&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;no ssh stricthostkeycheck&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;vpdn group GSY request dialout pppoe&lt;BR /&gt;vpdn group GSY localname&amp;nbsp;*****&lt;BR /&gt;vpdn group GSY ppp authentication chap&lt;BR /&gt;vpdn group VDSL request dialout pppoe&lt;BR /&gt;vpdn group VDSL localname&amp;nbsp;******&lt;BR /&gt;vpdn group VDSL ppp authentication chap&lt;BR /&gt;vpdn group Test request dialout pppoe&lt;BR /&gt;vpdn group Test localname&amp;nbsp;&lt;SPAN&gt;*******&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;vpdn group Test ppp authentication chap&lt;BR /&gt;vpdn username ******* password ***** &lt;BR /&gt;vpdn username&amp;nbsp;&lt;SPAN&gt;*******&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;password *****&lt;/P&gt;
&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd dns 8.8.8.8 4.4.4.4 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev2 l2tp-ipsec ssl-clientless&lt;BR /&gt;group-policy AzureGroupPolicy internal&lt;BR /&gt;group-policy AzureGroupPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol ikev2 &lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;tunnel-group 40.117.138.5 type ipsec-l2l&lt;BR /&gt;tunnel-group 40.117.138.5 general-attributes&lt;BR /&gt; default-group-policy AzureGroupPolicy&lt;BR /&gt;tunnel-group 40.117.138.5 ipsec-attributes&lt;BR /&gt; ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt; ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;no tunnel-group-map enable peer-ip&lt;BR /&gt;tunnel-group-map default-group 40.117.138.5&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt; no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect sip &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:8be36f92542fdeda5023057b770e912a&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:53:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399579#M954350</guid>
      <dc:creator>jjwarr</dc:creator>
      <dc:date>2020-02-21T15:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: When VPN Connection is up  I get no Internet traffic to home network</title>
      <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399761#M954352</link>
      <description>That's because the site-to-site to AZURE uses this ACL for ENCryption:&lt;BR /&gt;&lt;BR /&gt;access-list Azure-ACL extended permit ip object obj_any object obj_any log notifications &lt;BR /&gt;&lt;BR /&gt;meaning all your traffic will be encrypted and sent to the IPSEC tunnel with Azure.&lt;BR /&gt;You just have to rewrite that ACL and specify precise source and destinations you need.</description>
      <pubDate>Thu, 14 Jun 2018 19:47:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399761#M954352</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-14T19:47:53Z</dc:date>
    </item>
    <item>
      <title>Re: When VPN Connection is up  I get no Internet traffic to home network</title>
      <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399790#M954355</link>
      <description>&lt;P&gt;Thanks for the response Florin and narrowing down where&amp;nbsp; to look, i am new to ACL's so forgive me, are you suggesting in the&amp;nbsp;&lt;SPAN&gt;Azure-ACL i add another rule or edit the current one and allow http and https traffic.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The source and destination networks are correct in that rule from what i can see(home network 'source' and Azure as 'destination')&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jun 2018 20:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3399790#M954355</guid>
      <dc:creator>jjwarr</dc:creator>
      <dc:date>2018-06-14T20:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: When VPN Connection is up  I get no Internet traffic to home network</title>
      <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3400410#M954356</link>
      <description>That ACL refers obj_any ; is this what you really need towards Azure?</description>
      <pubDate>Fri, 15 Jun 2018 20:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3400410#M954356</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-15T20:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: When VPN Connection is up  I get no Internet traffic to home network</title>
      <link>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3400609#M954357</link>
      <description>&lt;P&gt;It looks like you've tried a few different things with the config and didn't clean up all the bits that didn't work.&amp;nbsp; Primarily, you have two crypto maps to the same peer:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;crypto map outside_map 1 match address Azure-ACL
crypto map outside_map 1 set peer 40.117.138.5&amp;nbsp;
&amp;lt;snip&amp;gt;
crypto map outside_map 2 match address outside_cryptomap_1
crypto map outside_map 2 set peer 40.117.138.5&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The first one will take precedence. The ACL it calls is "Azure-ACL":&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list Azure-ACL extended permit ip object obj_any object obj_any log notifications&amp;nbsp;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What you need is the second one:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;access-list outside_cryptomap_1 extended permit ip object internal-lan object Azure&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Ideally the ACL in the second one would be named "Azure-ACL" for clarity. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In any case, that first acl is matching all traffic and sending it down the tunnel as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/315231"&gt;@Florin Barhala&lt;/a&gt;&amp;nbsp;noted. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Once your non-Azure traffic gets to the Azure cloud it will not be handled properly because even if Azure knows to route it back out to the public Internet, it likely doesn't have a NAT rule for it to translate your home private IP addresses to the public ones.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jun 2018 15:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/when-vpn-connection-is-up-i-get-no-internet-traffic-to-home/m-p/3400609#M954357</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-06-16T15:27:12Z</dc:date>
    </item>
  </channel>
</rss>

