<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help Please!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107522#M395755</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have split tunnel configured, then just add the side 2 LAN in the split tunnel ACL.&lt;/P&gt;&lt;P&gt;Also, add the NAT exemption from side 2 LAN towards the VPN Client pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it doesn't work, and pls share your FW configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Nov 2012 02:07:36 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-11-13T02:07:36Z</dc:date>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107520#M395750</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please consider the attached diagram.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- There is no direct connection to side 2 from PC-1.&lt;/P&gt;&lt;P&gt;- There is an MPLS link between side1 &amp;amp; side 2, and both local networks can access each other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question:&lt;/P&gt;&lt;P&gt;Can I acess 10.0.1.0/24 network (side 2) through side 1, as I can access FW1 using VPN client?&lt;/P&gt;&lt;P&gt;If that possible, what configuration should I do?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help is appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:21:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107520#M395750</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2019-03-12T00:21:57Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107521#M395752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/6/4/112467-Untitled.jpg" class="jive-image" /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Nov 2012 06:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107521#M395752</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2012-11-12T06:47:52Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107522#M395755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have split tunnel configured, then just add the side 2 LAN in the split tunnel ACL.&lt;/P&gt;&lt;P&gt;Also, add the NAT exemption from side 2 LAN towards the VPN Client pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it doesn't work, and pls share your FW configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2012 02:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107522#M395755</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-13T02:07:36Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107523#M395758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jennifer for your helpful response as usual.&lt;/P&gt;&lt;P&gt;So, the config will be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list NEW-Split-List standard permit 10.0.1.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ip local pool NEW_POOL 192.168.18.1-192.168.18.15 mask 255.255.255.240&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;group-policy NEW internal&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;group-policy NEW attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; vpn-tunnel-protocol IPSec&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; split-tunnel-policy tunnelspecified&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; split-tunnel-network-list value NEW-Split-List&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; address-pools value NEW_POOL&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;tunnel-group NEW-TUNNEL type remote-access&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tunnel-group NEW-TUNNEL general-attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; default-group-policy NEW&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;tunnel-group NEW-TUNNEL ipsec-attributes&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; pre-shared-key *&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Now; do I need to allow those IPs ( in th pool ) in the FW2-side2 or it is allowed by default?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 05:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107523#M395758</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2012-11-14T05:24:14Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107524#M395760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will also need to configure NAT exemption on FW1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, on FW2, depending on the security levels, you would also need to configure NAT exemption as well as access-list on the interface to allow the traffic through. Plus assuming that FW2 has default route towards the MPLS link?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 05:37:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107524#M395760</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-14T05:37:18Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107525#M395762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yea that makes sense to me.&lt;/P&gt;&lt;P&gt;On FW1; we have default route to the internet, but I'll configure static route for side2 network twards mpls link. Am I right?&lt;/P&gt;&lt;P&gt;On FW2: either it will be the same case as FW1 or all the trafic will be routed twards mpls link.&lt;/P&gt;&lt;P&gt;I'm working on the mpls link with the serive provider and it may come up by tomorrow. I'll definitely get back to you with the results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate your help Jennifer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 05:52:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107525#M395762</guid>
      <dc:creator>omer_babiker</dc:creator>
      <dc:date>2012-11-14T05:52:09Z</dc:date>
    </item>
    <item>
      <title>Help Please!!</title>
      <link>https://community.cisco.com/t5/network-security/help-please/m-p/2107526#M395764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, on FW1 you would need to configure static route for side 2 network towards mpls link.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On FW2, if all traffic is routed towards the mpls link, then you don't need to worry about routing. You just have to configure NAT exemption for traffic destined towards the vpn pool, and ACL accordingly.&lt;/P&gt;&lt;P&gt;If internet traffic is routed via local ISP, and only traffic destined towards FW1 is routed via the MPLS link then you would also need to add route for the vpn pool to route via the MPLS link towards FW1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Nov 2012 05:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-please/m-p/2107526#M395764</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-11-14T05:58:51Z</dc:date>
    </item>
  </channel>
</rss>

