VPN inside and on a PIX DMZ

Hello

I've got 2 PIx 515E with UR 1 and 4 Ethernet 1 506th both in 6.3.4.

I tried to make VPN between Toulon and Montreal.

In Toulon, I can communication of inside the demilitarized zone and inside the Montreal network

Montreal, I can communicate in Toulon inside the network.

But disclosure of the dmz of Toulon for of Montreal and Montreal to Toulon DMZ network.

I got a Syslog message saying that it is not possible...

How could I solve this problem?

Thank you very much

Charles

506th Montreal

IP address inside 192.168.20.1 255.255.255.0

access-list 102 permit ip 192.168.20.0 255.255.255.0 192.168.0.0 255.255.252.0

access-list 102 permit ip host 199.x.x.170 to 192.168.2.3 host

access-list 102 permit ip host 199.x.x.170 192.168.1.5 host

access-list 103 allow ip 192.168.20.0 255.255.255.0 192.168.0.0 255.255.252.0

NAT (inside) - 0 102 access list

Crypto ipsec transform-set esp - esp-md5-hmac confoptis

map ToToulon 10 ipsec-isakmp crypto

crypto ToToulon 10 card matches the address 103

card crypto ToToulon 10 set peer 195.x.x.2

card crypto ToToulon 10 the transform-set confoptis value

ToToulon interface card crypto outside

ISAKMP allows outside

ISAKMP key * address 195.x.x.2 netmask 255.255.255.255 No.-xauth-no-config-mode

ISAKMP identity address

part of pre authentication ISAKMP policy 10

encryption of ISAKMP policy 10

ISAKMP policy 10 md5 hash

10 2 ISAKMP policy group

ISAKMP life duration strategy 10 86400

515E Toulon

IP address inside 192.168.1.10 255.255.255.0

dmZ1 address IP 192.168.2.1 255.255.255.0

access-list 103 allow ip 192.168.0.0 255.255.252.0 192.168.20.0 255.255.255.0

access-list 104. allow ip 192.168.0.0 255.255.252.0 192.168.20.0 255.255.255.0

access-list 104. allow ip 192.168.0.0 255.255.252.0 192.168.30.0 255.255.255.0

access-list 104 allow 192.168.2.3 host ip 199.243.137.170

access-list 104 allow 192.168.1.5 ip host 199.243.137.170

NAT (inside) - 0 104 access list

Crypto ipsec transform-set esp - esp-md5-hmac optisconf

Crypto-map dynamic dynmap 30 transform-set optisconf

map ToMontreal 10 ipsec-isakmp crypto

crypto ToMontreal 10 card matches the address 103

card crypto ToMontreal 10 set peer 199.x.x.170

card crypto ToMontreal 10 the transform-set optisconf value

map ToMontreal 20-isakmp ipsec crypto dynamic dynmap

ToMontreal interface card crypto outside

ISAKMP allows outside

ISAKMP key * address 199.x.x.170 netmask 255.255.255.255 No.-xauth-no-config-mode

ISAKMP identity address

part of pre authentication ISAKMP policy 10

encryption of ISAKMP policy 10

ISAKMP policy 10 md5 hash

10 2 ISAKMP policy group

ISAKMP life duration strategy 10 86400

vpngroup address vpnaccess2 pool VPNallemagne

vpngroup dns 192.168.1.1 Server VPNallemagne

vpngroup wins 192.168.1.1 VPNallemagne-Server

vpngroup VPNallemagne by default-field OPTIS.local

vpngroup idle 1800 VPNallemagne-time

vpngroup password VPNallemagne *.

Syslog message:

% 305005-3-PIX: no outside group translation not found for icmp src: 192.168.20.2 dst dmZ1:192.168.2.3 (type 8, code 0)

% 305005-3-PIX: no group of translation not found for udp src outside:192.168.20.2/1180 dst dmZ1:192.168.2.3/53

If you want to be able to communicate hollow VPN connection to the DMZ, you should disable the NAT to the demilitarized zone. As already configured for the Interior. A set corresponding access list for the SHEEP!

Example:

NAT (dmz) 0 104 access list

sincerely

Patrick

Tags: Cisco Security

Similar Questions

  • Customer Pix unit inside and dmz networks

    Are there problems that prohibit a client to the unit to start connections to hosts on pix dmz networks and pix inside at the same time?

