<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access LAN behind PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388385#M554733</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have posted my configs. If you can take a look when you have a minute that would be great.&lt;/P&gt;&lt;P&gt;Note, i am using the PDM and have little knowledge of a PIX command line (but learning slowly)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Nov 2004 18:23:08 GMT</pubDate>
    <dc:creator>vanagon2tdi</dc:creator>
    <dc:date>2004-11-22T18:23:08Z</dc:date>
    <item>
      <title>Access LAN behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388381#M554721</link>
      <description>&lt;P&gt;I am trying to allow remote access to the LAN sitting behind my PIX.  I am using the Cisco VPN client and have maaged to get authenticated, but I am unable to see the LAN (10.254.254.0/24) behind it.  Any clues as to what I am missing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I am trying to allow SSH through the PIX to a router sitting behind it.  I created a sub interface on the router with a public address, and made sure the PIX was not NAT&amp;#146;ing it.  I also created an access list rule that would allow SSH from my IP to the public one sitting behind the PIX.  I do not get any connectivity.  Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:45:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388381#M554721</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2020-02-21T07:45:22Z</dc:date>
    </item>
    <item>
      <title>Re: Access LAN behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388382#M554724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your config pls, here's a example for you to compare with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.10.0 255.255.255.0 10.0.6.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.0.10.0 255.255.255.0 10.0.6.0 255.255.255.128 &lt;/P&gt;&lt;P&gt;ip local pool RASPool 10.0.6.1-10.0.6.100 &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat &lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpn_users esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set vpn_users &lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap &lt;/P&gt;&lt;P&gt;crypto map mymap interface outside &lt;/P&gt;&lt;P&gt;isakmp enable outside &lt;/P&gt;&lt;P&gt;isakmp identity address &lt;/P&gt;&lt;P&gt;isakmp nat-traversal &lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share &lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des &lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5 &lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2 &lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400 &lt;/P&gt;&lt;P&gt;vpngroup vpnras address-pool RASPool &lt;/P&gt;&lt;P&gt;vpngroup vpnras dns-server &lt;YOUR_DNS_SERVER_IP&gt; &lt;/YOUR_DNS_SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnras wins-server &lt;YOUR_WIN_SERVER_IP&gt; &lt;/YOUR_WIN_SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnras default-domain &lt;YOUR_DEFAULT_DOMAIN_NAME&gt; &lt;/YOUR_DEFAULT_DOMAIN_NAME&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnras idle-time 1800 &lt;/P&gt;&lt;P&gt;vpngroup vpnras password &lt;VPNGROUP_PASSWORD&gt; &lt;/VPNGROUP_PASSWORD&gt;&lt;/P&gt;&lt;P&gt;vpngroup vpnras split-tunnel 100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above crypto access-list mask (255.255.255.128) will provide 100 ip addresses for the vpn users, you can increase this to suite your needs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 16:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388382#M554724</guid>
      <dc:creator>jmia</dc:creator>
      <dc:date>2004-11-18T16:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Access LAN behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388383#M554728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you are not able to connect to the LAN after connecting to the VPN , there might be a couple of issuses :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) routing inside the PIX . in case this network is not directly connected to pix inside, make sure you route it to the appropriate layer 3 switch.. make sure the reverse route to the IP pool is available on the switch and the layer 3 switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) in case the IP pool is in a different network other than your PIX inside network, you need to nonat the traffic. make sure you do this right, with the source as your local network (10.254.254.0/24) and destination as the IP pool.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg: IP pool - 10.1.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.254.254.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) In case you have inside access-lists on the PIX, make sure you allow 10.254.254.0 to communicate with the IP pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best.. rate all replies if found useful...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 13:35:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388383#M554728</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-11-22T13:35:41Z</dc:date>
    </item>
    <item>
      <title>Re: Access LAN behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388384#M554730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;below is a copy of my config.  Can you see what i may be missing.&lt;/P&gt;&lt;P&gt;On the inside router 10.254.254.1 i have a route saying to get to 192.168.10.0 goto 10.1.1.101 and no access-lists&lt;/P&gt;&lt;P&gt;When i connect with my Cisco VPN client i get connected and see traffic going out but none coming in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl permit ip any 192.168.10.0 255.255.255.128&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_dyn_40 permit ip any 192.168.10.0 255.255.255.128&lt;/P&gt;&lt;P&gt;ip address inside 10.1.1.101 255.255.255.252&lt;/P&gt;&lt;P&gt;ip local pool Cisco Dave-192.168.10.100 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;pdm location 192.168.10.0 255.255.255.128 outside&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;sysopt connection permit-l2tp&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_MD5 mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map_1 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map_1 40 match address outside_cryptomap_dyn_40&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map_1 40 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 match address outside_cryptomap_20&lt;/P&gt;&lt;P&gt;crypto map outside_map 20 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map_1&lt;/P&gt;&lt;P&gt;crypto map outside_map client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication rsa-sig&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;isakmp policy 40 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 40 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 40 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 40 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 40 lifetime 86400&lt;/P&gt;&lt;P&gt;ssh 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 18:18:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388384#M554730</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2004-11-22T18:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access LAN behind PIX</title>
      <link>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388385#M554733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have posted my configs. If you can take a look when you have a minute that would be great.&lt;/P&gt;&lt;P&gt;Note, i am using the PDM and have little knowledge of a PIX command line (but learning slowly)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Nov 2004 18:23:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-lan-behind-pix/m-p/388385#M554733</guid>
      <dc:creator>vanagon2tdi</dc:creator>
      <dc:date>2004-11-22T18:23:08Z</dc:date>
    </item>
  </channel>
</rss>

