<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to restrict some VPN clients accessing some tcp port inside PIX525? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314294#M1059504</link>
    <description>&lt;P&gt;I have a PIX 525 configured as a firewall with VPN function, but these two lines didn't work:&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 eq 10001 host 172.16.5.23&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 host 172.16.5.23 eq 10001 &lt;/P&gt;&lt;P&gt;but the line :&lt;/P&gt;&lt;P&gt;access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23&lt;/P&gt;&lt;P&gt;can work. I'm confused,and can you help me? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the pix configured as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;enable password ......&lt;/P&gt;&lt;P&gt;passwd .......&lt;/P&gt;&lt;P&gt;hostname pixwall&lt;/P&gt;&lt;P&gt;domain-name cispix.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.11.0 255.255.255.0 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 eq 10001 host 172.16.5.23&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 host 172.16.5.23 eq 10001 &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.12.0 255.255.255.0 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 192.168.0.0 255.255.0.0 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip ....&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu intf2 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside *.*.*.* 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.11.* 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address intf2&lt;/P&gt;&lt;P&gt;no ip address intf3&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip local pool zhpl 172.16.5.23&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address intf2&lt;/P&gt;&lt;P&gt;no failover ip address intf3&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm location 1.1.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 ......&lt;/P&gt;&lt;P&gt;global (outside) 1 ......&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.11.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) ......&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (inside,outside) ......&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-group 120 in interface outside&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;route outside ... ...&lt;/P&gt;&lt;P&gt;route inside 192.168.12.0 255.255.255.0 192.168.11.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 20 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map newmap 20 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map newmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 1.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp keepalive 50&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 100&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup zh01 address-pool zhpl&lt;/P&gt;&lt;P&gt;vpngroup zh01 dns-server ......&lt;/P&gt;&lt;P&gt;vpngroup zh01 split-tunnel 100&lt;/P&gt;&lt;P&gt;vpngroup zh01 idle-time 18000&lt;/P&gt;&lt;P&gt;vpngroup zh01 secure-unit-authentication&lt;/P&gt;&lt;P&gt;vpngroup zh01 password ********&lt;/P&gt;&lt;P&gt;telnet 172.16.5.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 40&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:52:59 GMT</pubDate>
    <dc:creator>jennies_cisco</dc:creator>
    <dc:date>2020-02-21T07:52:59Z</dc:date>
    <item>
      <title>How to restrict some VPN clients accessing some tcp port inside PIX525?</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314294#M1059504</link>
      <description>&lt;P&gt;I have a PIX 525 configured as a firewall with VPN function, but these two lines didn't work:&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 eq 10001 host 172.16.5.23&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 host 172.16.5.23 eq 10001 &lt;/P&gt;&lt;P&gt;but the line :&lt;/P&gt;&lt;P&gt;access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23&lt;/P&gt;&lt;P&gt;can work. I'm confused,and can you help me? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the pix configured as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;enable password ......&lt;/P&gt;&lt;P&gt;passwd .......&lt;/P&gt;&lt;P&gt;hostname pixwall&lt;/P&gt;&lt;P&gt;domain-name cispix.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.11.0 255.255.255.0 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 eq 10001 host 172.16.5.23&lt;/P&gt;&lt;P&gt;access-list 100 deny tcp 192.168.12.0 255.255.255.0 host 172.16.5.23 eq 10001 &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.12.0 255.255.255.0 172.16.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 110 permit ip 192.168.0.0 255.255.0.0 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 120 permit ip ....&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu intf2 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside *.*.*.* 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.11.* 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address intf2&lt;/P&gt;&lt;P&gt;no ip address intf3&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;ip local pool zhpl 172.16.5.23&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address intf2&lt;/P&gt;&lt;P&gt;no failover ip address intf3&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm location 1.1.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 ......&lt;/P&gt;&lt;P&gt;global (outside) 1 ......&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.11.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) ......&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;static (inside,outside) ......&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;access-group 120 in interface outside&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;route outside ... ...&lt;/P&gt;&lt;P&gt;route inside 192.168.12.0 255.255.255.0 192.168.11.10 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.11.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 20 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map newmap 20 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map newmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp key ******** address 1.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp keepalive 50&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 100&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup zh01 address-pool zhpl&lt;/P&gt;&lt;P&gt;vpngroup zh01 dns-server ......&lt;/P&gt;&lt;P&gt;vpngroup zh01 split-tunnel 100&lt;/P&gt;&lt;P&gt;vpngroup zh01 idle-time 18000&lt;/P&gt;&lt;P&gt;vpngroup zh01 secure-unit-authentication&lt;/P&gt;&lt;P&gt;vpngroup zh01 password ********&lt;/P&gt;&lt;P&gt;telnet 172.16.5.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;telnet 192.168.0.0 255.255.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 40&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:52:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314294#M1059504</guid>
      <dc:creator>jennies_cisco</dc:creator>
      <dc:date>2020-02-21T07:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict some VPN clients accessing some tcp port ins</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314295#M1059506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello jenies,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;seems to be a bit strange. try to put a syslog server or any sniffer application and see what exactly happens when you connect on 10001 port on 192.168.12.0 segment.  is telnet on 10001 port happening if you dont have the 4th  line ? ie &lt;/P&gt;&lt;P&gt;access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23  ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can also do a local logging,instead of putting a syslog and see if the access-list is really doing anything to drop packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Jan 2005 11:04:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314295#M1059506</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2005-01-24T11:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict some VPN clients accessing some tcp port ins</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314296#M1059508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The fourth line "access-list 100 deny ip 192.168.12.0 255.255.255.0 host 172.16.5.23 " deleted, I use the command "netstat -an" in the client host 172.16.5.23,and I can found the TCP connection established at the port 10001.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Jan 2005 05:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314296#M1059508</guid>
      <dc:creator>jennies_cisco</dc:creator>
      <dc:date>2005-01-25T05:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict some VPN clients accessing some tcp port ins</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314297#M1059512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, the problem is that in this config acl 100 is used to define the vpn-domain ('vpngroup zh01 split-tunnel 100') and can therefore not contain port definitions (ie: "permit/deny ip" is ok, "permit/deny tcp eq x" is not).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can resolve this by doing the following 2 things:&lt;/P&gt;&lt;P&gt;1. Remove the 'sysopt connection permit-ipsec' line as it creates a 'permit ip any any' rule for all tunneled (ipsec) traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Add the required policy to the interface the vpn is terminated on (in this case: outside). Don't forget to use the vpn-pool as source addresses:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 120 permit ip 172.16.5.0 255.255.255.0 192.168.11.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list 120 deny tcp host 172.16.5.23 192.168.12.0 255.255.255.0 eq 10001 &lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Mar 2006 10:46:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314297#M1059512</guid>
      <dc:creator>JOOST HAGE</dc:creator>
      <dc:date>2006-03-20T10:46:19Z</dc:date>
    </item>
    <item>
      <title>Re: How to restrict some VPN clients accessing some tcp port ins</title>
      <link>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314298#M1059514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you,it's OK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Mar 2006 01:21:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-restrict-some-vpn-clients-accessing-some-tcp-port-inside/m-p/314298#M1059514</guid>
      <dc:creator>jennies_cisco</dc:creator>
      <dc:date>2006-03-21T01:21:18Z</dc:date>
    </item>
  </channel>
</rss>