    You can provide a link that describes the side PIX of the two networks not only inside network access configuration?

    Oops, yes sorry, brain fade from me, do not take into account my first email. Your configuration would look like this:

    IP address inside 10.1.1.1 255.255.255.0

    IP dmz 172.16.1.1 255.255.255.0

    IP local pool vpnpool 192.168.1.1 - 192.168.1.254

    NAT (inside) 0-list of access nonatinside

    NAT (dmz) 0-list of access nonatdmz

    permit the 10.1.1.0 ip access list nonatinside 255.255.255.0 192.168.1.0 255.255.255.0

    permit ip 172.16.1.0 access list nonatdmz 255.255.255.0 192.168.1.0 255.255.255.0

    Hope that helps.

  • L2l IPSec VPN 3000 and PIX 501

    Hello

    I have a remote site that has a broadband internet connection and uses a PIX 501.  We wanted to connect them with our main office using our VPN 3000 via VPN site-to-site.

    I followed the following documentation:

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00800949d2.shtml#tshoot

    However the L2L session does not appear on the hub when I check the active sessions.

    The network diagram, as well as the PIX config and the screenshots of the VPN configuration for the IPSec-L2L tunnel is attached.

    Any help or advice are appreciated.

    I just noticed that the PIX firewall, the phase 1 paramateres are not configured. You must configure the same PASE 1 and phase 2 settings on both ends of the tunnel.

    For example, on CVPN 3000, you have configured settings Phase 1 as 3DES, pre-shared key etc... We have the same configuration on the PIX firewall too.

    Here is an example of sample config

    http://www.Cisco.com/en/us/products/HW/vpndevc/ps2284/products_configuration_example09186a00800949d2.shtml

    I hope this helps!

  • PIX, VPN, PAT and static

    I want to activate an incoming and outgoing VPN on a PIX configured with PAT. I enabled ESP and UDP/500 on the appropriate access to the lists, but must provide a static for inbound traffic. I already use a static for incoming SMTP traffic, and I don't see how to do the same thing for udp/500, but how do I ESP traffic?

    Any suggestions gratefully received.

    If you are referring to a static port, you can create one for ESP since static port can only be created for TCP/UDP and ESP is located just above the intellectual property, it is NOT a TCP/UDP protocol. You will need to create a one-to-one static for this internal VPN server and have your clients to connect to this address. This will chew global IP address to another one, sorry.

  • A Site VPN PIX501 and CISCO router

    Hello Experts,

    I have an at home test lab, I set up a site to site vpn using a router Cisco PIX501 and CISCO2691, for configurations, I have just a few links on the internet, because my background on VPN configuration is not too good, for the configuration of routers, I followed this link:

    www.Firewall.CX/Cisco-Technical-Knowledgebase/Cisco-Routers/867-Cisco-ro...

    and for configuring pIX I just use the VPN Wizard of pix. All confgurations but ping failed. Hope you can help me with this, don't know what to do here (troubleshooting).

    Joint here is the configuration of my router, topology, as well as the pix configuration. Hope you can help me with this. Thanks in advance.

    Hi Mark,

    I went in the Config of the ASA

    I see that the dispensation of Nat is stil missing there

    Please add the following

    access-list allowed sheep ip 192.168.1.0 255.255.255.0 172.21.1.0 255.255.255.0

    inside NAT) 0 access-list sheep

    Then try it should work

    Thank you

    REDA

  • PIX DMZ outward

    I have an intranet with 3 PIX 515 6.3 Firewall, exterior, Interior and DMZ interface.

    I want to access DMZ w/o NAT inside and outside, but want NAT to inside.

    the addresses are

    domestic 192.168.10.XX

    DMZ 197.28.10.xx

    outdoor 197.28.8.XX

    Need help.

    Have Web, FTP, and DNS on DMZ servers that must be available for outside and inside.

    Can you ping the web and ftp servers of either inside or outside? How does the PIX itself? Otherwise, I look at the routing configuration (i.e. the default gateway) on each one and check that you have all the IP addresses configured doubles. Check also for any software firewall on servers.

    Looks like you're closer...

  • Convert the VPN Site-to-Site of PIX to ASA 8.2

    I worked on the conversion of a config above a PIX an ASA 8.2 but I am running into trouble with the site to site vpn. The PIX has a VPN client and site to site. Given that some of the configs for the cross from site to site on the VPN client I'm confuse. Any help would be apperciated.

