<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vpn client can access internet but cannot access internal ne in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419300#M1055580</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the command "vpngroup vpn3000 split-tunnel 100" seems missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also it's worth to apply these two commands as well "isakmp identity address" and "isakmp nat-traversal 20".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Dec 2005 22:15:38 GMT</pubDate>
    <dc:creator>jackko</dc:creator>
    <dc:date>2005-12-21T22:15:38Z</dc:date>
    <item>
      <title>Vpn client can access internet but cannot access internal network</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419297#M1055574</link>
      <description>&lt;P&gt;I am using PIX 501 to setup a VPN. At first the VPN client cannot access the internet once they logged in via the Cisco system vpn client, so i enable split tunneling. Now the VPN client can access the internet but they can't access the internal network.Due to the limited characters can be posted here, only necessary IOS coding is posted on the next message. Who knows how to solve this problem? Pls Help.....&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419297#M1055574</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2020-02-21T08:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn client can access internet but cannot access internal ne</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419298#M1055577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;enable password ********** encrypted &lt;/P&gt;&lt;P&gt;passwd ********** encrypted &lt;/P&gt;&lt;P&gt;hostname Firewall &lt;/P&gt;&lt;P&gt;domain-name aqswdefrgt.com.sg &lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 255.255.255.0 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.142 eq smtp &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.142 eq pop3 &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq smtp &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq pop3 &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq www &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq smtp &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq pop3 &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq www &lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq https &lt;/P&gt;&lt;P&gt;access-list nat permit icmp any any &lt;/P&gt;&lt;P&gt;ip address outside 65.165.123.4 255.255.255.240 &lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside &lt;/P&gt;&lt;P&gt;ip local pool clientpool 192.168.50.1-192.168.50.50&lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100 &lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.142 smtp 192.168.1.56 smtp netmask 255.255.2 &lt;/P&gt;&lt;P&gt;55.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.142 pop3 192.168.1.56 pop3 netmask 255.255.2 &lt;/P&gt;&lt;P&gt;55.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 smtp 192.168.1.55 smtp netmask 255.255.2 &lt;/P&gt;&lt;P&gt;55.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 pop3 192.168.1.55 pop3 netmask 255.255.2 &lt;/P&gt;&lt;P&gt;55.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 www 192.168.1.55 www netmask 255.255.255 &lt;/P&gt;&lt;P&gt;.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 smtp 192.168.1.76 smtp netmask 255.255. &lt;/P&gt;&lt;P&gt;255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 pop3 192.168.1.76 pop3 netmask 255.255. &lt;/P&gt;&lt;P&gt;255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 www 192.168.1.76 www netmask 255.255.25 &lt;/P&gt;&lt;P&gt;5.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 https 192.168.1.55 https netmask 255.255 &lt;/P&gt;&lt;P&gt;.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-group nat in interface outside &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.165.123.1 1 &lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local &lt;/P&gt;&lt;P&gt;aaa-server plexus protocol radius &lt;/P&gt;&lt;P&gt;aaa-server plexus (inside) host 192.168.1.55 ******** timeout 5 &lt;/P&gt;&lt;P&gt;http server enable &lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;no snmp-server location &lt;/P&gt;&lt;P&gt;no snmp-server contact &lt;/P&gt;&lt;P&gt;snmp-server community public &lt;/P&gt;&lt;P&gt;no snmp-server enable traps &lt;/P&gt;&lt;P&gt;floodguard enable &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set transform-set myset &lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco &lt;/P&gt;&lt;P&gt;crypto map dyn-map client authentication plexus &lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0 &lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des &lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400 &lt;/P&gt;&lt;P&gt;isakmp policy 40 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 40 encryption 3des &lt;/P&gt;&lt;P&gt;isakmp policy 40 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 40 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 40 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool clientpool &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server 192.168.1.55 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 wins-server 192.168.1.55 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain aqswdefrgt.com.sg &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ******** &lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside &lt;/P&gt;&lt;P&gt;telnet timeout 5 &lt;/P&gt;&lt;P&gt;ssh timeout 5 &lt;/P&gt;&lt;P&gt;console timeout 0 &lt;/P&gt;&lt;P&gt;terminal width 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2005 01:36:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419298#M1055577</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2005-12-09T01:36:09Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn client can access internet but cannot access internal ne</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419299#M1055578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add these lines and it should work then as these lines are for encrypting the traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 192.168.1.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 match address 110&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2005 11:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419299#M1055578</guid>
      <dc:creator>zkalwar123</dc:creator>
      <dc:date>2005-12-21T11:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Vpn client can access internet but cannot access internal ne</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419300#M1055580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the command "vpngroup vpn3000 split-tunnel 100" seems missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also it's worth to apply these two commands as well "isakmp identity address" and "isakmp nat-traversal 20".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2005 22:15:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-can-access-internet-but-cannot-access-internal/m-p/419300#M1055580</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-21T22:15:38Z</dc:date>
    </item>
  </channel>
</rss>

