<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote access to server behind Pix firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617341#M497721</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Turn on split tunneling.  This should solve your problem.  Create an ACL with the network/host you want to tunnel.  Everthing else will not be tunneled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support split-tunnel Access_List_Name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Chad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleae rate if this helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 07 Sep 2006 17:20:58 GMT</pubDate>
    <dc:creator>cpembleton</dc:creator>
    <dc:date>2006-09-07T17:20:58Z</dc:date>
    <item>
      <title>Remote access to server behind Pix firewall</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617340#M497720</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to give a remote support company access to a server behind our firewall. This company currently access 2 of our servers already by using public IP addresses which map to the servers private IPs. Unfortunately we have no public IPs left to do this again so need to think of another solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I set them up with VPN client s/w and added the follwing commands to the firewall &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 10.10.253.253 Metalogic_Support_Host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool Metalogic_Pool 10.10.253.253-10.10.253.253 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support address-pool Metalogic_Pool &lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support default-domain ***WITHHELD*** &lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support password ***WITHHELD***&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_mdc_inside_nat0 permit ip host Server1 host Metalogic_Support_Host&lt;/P&gt;&lt;P&gt;access-list acl_mdc_inside_nat0 permit ip host Server2 host Metalogic_Support_Host&lt;/P&gt;&lt;P&gt;access-list acl_mdc_inside_nat0 permit ip host Server3 host Metalogic_Support_Host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This worked fine apart from disconnecting them from their LAN which causes problems for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way of keeping them connected to their LAN whilst the VPN connection is active and if not is there another way of me giving them access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a Cisco Pix 515e running s/w version 6.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help will be greatly appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617340#M497720</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2020-02-21T09:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access to server behind Pix firewall</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617341#M497721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Turn on split tunneling.  This should solve your problem.  Create an ACL with the network/host you want to tunnel.  Everthing else will not be tunneled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup Metalogic_Support split-tunnel Access_List_Name&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;Chad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleae rate if this helps!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Sep 2006 17:20:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617341#M497721</guid>
      <dc:creator>cpembleton</dc:creator>
      <dc:date>2006-09-07T17:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access to server behind Pix firewall</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617342#M497722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply Chad. When you say 'Create an ACL with the network/host you want to tunnel' do you mean the network that they are accessing remotely or the LAN on which they sit? Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2006 13:29:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617342#M497722</guid>
      <dc:creator>Rex Biesty</dc:creator>
      <dc:date>2006-09-11T13:29:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access to server behind Pix firewall</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617343#M497723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;An ACL for the networks on your side of the tunnel.  Networks in the ACL will be routed over the VPN.  Anything not in the ACL will go out the VPN clients normal interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helps!  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Sep 2006 15:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-to-server-behind-pix-firewall/m-p/617343#M497723</guid>
      <dc:creator>cpembleton</dc:creator>
      <dc:date>2006-09-11T15:38:33Z</dc:date>
    </item>
  </channel>
</rss>