    Below are excerpts from just the PIX VPN related orders.

    permit access ip 192.168.0.0 list Remote_splitTunnelAcl 255.255.0.0 any

    inside_outbound_nat0_acl ip access list allow any 192.168.0.160 255.255.255.240

    inside_outbound_nat0_acl Zenoss_OS CNP 255.255.255.0 ip host allowed access list

    inside_outbound_nat0_acl SilverBack NOC 255.255.255.0 ip host allowed access list

    inside_outbound_nat0_acl allowed host NOC 255.255.255.0 enoss_Hardware ip access-list

    outside_cryptomap_dyn_20 ip access list allow any 192.168.0.160 255.255.255.240

    outside_cryptomap_20 Zenoss_OS CNP 255.255.255.0 ip host allowed access list

    outside_cryptomap_20 SilverBack NOC 255.255.255.0 ip host allowed access list

    outside_cryptomap_20 Zenoss_Hardware CNP 255.255.255.0 ip host allowed access list

    IP pool local DHCP_Pool 192.168.0.161 - 192.168.0.174

    NAT (inside) 0-list of access inside_outbound_nat0_acl

    Sysopt connection permit VPN

    Crypto ipsec transform-set ESP-DES-SHA esp - esp-sha-hmac

    Crypto ipsec transform-set ESP-DES-MD5 esp - esp-md5-hmac

    Dynamic crypto map outside_dyn_map 20 match address outside_cryptomap_dyn_20

    Crypto-map dynamic outside_dyn_map 20 the transform-set ESP-DES-MD5 value

    outside_map 20 ipsec-isakmp crypto map

    card crypto outside_map 20 match address outside_cryptomap_20

    card crypto outside_map 20 peers set 205.x.29.41

    outside_map crypto 20 card value transform-set ESP-DES-SHA

    map outside_map 65535-isakmp ipsec crypto dynamic outside_dyn_map

    client authentication card crypto outside_map LOCAL

    outside_map interface card crypto outside

    ISAKMP allows outside

    ISAKMP key address 205.x.29.41 netmask 255.255.255.255 No.-xauth-config-mode no.

    ISAKMP nat-traversal 180

    part of pre authentication ISAKMP policy 20

    encryption of ISAKMP policy 20

    ISAKMP policy 20 md5 hash

    20 2 ISAKMP policy group

    ISAKMP duration strategy of life 20 86400

    part of pre authentication ISAKMP policy 40

    encryption of ISAKMP policy 40

    ISAKMP policy 40 sha hash

    40 2 ISAKMP policy group

    ISAKMP duration strategy of life 40 86400

    vpngroup address pool DHCP_Pool GHA_Remote

    vpngroup dns 192.168.0.11 server GHA_Remote

    vpngroup wins 192.168.0.11 GHA_Remote-Server

    vpngroup GHA_Remote by default-field x.org

    vpngroup split tunnel Remote_splitTunnelAcl GHA_Remote

    vpngroup idle 1800 GHA_Remote-time

    vpngroup password KEY GHA_Remote

    I guess what I really wonder is if someone can convert the version of site to site of this VPN ASA 8.2 config so I can compare it to what I have. I need to have this, so I can just fall into place and work.

    Also, it does appear that political isakmp 40 are used, correct?

    On your ASA in Setup mode, simply type vpnsetup steps for remote access ipsec or vpnsetup site - not and it lists what it takes or you can download the PIX of the ASA migration tool.

  • Cisco VPN Client and Windows XP VPN Client IPSec to ASA

    I configured ASA for IPSec VPN via Cisco VPN Client and XP VPN client communications. I can connect successfully with Cisco VPN Client, but I get an error when connecting with the XP client. Debugging said "misconfigured groups and transport/tunneling mode" I know, they use different methods of transport and tunneling, and I think that I have configured both. Take a look at the config.

    PS a funny thing - when I connect with client VPN in Windows Server 2003, I have no error. The only difference is that client XP is behind an ADSL router and client server is directly connected to the Internet on one of its public IP of interfaces. NAT in the case of XP can cause problems?

