<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN client access-list problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-client-access-list-problem/m-p/395411#M1059634</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've resolved... I didn't see this "FEATURE":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipsec pl-compatible&lt;/P&gt;&lt;P&gt;	&lt;/P&gt;&lt;P&gt;Enable IPSec packets to bypass the PIX Firewall unit's NAT and ASA features and allows incoming IPSec packets to terminate on the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it works...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Antonello&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 20 Nov 2004 15:23:37 GMT</pubDate>
    <dc:creator>antonello.i</dc:creator>
    <dc:date>2004-11-20T15:23:37Z</dc:date>
    <item>
      <title>VPN client access-list problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-access-list-problem/m-p/395410#M1059630</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In my company I've a cisco pix 515 running 6.3(4), i've three interface but&lt;/P&gt;&lt;P&gt;i'm using only two of them.&lt;/P&gt;&lt;P&gt;On the inside network card I've two vlan, one for the inside networks (wks and internal&lt;/P&gt;&lt;P&gt;server) and one for dmz (mail, web... servers). The outside card is a "point to point" with&lt;/P&gt;&lt;P&gt;my border router.&lt;/P&gt;&lt;P&gt;From outside address to another firewall I've configured a normal ipsec tunnel and everything&lt;/P&gt;&lt;P&gt;works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm introducing a vpn client service with cisco Vpn Client (ver. 4.x).&lt;/P&gt;&lt;P&gt;As radius I've a Windows Internet Authentication Service (IAS) on the internal network that&lt;/P&gt;&lt;P&gt;guarantees access to authenticated users.&lt;/P&gt;&lt;P&gt;After authentication the pix receives from the radius (via Cisco-Av-Pair attribute acl=xxxx) the access-list name to assign to the client users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything seems to work fine: users authentication works -&amp;gt; client cisco receives split-tunnel rules from pix -&amp;gt; pix receives acl name from radius.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THE PROBLEM IS: the access-list I've assigned to the client don't match any packet and the client&lt;/P&gt;&lt;P&gt;can go on everything ip on my inside networks (compatibly with split-tunnel rules) !!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried to put a "deny ip any any" on the inside network but it doesn't work, packets pass however...&lt;/P&gt;&lt;P&gt;I've a nat 0 on the inside interface, but the policies are corrects.&lt;/P&gt;&lt;P&gt;Seems like that the pix considers only the split-tunnels rules and not the access-list, also&lt;/P&gt;&lt;P&gt;I've tried to specify a fake access-list in the cisco-av-pair attibute but I've reported&lt;/P&gt;&lt;P&gt;the same results... packets passes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've a similar configuration on another fw that runs 6.3(1) versions, on this pix everything works!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance and sorry for my bad english.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Antonello I.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:45:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-access-list-problem/m-p/395410#M1059630</guid>
      <dc:creator>antonello.i</dc:creator>
      <dc:date>2020-02-21T07:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: VPN client access-list problem</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-access-list-problem/m-p/395411#M1059634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've resolved... I didn't see this "FEATURE":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ipsec pl-compatible&lt;/P&gt;&lt;P&gt;	&lt;/P&gt;&lt;P&gt;Enable IPSec packets to bypass the PIX Firewall unit's NAT and ASA features and allows incoming IPSec packets to terminate on the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now it works...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Antonello&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 20 Nov 2004 15:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-access-list-problem/m-p/395411#M1059634</guid>
      <dc:creator>antonello.i</dc:creator>
      <dc:date>2004-11-20T15:23:37Z</dc:date>
    </item>
  </channel>
</rss>

