<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split tunneling in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414946#M1055594</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the overlapping needs to be fixed first. and these two commands should be applied as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Dec 2005 02:37:31 GMT</pubDate>
    <dc:creator>jackko</dc:creator>
    <dc:date>2005-12-09T02:37:31Z</dc:date>
    <item>
      <title>Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414940#M1055582</link>
      <description>&lt;P&gt;Currently, i am using PIX 501and VPN 3000. At first, my vpn client cannot access the internet once they logged in via Cisco system vpn client and so i enable split tunneling. Now the clients are able to access the internet but cannot access the internal server. does anyone knows what went wrong. Pls Help...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414940#M1055582</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2020-02-21T08:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414941#M1055583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;please post the entire config with public ip masked.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 07:06:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414941#M1055583</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-08T07:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414942#M1055586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;enable password ********** encrypted&lt;/P&gt;&lt;P&gt;passwd ********** encrypted&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;domain-name aqswdefrgt.com.sg&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 255.255.255.0 192.168.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.142 eq smtp&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.142 eq pop3&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq smtp&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq pop3&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq www&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq smtp&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq pop3&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.152 eq www&lt;/P&gt;&lt;P&gt;access-list nat permit tcp any host 65.165.123.143 eq https&lt;/P&gt;&lt;P&gt;access-list nat permit icmp any any&lt;/P&gt;&lt;P&gt;ip address outside 65.165.123.4 255.255.255.240&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip local pool clientpool 192.168.1.40-192.168.1.49&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.142 smtp 192.168.1.56 smtp netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.142 pop3 192.168.1.56 pop3 netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 smtp 192.168.1.55 smtp netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 pop3 192.168.1.55 pop3 netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 www 192.168.1.55 www netmask 255.255.255&lt;/P&gt;&lt;P&gt;.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 smtp 192.168.1.76 smtp netmask 255.255.&lt;/P&gt;&lt;P&gt;255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 pop3 192.168.1.76 pop3 netmask 255.255.&lt;/P&gt;&lt;P&gt;255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.152 www 192.168.1.76 www netmask 255.255.25&lt;/P&gt;&lt;P&gt;5.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 65.165.123.143 https 192.168.1.55 https netmask 255.255&lt;/P&gt;&lt;P&gt;.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group nat in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 65.165.123.1 1&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;aaa-server plexus protocol radius&lt;/P&gt;&lt;P&gt;aaa-server plexus (inside) host 192.168.1.55 ******** timeout 5&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map cisco 1 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map dyn-map 20 ipsec-isakmp dynamic cisco&lt;/P&gt;&lt;P&gt;crypto map dyn-map client authentication plexus&lt;/P&gt;&lt;P&gt;crypto map dyn-map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 40 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 40 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 40 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 40 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 40 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 address-pool clientpool&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 dns-server 192.168.1.55&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 wins-server 192.168.1.55&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 default-domain aqswdefrgt.com.sg&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup vpn3000 password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 08:46:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414942#M1055586</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2005-12-08T08:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414943#M1055587</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Due to the limited characters for each message, i can only post the partial configure. But all these are the most important part.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 08:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414943#M1055587</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2005-12-08T08:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414944#M1055590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;one critical thing is that the vpn client pool should not be overlapped with the pix inside net.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 09:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414944#M1055590</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-08T09:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414945#M1055593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had already take note of that. Beside that what else went wrong?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2005 01:14:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414945#M1055593</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2005-12-09T01:14:00Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414946#M1055594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the overlapping needs to be fixed first. and these two commands should be applied as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2005 02:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414946#M1055594</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-12-09T02:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunneling</title>
      <link>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414947#M1055595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the infor. i will try it out later.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Dec 2005 03:03:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/split-tunneling/m-p/414947#M1055595</guid>
      <dc:creator>aqswdefrgt</dc:creator>
      <dc:date>2005-12-09T03:03:50Z</dc:date>
    </item>
  </channel>
</rss>