    Config is:

    !

    interface GigabitEthernet0/2.30

    Description remote access

    VLAN 30

    nameif remote access

    security-level 0

    IP 85.*. *. 1 255.255.255.0

    !

    access-list 110 scope ip allow a whole

    NAT list extended access permit tcp any host 10.254.17.10 eq ssh

    NAT list extended access permit tcp any host 10.254.17.26 eq ssh

    access-list extended ip allowed any one sheep

    access list nat-ganja extended permit tcp any host 10.254.17.18 eq ssh

    sheep-vpn access-list extended permits all ip 192.168.121.0 255.255.255.0

    tunnel of splitting allowed access list standard 192.168.121.0 255.255.255.0

    flow-export destination inside-Bct 192.168.1.27 9996

    IP local pool raccess 192.168.121.60 - 192.168.121.120 mask 255.255.255.0

    ARP timeout 14400

    global (outside-Baku) 1 interface

    global (outside-Ganja) interface 2

    NAT (inside-Bct) 0 access-list sheep-vpn

    NAT (inside-Bct) 1 access list nat

    NAT (inside-Bct) 2-nat-ganja access list

    Access-group rdp on interface outside-Ganja

    !

    Access remote 0.0.0.0 0.0.0.0 85.*. *. 1 2

    Route outside Baku 10.254.17.24 255.255.255.248 10.254.17.10 1

    Route outside Baku 192.1.1.0 255.255.255.0 10.254.17.10 1

    Outside-Baku route 192.168.39.0 255.255.255.0 10.254.17.10 1

    Route outside-Ganja 192.168.45.0 255.255.255.0 10.254.17.18 1

    Route outside-Ganja 192.168.69.0 255.255.255.0 10.254.17.18 1

    Route outside-Ganja 192.168.184.0 255.255.255.0 10.254.17.18 1

    Route outside Baku 192.168.208.16 255.255.255.240 10.254.17.10 1

    Route outside-Ganja 192.168.208.112 255.255.255.240 10.254.17.18 1

    dynamic-access-policy-registration DfltAccessPolicy

    Crypto ipsec transform-set esp-3des esp-md5-hmac RIGHT

    Crypto ipsec transform-set newset aes - esp esp-md5-hmac

    Crypto ipsec transform-set esp-3des esp-md5-hmac vpnclienttrans

    Crypto ipsec transform-set vpnclienttrans transport mode

    Crypto ipsec transform-set esp-3des esp-md5-hmac raccess

    life crypto ipsec security association seconds 214748364

    Crypto ipsec kilobytes of life security-association 214748364

    raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map

    vpnclientmap 30 card crypto ipsec-isakmp dynamic dyn1

    card crypto interface for remote access vpnclientmap

    crypto isakmp identity address

    ISAKMP crypto enable vpntest

    ISAKMP crypto enable outside-Baku

    ISAKMP crypto enable outside-Ganja

    crypto ISAKMP enable remote access

    ISAKMP crypto enable Interior-Bct

    crypto ISAKMP policy 30

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    No encryption isakmp nat-traversal

    No vpn-addr-assign aaa

    Telnet timeout 5

    SSH 192.168.1.0 255.255.255.192 outside Baku

    SSH 10.254.17.26 255.255.255.255 outside Baku

    SSH 10.254.17.18 255.255.255.255 outside Baku

    SSH 10.254.17.10 255.255.255.255 outside Baku

    SSH 10.254.17.26 255.255.255.255 outside-Ganja

    SSH 10.254.17.18 255.255.255.255 outside-Ganja

    SSH 10.254.17.10 255.255.255.255 outside-Ganja

    SSH 192.168.1.0 255.255.255.192 Interior-Bct

    internal vpn group policy

    attributes of vpn group policy

    value of DNS-server 192.168.1.3

    Protocol-tunnel-VPN IPSec l2tp ipsec

    Split-tunnel-policy tunnelspecified

    Split-tunnel-network-list value split tunnel

    BCT.AZ value by default-field

    attributes global-tunnel-group DefaultRAGroup

    raccess address pool

    Group-RADIUS authentication server

    Group Policy - by default-vpn

    IPSec-attributes tunnel-group DefaultRAGroup

    pre-shared-key *.

    Hello

    For the Cisco VPN client, you would need a tunnel-group name configured on the ASA with a pre-shared key.

