<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble restricting client VPN access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784225#M1004141</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's only permit-vpn in 7.1 and 7.2. He's running 7.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And his original post was attempting to access the inside server, not trying to access the client from the server, that's why I assumed he didn't have to worry about the inside acl. Good pickup though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2007 14:33:57 GMT</pubDate>
    <dc:creator>acomiskey</dc:creator>
    <dc:date>2007-05-24T14:33:57Z</dc:date>
    <item>
      <title>Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784215#M1004131</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to restrict a VPN client so that it can only access one device behind our firewall. I have implemented the following commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool SCS_Nant_Pool 10.10.99.1 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group SCS_Nant_Support type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group SCS_Nant_Support general-attributes&lt;/P&gt;&lt;P&gt; address-pool SCS_Nant_Pool&lt;/P&gt;&lt;P&gt;tunnel-group SCS_Nant_Support ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *******&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 host 10.10.99.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 128.6.100.112 is the device I want sole access of. When I connect I receive IP address 10.10.99.1 OK but cannot ping or connect to 128.6.100.112. If I use a different tunnel group I can access everything fine. Command for the working group are&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool Vpn-Pool 128.7.0.1-128.7.0.100 mask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group ras type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group ras general-attributes&lt;/P&gt;&lt;P&gt; address-pool Vpn-Pool&lt;/P&gt;&lt;P&gt;tunnel-group ras ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip LOCAL_NET 255.255.0.0 CSG_WAN 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip LOCAL_NET 255.255.0.0 host ICCHOST &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip LOCAL_NET 255.255.0.0 10.0.0.0 255.252.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 CSG_WAN 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 10.0.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat remark nat 0 for remote vpn users&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 128.7.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 10.1.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used this method before on firewalls running 6.3 without issue but this firewall (running v7) is not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784215#M1004131</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2019-03-11T10:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784216#M1004132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The subnet mask/network is wrong here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 10.0.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should be 10.0.0.0 255.0.0.0 or 10.10.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or change this one to 10.10.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 10.1.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please rate if it helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 12:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784216#M1004132</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T12:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784217#M1004133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply. I removed that line completely as it doesn't relate to anything I'm doing but it's made no difference. I've attached my config if it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 13:36:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784217#M1004133</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-24T13:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784218#M1004134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In what you originally posted you had no statement in your nat0 acl for the traffic in question, 128.6.100.112 to 10.10.0.0. I posted the statement to add to correct the issue. It appears you have added the following instead which is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host TALENT_SERVER host 10.10.99.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should have done the trick.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 13:48:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784218#M1004134</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T13:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784219#M1004135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont think I worded my original request very well, sorry for that. The config I sent is what is currently running on the Pix but I'm not getting any access.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:01:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784219#M1004135</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-24T14:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784220#M1004136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any logs on the ASA when you are trying the connection? It appears your split tunnel policy should tunnel all or tunnel your local lan so that should be ok. Nat exemption is ok, acl's aren't a problem. Make sure there is no other route to 10.10.0.0 other than ASA. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784220#M1004136</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T14:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784221#M1004137</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you punched a hole in the ACL bound to the inside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784221#M1004137</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-24T14:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784222#M1004138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;^^ sysopt conn permit-ipsec takes care of that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:22:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784222#M1004138</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T14:22:50Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784223#M1004139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only comments I've added are those listed at the beginning of my first post. However, my colleague (god bless him) may have. I think he tried to sort this out himself before enlisting my help (without any knowledge of Pix's). Alas I cannot contact him at the moment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:24:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784223#M1004139</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-24T14:24:11Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784224#M1004140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It takes care of the vpn traffic coming into the outside interface but it doesn't help the traffic initiated from the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And your command doesn't apply to 7.x code. Its sysopt connection permit-vpn now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:28:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784224#M1004140</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-24T14:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784225#M1004141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's only permit-vpn in 7.1 and 7.2. He's running 7.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And his original post was attempting to access the inside server, not trying to access the client from the server, that's why I assumed he didn't have to worry about the inside acl. Good pickup though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784225#M1004141</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784226#M1004142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;addressing the inside ACL will restrict the traffic however you want to look at it whether its client to server or server to client. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good catch on the 7.0 version&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:43:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784226#M1004142</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-24T14:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784227#M1004143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree, I assumed it was client to server from the above...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"cannot ping or connect to 128.6.100.112"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 14:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784227#M1004143</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-24T14:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784228#M1004144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is client to server (i.e. I'm sat at the client machine with VPN connected trying to ping 128.6.100.112 on the remote network - and failing).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 07:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784228#M1004144</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-25T07:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784229#M1004145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list nonat extended permit ip host 128.6.100.112 host 10.10.99.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 15:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784229#M1004145</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-25T15:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784230#M1004146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Palomoj,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you are correct but he already has added&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host TALENT_SERVER host 10.10.99.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldn't that work as well?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 15:09:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784230#M1004146</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-25T15:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784231#M1004147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I forgot about that entry. I don't see an outbound ACL hole for these two hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_out extended permit tcp host TALENT_SERVER host 10.10.99.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2007 15:14:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784231#M1004147</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-25T15:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784232#M1004148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all your help. I took your advice and added the line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_out extended permit ip host TALENT_SERVER host 10.10.99.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and all is working fine now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 08:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784232#M1004148</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2007-05-31T08:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784233#M1004149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;palomoj, I still don't get why this worked as he was initiating traffic from the remote end. The sysopt command would allow this traffic back out without the need for the acl right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 18:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784233#M1004149</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-05-31T18:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble restricting client VPN access</title>
      <link>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784234#M1004150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The sysopt will permit the remote client vpn traffic to terminate and enter the outside interface without an outside ACL explicitly or implicitly permitting the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside ACL was denying the return (and initiating) traffic from the inside host to the remote VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 May 2007 19:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-restricting-client-vpn-access/m-p/784234#M1004150</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2007-05-31T19:09:03Z</dc:date>
    </item>
  </channel>
</rss>

