I am unable to get traffic routing to my inside network from my vpn pool on new setup of remote access VPN authentication works I get an ip address in the pool but can not pass traffic. I am much more familiar with ASA and use the ASDM so CLI or PDM I am rusty on. I am attaching config removing some items for security if someone can let me know.
access-list NO_NAT permit ip any VPN_pool 255.255.255.0
access-list nb1_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 VPN_pool 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.128
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.1.192 255.255.255.192
access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 VPN_pool 255.255.255.0
access-list inside_access_in permit ip any any
access-list nb3_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list outside_cryptomap_dyn_20 permit ip any VPN_pool 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any VPN_pool 255.255.255.0
access-list outside_cryptomap_dyn_60 permit ip any 192.168.1.192 255.255.255.192
pager lines 24
ip address inside 192.168.1.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnpool 192.168.2.100-192.168.2.200
ip local pool VPNinside 192.168.1.220-192.168.1.227
arp timeout 14400
global (outside) 1 interface
global (outside) 2 X.X.X.X netmask 255.255.255.240
global (outside) 3 X.X.X.X netmask 255.255.255.240
global (inside) 4 192.168.4.10-192.168.4.100 netmask 255.255.255.0
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 2 192.168.1.128 255.255.255.192 0 0
nat (inside) 3 192.168.1.192 255.255.255.192 0 0
nat (inside) 1 192.168.1.0 255.255.255.128 0 0
access-group inbound in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 X.X.X.X
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 60 match address outside_cryptomap_dyn_60
crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup nb1 address-pool VPNinside
vpngroup nb1 split-tunnel nb1_splitTunnelAcl
vpngroup nb1 idle-time 1800
vpngroup nb1 password ********
vpngroup nb2 address-pool vpnpool
vpngroup nb2 idle-time 1800
vpngroup nb2 password ********
vpngroup nb3 address-pool VPNinside
vpngroup nb3 split-tunnel nb3_splitTunnelAcl
vpngroup nb3 idle-time 1800
vpngroup nb3 password ********
access-list NO_NAT permit ip any VPN_pool 255.255.255.0
access-list nb1_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 VPN_pool 255.255.255.0
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.128
access-list inside_outbound_nat0_acl permit ip 192.168.1.0 255.255.255.0 192.168.1.192 255.255.255.192
access-list inside_access_in permit ip 192.168.1.0 255.255.255.0 VPN_pool 255.255.255.0
access-list inside_access_in permit ip any any
access-list nb3_splitTunnelAcl permit ip 192.168.1.0 255.255.255.0 any
access-list outside_cryptomap_dyn_20 permit ip any VPN_pool 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any VPN_pool 255.255.255.0
access-list outside_cryptomap_dyn_60 permit ip any 192.168.1.192 255.255.255.192
pager lines 24
ip address inside 192.168.1.254 255.255.255.0
ip audit info action alarm
ip audit attack action alarm
ip local pool vpnpool 192.168.2.100-192.168.2.200
ip local pool VPNinside 192.168.1.220-192.168.1.227
arp timeout 14400
global (outside) 1 interface
global (outside) 2 X.X.X.X netmask 255.255.255.240
global (outside) 3 X.X.X.X netmask 255.255.255.240
global (inside) 4 192.168.4.10-192.168.4.100 netmask 255.255.255.0
nat (inside) 0 access-list inside_outbound_nat0_acl
nat (inside) 2 192.168.1.128 255.255.255.192 0 0
nat (inside) 3 192.168.1.192 255.255.255.192 0 0
nat (inside) 1 192.168.1.0 255.255.255.128 0 0
access-group inbound in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 X.X.X.X
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout sip-disconnect 0:02:00 sip-invite 0:03:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server TACACS+ max-failed-attempts 3
aaa-server TACACS+ deadtime 10
aaa-server RADIUS protocol radius
aaa-server RADIUS max-failed-attempts 3
aaa-server RADIUS deadtime 10
aaa-server LOCAL protocol local
http server enable
http 192.168.1.0 255.255.255.0 inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac
crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 40 match address outside_cryptomap_dyn_40
crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-MD5
crypto dynamic-map outside_dyn_map 60 match address outside_cryptomap_dyn_60
crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-MD5
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map client authentication LOCAL
crypto map outside_map interface outside
isakmp enable outside
isakmp identity address
isakmp policy 20 authentication pre-share
isakmp policy 20 encryption 3des
isakmp policy 20 hash md5
isakmp policy 20 group 2
isakmp policy 20 lifetime 86400
vpngroup nb1 address-pool VPNinside
vpngroup nb1 split-tunnel nb1_splitTunnelAcl
vpngroup nb1 idle-time 1800
vpngroup nb1 password ********
vpngroup nb2 address-pool vpnpool
vpngroup nb2 idle-time 1800
vpngroup nb2 password ********
vpngroup nb3 address-pool VPNinside
vpngroup nb3 split-tunnel nb3_splitTunnelAcl
vpngroup nb3 idle-time 1800
vpngroup nb3 password ********