<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec VPN help on ASA 5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885329#M954710</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Nathan&lt;/P&gt;&lt;P&gt;it seems like you access internal server from inside interface, so the traffic is input and output at same interface(inside ifterface), doesn`t it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regard&lt;/P&gt;&lt;P&gt;dongdong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 20 Feb 2008 02:53:41 GMT</pubDate>
    <dc:creator>dongdongliu</dc:creator>
    <dc:date>2008-02-20T02:53:41Z</dc:date>
    <item>
      <title>IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885328#M954709</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to set up a remote VPN on the ASA.  I've simply used the wizard on the asdm because I'm new to this.  I can connect to the VPN fine, but once connected I cannot access anything on the internal network, nor can I get out the internet.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using an IP pool of 10.39.230.50-100.  The internal network that I want to access is across another router connected to the inside interface, 10.39.1.0.  10.39.239.3 is the router.  (it has a subinterface of 10.39.230.3 as well)  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems like it might be a NAT problem but I can't figure it out.  Any ideas?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885328#M954709</guid>
      <dc:creator>shortnathan</dc:creator>
      <dc:date>2019-03-11T12:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885329#M954710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, Nathan&lt;/P&gt;&lt;P&gt;it seems like you access internal server from inside interface, so the traffic is input and output at same interface(inside ifterface), doesn`t it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regard&lt;/P&gt;&lt;P&gt;dongdong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2008 02:53:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885329#M954710</guid>
      <dc:creator>dongdongliu</dc:creator>
      <dc:date>2008-02-20T02:53:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885330#M954711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nathan&lt;/P&gt;&lt;P&gt; Identify subnets individually for routes as much as possible so remove the following route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no inside 10.0.0.0 255.0.0.0 10.39.239.3 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and add routes to subnets individually like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside 10.39.1.0 255.255.255.0 10.39.239.3 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most important, add the return trip traffic route for your VPN clients in router(the router with 10.39.239.3 IP)! But since (it has a subinterface of 10.39.230.3 as well) is correct, it assumes 10.39.230.0 is a connected route, so you should use a VPN IP range that does not exist in router or firewall. For ex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool fds_pool 192.168.120.1-192.168.120.126 mask 255.255.255.128&lt;/P&gt;&lt;P&gt;tunnel-group fds general-attributes&lt;/P&gt;&lt;P&gt;no address-pool fdspool&lt;/P&gt;&lt;P&gt;address-pool fds_pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then&lt;/P&gt;&lt;P&gt;no access-list inside_nat0_outbound_1 extended permit ip 10.39.1.0 255.255.255.0 10.39.230.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound_1 extended permit ip 10.39.1.0 255.255.255.0 192.168.120.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add the following acl&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit 10.39.1.0 255.255.255.0 192.168.120.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the following route in router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.120.0 255.255.255.128 10.39.239.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally a split-tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list split_t permit ip 10.39.1.0 255.255.255.0 192.168.1.120 255.255.255.128&lt;/P&gt;&lt;P&gt;group-policy fds attributes&lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelall&lt;/P&gt;&lt;P&gt;split-tunnel-network list split_t&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2008 04:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885330#M954711</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-02-20T04:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885331#M954712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try a tunneled gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 10.39.239.3 tunneled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also make sure you have a route on the inside router for the VPN IP pool.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2008 15:33:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885331#M954712</guid>
      <dc:creator>Sighclops</dc:creator>
      <dc:date>2008-02-20T15:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885332#M954713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response!  I've made the changes you suggested, but no split tunneling because we aren't going to be using it.  It's still not working correctly.  I can't get internet when connected to the VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit 10.39.0.0/16 255.255.255.0 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I changed to the above for test purposes.  I can talk to the network connected to the interface on the ASA (10.39.239.0) but not to the remote segment (10.39.1.0).  I've added an ip route 192.168.20.0 255.255.255.0 10.39.239.0 to the router.  Any more ideas? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Feb 2008 21:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885332#M954713</guid>
      <dc:creator>shortnathan</dc:creator>
      <dc:date>2008-02-20T21:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885333#M954714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nathan,&lt;/P&gt;&lt;P&gt;  Please post your current running config after modifications&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2008 00:23:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885333#M954714</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-02-22T00:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN help on ASA 5510</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885334#M954715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got it working now.  Turns out that I needed a route back on the router at the other office.  Thanks guys!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Feb 2008 01:04:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-vpn-help-on-asa-5510/m-p/885334#M954715</guid>
      <dc:creator>shortnathan</dc:creator>
      <dc:date>2008-02-22T01:04:47Z</dc:date>
    </item>
  </channel>
</rss>