    Please see configuration below:

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a00805734ae.shtml

    or

    http://tinyurl.com/5t67hd

    Please see the section of tunnel-group config of the SAA.

    There is a tunnel-group called "rtptacvpn" and a pre-shared key associated with it. This group name is used by the VPN Client Group name.

    So, you would need a specific tunnel-group name configured with a pre-shared key and use it on the Cisco VPN Client.

    Secondly, because you are behind a router ADSL, I'm sure that's configured for NAT. can you please activate NAT - T on your ASA.

    "crypto isakmp nat-traversal.

    Thirdly, change the transformation of the value

    raccess 1 set transform-set vpnclienttrans crypto dyn1 dynamic-map

    Let me know the result.

    Thank you

    Gilbert

  • NAT VPN tunnel and still access Internet traffic

    Hello

    Thank you in advance for any help you can provide.

    I have a server with the IP 192.168.1.9 that needs to access a subnet remote from 192.168.50.0/24, through the Internet.  However, before the server can access the remote subnet, the server IP must be NAT'ed to 10.1.0.1 because the VPN gateway remote (which is not under my control) allows access to other customers who have the same subnet address that we do on our local network.

    We have a 2801 Cisco (running c2801-advsecurityk9 - mz.124 - 15.T9.bin) set up to make the NAT.  It is the only gateway on our network.

    I have configured the Cisco 2801 with the following statements of NAT and the relevant access lists:

    access-list 106 allow host ip 192.168.1.9 192.168.50.0 0.0.0.255

    NAT extended IP access list
    refuse the host ip 192.168.1.9 192.168.50.0 0.0.0.255
    deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
    ip permit 192.168.1.0 0.0.0.255 any

    route allowed ISP 10 map
    corresponds to the IP NAT

    IP nat EMDVPN 10.1.0.1 pool 10.1.0.1 netmask 255.255.255.0
    IP nat inside source list 106 pool EMDVPN
    IP nat inside source map route ISP interface FastEthernet0/1 overload

    When the server (192.168.1.9) attempts to ping on the subnet of 192.168.50.0/24 devices, the VPN tunnel is established successfully.  However, after that, the server is no longer able to access the Internet because the NAT translation for 192.168.1.9 has changed since the external IP address of the router (FastEthernet0/1) at 10.1.0.1.

    The documentation I've seen on the site of Cisco says that this type of Setup allows only host subnet communication.  Internet access is not possible.  However, maybe I missed something, or one of you experts can help me.  Is it possible to configure the NAT router traffic destined to the VPN tunnel and still access the Internet by using the dynamic NAT on FastEthernet0/1?

    Once again, thank you for any help you can give.

    Alex

    Hello

    Rather than use a pool for NAT

    192.168.1.9 - 10.1.0.1 > 192.168.50.x

    ACL 102 permit ip 192.168.1.9 host 192.168.50.0 0.0.0.255

    RM-STATIC-NAT route map permit 10
    corresponds to the IP 102

    IP nat inside source static 192.168.1.9 10.1.0.1 card expandable RM-STATIC-NAT route

    ACL 101 deny host ip 192.168.1.9 192.168.50.0 0.0.0.255
    ACL 101 by ip 192.168.1.0 0.0.0.255 any
    overload of IP nat inside source list 101 interface FastEthernet0/1

    VPN access list will use the source as 10.1.0.1... *.

    Let me know if it works.

    Concerning

    M

  • VPN client and contradictory static NAT entries

    Hello, we have a VPN IPSEC implemented on a router for remote access. It works very well, for the most part. We have also a few PAT static entries to allow access to a web server, etc. from the outside. We deny NATting from the range of IP addresses for the range of VPN client and it works except for entries that also have PAT configurations.

    So, for example, we have web server 10.0.0.1 and a PAT redirection port 10.0.0.1: 80 to the IP WAN port 80. If a VPN client tries to connect to 10.0.0.1: 80, the syn - ack packet back to the customer WAN IP VPN on the router! If the VPN client connects to the RDP server 10.0.0.2:3389, it works very well that this server is not a static entry PAT.

    Is there a way to get around this?

    Thank you!

