<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vpngroups to access different network segments in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478123#M1057104</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jackko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went with your suggestion and it works but not ideal in our situation. I need finer control so it seems Jarle's comments are more suitable to my environment.&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Jul 2005 10:31:44 GMT</pubDate>
    <dc:creator>ewong0088</dc:creator>
    <dc:date>2005-07-21T10:31:44Z</dc:date>
    <item>
      <title>vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478118#M1057032</link>
      <description>&lt;P&gt;Hi there, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX515E with 6.3(4) and a vpngroup running on it. This vpngroup is allowed to connect to one of our internal networks only and has been runing great. Now, I need to create another vpngroup so that this second group not only can connect to the same network as group one, but in addition, this group2 needs to be able to connect to additional networks. I just don't know how to handle the nat 0 statement for the second group. (all authentications are thru radius, not included). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my set up(some irrelevant info excluded): &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Access List 1 &lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.150.0 255.255.255.0 192.168.140.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool vpool 192.168.140.1-192.168.140.254 &lt;/P&gt;&lt;P&gt;ip local pool vpool-two 192.168.130.1-192.168.130.254 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//Access List 2 &lt;/P&gt;&lt;P&gt;access-list vnonat2 permit ip 192.168.150.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vnonat2 permit ip 192.168.160.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vnonat2 permit ip 192.168.170.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vnonat2 permit ip 192.168.180.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list vnonat2 permit ip 192.168.190.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list vpnnonat &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//IPSec group 1 configuration for VPN client &lt;/P&gt;&lt;P&gt;vpngroup vpn-one address-pool vpool &lt;/P&gt;&lt;P&gt;vpngroup vpn-one dns-server x.x.x.x &lt;/P&gt;&lt;P&gt;vpngroup vpn-one default-domain xxx.com &lt;/P&gt;&lt;P&gt;vpngroup vpn-one split-tunnel vpnnonat &lt;/P&gt;&lt;P&gt;vpngroup vpn-one idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpn-one password xxxxxxx &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;//IPSEC group 2 &lt;/P&gt;&lt;P&gt;vpngroup vpn-two address-pool vpool-two &lt;/P&gt;&lt;P&gt;vpngroup vpn-two dns-server x.x.x.x &lt;/P&gt;&lt;P&gt;vpngroup vpn-two default-domain xxx.com &lt;/P&gt;&lt;P&gt;vpngroup vpn-two split-tunnel vnonat2 &lt;/P&gt;&lt;P&gt;vpngroup vpn-two idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpn-two password xxxxxxx &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I am having is that I can&amp;#146;t do nat(inside) 0 access-list TWICE. &lt;/P&gt;&lt;P&gt;The working config uses: nat (inside) 0 access-list vpnnonat for Group 1 &lt;/P&gt;&lt;P&gt;How about group 2? When i let it go as is for testing, i.e. with one NAT 0 statement, it allows me to connect and got a correct IP which was 192.168.130.1. Beyond that I seem to stuck. After a few connections, my VPN clients would not connect anymore. It just died. (log said no response from peer). After an hour or so, I can connect again. Sounded like PIX is confused as who is going where and clear itslef out after awhile. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help or pointer is greatly appreciated. Again, &lt;/P&gt;&lt;P&gt;all I want to do is to allow 2 different VPN groups to access to our network. Group 1 is limited to 192.168.150 network and Group 2 can connect to 150, 160,170,180 networks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:16:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478118#M1057032</guid>
      <dc:creator>ewong0088</dc:creator>
      <dc:date>2020-02-21T08:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478119#M1057057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;add the following to the existing access-l vpnnonat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.150.0 255.255.255.0 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.160.0 255.255.255.0 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.170.0 255.255.255.0 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.180.0 255.255.255.0 192.168.130.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpnnonat permit ip 192.168.190.0 255.255.255.0 192.168.130.0 255.255.255.0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jul 2005 00:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478119#M1057057</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-07-19T00:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478120#M1057071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i was just wondering how you go with the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2005 04:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478120#M1057071</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-07-21T04:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478121#M1057085</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are using one Global NONAT access-list wich permit all internal ip to the vpn client pool addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To Control the VPN Users access, we are using different spilt tunnel access-list for the different VPN groups.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We even use the same IP Pool for all vpn groups.... Bit this is not mandatory at all (This is even not always useful, if you use access-list on routers behind your pix, as extra security)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An example config could look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NONAT permit ip any 172.28.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;ip local pool VPN-CISCO 172.18.254.1-172.18.254.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 address-pool VPN-CISCO&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 dns-server 192.168.1.10&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 wins-server 192.168.1.20&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 default-domain corp.local&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 split-tunnel VPN-VPNUSERS1&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 split-dns corp.local&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 authentication-server RADIUS&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS1 password ***********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 address-pool VPN-CISCO&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 default-domain corp.local&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 split-tunnel VPN-VPNUSERS2&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 authentication-server RADIUS&lt;/P&gt;&lt;P&gt;vpngroup VPNUSERS2 password ***********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPN-VPNUSERS1 remark ### VPN-Client-Traffic Users 1 ###############################&lt;/P&gt;&lt;P&gt;access-list VPN-VPNUSERS1 permit ip 192.168.0.0 255.255.0.0 172.18.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list VPN-VPNUSERS2 remark ### VPN-Client-Traffic Users 2 ###############################&lt;/P&gt;&lt;P&gt;access-list VPN-VPNUSERS2 permit ip host 192.168.1.10 172.18.254.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list VPN-VPNUSERS2 permit ip host 192.168.1.20 172.18.254.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are always placing the ip local pool for the VPN Clients in a separate subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope This helps you &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jarle Steffensen&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2005 07:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478121#M1057085</guid>
      <dc:creator>jsteffensen</dc:creator>
      <dc:date>2005-07-21T07:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478122#M1057096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the info. It seems your example is what I need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2005 10:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478122#M1057096</guid>
      <dc:creator>ewong0088</dc:creator>
      <dc:date>2005-07-21T10:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478123#M1057104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jackko,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went with your suggestion and it works but not ideal in our situation. I need finer control so it seems Jarle's comments are more suitable to my environment.&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jul 2005 10:31:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478123#M1057104</guid>
      <dc:creator>ewong0088</dc:creator>
      <dc:date>2005-07-21T10:31:44Z</dc:date>
    </item>
    <item>
      <title>Re: vpngroups to access different network segments</title>
      <link>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478124#M1057109</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it's good to hear that you've got the right info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please let me give you one more advice. in the near furture you may need a separate group simply for security reason. e.g. group 1 has access to server 1 whereas group 2 has access to server 2 only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in fact, you may restrict the remote vpn access further by disabling the command "sysopt connection permit-ipsec". nonetheless, for now keep it simple.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Jul 2005 03:34:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpngroups-to-access-different-network-segments/m-p/478124#M1057109</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2005-07-26T03:34:58Z</dc:date>
    </item>
  </channel>
</rss>