    There is a way to get around, use the same settings you have for your dynamic nat in your nat staitc entries, something like this:

    Currently, it should show as:

    IP nat inside source static XXXXX XXXX 80 80

    you need to take it

    IP nat inside source static 80 XXXX XXXX 80 map route AAAA

    When your itinerary map YYY refers to something with an acl that you refuse traffic from inside your router for the pool of vpn

    IP Access-list ext nonat

    deny ip 10.0.0.0 0.0.0.255

    Licensing ip 10.0.0.0 0.0.0.255 any

    route allowed AAAA 10 map

    match ip address sheep

    You even need all the static PAT

    HTH

    Ivan

  • Client VPN gets incorrect SPI size Pix

    Try to get a customer VPN connected with a pix515e. PIX is 6.3 (3) running. Customer is 4.0.4 we get same errors of dial-up, cable modems, etc.

    The connection drops just during the negotiation. We thought it might be something MTU, but have you tried each MTU under the Sun, and the error remains the same for all connections regardless of MTU.

    I have attached the config of the pix, the log of the VPN client and the pix debugging messages.

    Thanks for any help someone can provide...

    your proposal of IKE on the PIX is the following:

    part of pre authentication ISAKMP policy 20

    ISAKMP policy 20 aes-256 encryption

    ISAKMP policy 20 chopping sha

    20 5 ISAKMP policy group

    But this (http://www.cisco.com/univercd/cc/td/doc/product/vpn/client/rel4_0/admin_gd/vcach6.htm#1157757) shows that the VPN client does not support this proposal. Change your group to 2, and then try again. 5 Diffie-Hellman group is supported only when you use digital certificates, which you're not.

  • VPN client behind ok asa pix but no asa

    Hi all

    I was faced with a newly installed asa5505 couple. We can use the vpnclient in devices, but not behind another asa. Behind the asa same we can vpn for previous installations of pix. But when we go to other asa installs, we get the regular creation of translation failed for protocol 50.

    We have activated, isakmp, nat-traversal, udp 4500 and udp 10000. If the fault is at the other end, even if the error shows in this end?

    Anyone who is willing to help me with this?

    see you soon / Peter

    You do not allow protocol 50 - ESP through the firewall. The remote end VPN are trying to create a VPN in mode 'Hand' is not "Aggressive" mode as VPN clients.

    Add the below and test again: -.

    permit for outside_access_in to access extensive list of 6 esp a whole line

    HTH.

  • Client VPN Cisco and Cisco Secure

    Cisco VPN client and the VPN from Cisco Secure client free to use with pix firewall software?

    Thank you.

    Hello

    If you have a valid contract to Cisco and you can get the following link:

    http://www.Cisco.com/Kobayashi/SW-Center/SW-VPN.shtml

    with your CCO login, then you should be able to use these customers at no cost because they are already covered by the contract.

    Thank you and best regards,

    Abdelouahed

    -=-=-

  • The remote VPN Clients and Internet access

    I apologize in advance if this question has already been addressed. I am currently using a PIX Firewall Version 6.1 520 (2) running. I have several remote users that VPN for the PIX. Once the VPN tunnel is started, they are more able to connect to internet from their local computers. Is there a configuation on the PIX that allows remote users to have access to the internet when you are connected to the PIX.

    TIA,

    Jeff Gulick

    The Pix does not allow traffic enter and exit on the same interface. Therefore, a VPN user cannot access the Internet through the tunnel. If you use the Cisco client, enable tunneling split so that all traffic through the tunnel.

    If you use PPTP, you can turn off the option that makes the remote network, the default gateway. However, local routes should be added to these clients when they connect.

    Or you can use an additional interface on the firewall. One that puts an end to VPN tunnels and another providing for Internet connectivity. In this way the traffic is not enter/leave on the same interface.

    Of course, it is preferable if the customer Internet traffic does not go through the tunnel. It wastes your bandwidth and has security problems as well. I suggest you use the client to Cisco and the split tunneling.

  • Router VPN 3005 and 7500

    Hi all

    Could you someboy help me on that?

    I have a network like this:

    Internet Internet

    | |

    router VPN - 3005

    |

    Internal

    I can set up Lan to Lan VPN 3005 and other PIX aside, but I can't ping internal network with the back of my internal network. I've already put the static route to the subnet of setbacks in the router and my subnet route internal VPN. What should I do? Thanks in advance.

    Banlan

    in fact the 3000 can do a ping will depend on your network-lists / lists access so that my not be a relevant question.

Maybe you are looking for