<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN connection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229832#M876927</link>
    <description>&lt;P&gt;I am able to access remote access vpn.After logging vpn connection,I am unable to access inside the nework.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:45:19 GMT</pubDate>
    <dc:creator>CSCO10320953</dc:creator>
    <dc:date>2019-03-11T14:45:19Z</dc:date>
    <item>
      <title>VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229832#M876927</link>
      <description>&lt;P&gt;I am able to access remote access vpn.After logging vpn connection,I am unable to access inside the nework.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229832#M876927</guid>
      <dc:creator>CSCO10320953</dc:creator>
      <dc:date>2019-03-11T14:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229833#M876930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Post your routing and access-list + NAT&lt;/P&gt;&lt;P&gt;Vlad&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 13:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229833#M876930</guid>
      <dc:creator>hunnetvl01</dc:creator>
      <dc:date>2009-02-03T13:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229834#M876933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is split tunneling enabled on the firewall?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 16:15:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229834#M876933</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-02-03T16:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229835#M876936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;maybe it's NAT exepltion issue. maybe you need to add NAT 0 command...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 22:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229835#M876936</guid>
      <dc:creator>rjaaouan</dc:creator>
      <dc:date>2009-02-03T22:41:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229836#M876938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248 &lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description Internet&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address x.x.x.x 255.255.255.248 &lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.x.x 255.x.x.0 &lt;/P&gt;&lt;P&gt;access-list Inside_mpc remark Trafiic for CSC Scan&lt;/P&gt;&lt;P&gt;access-list Inside_mpc extended permit tcp object-group DM_INLINE_NETWORK_1 any eq www &lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit ip any any log critical &lt;/P&gt;&lt;P&gt;access-list outacc extended permit icmp any any log critical &lt;/P&gt;&lt;P&gt;access-list outacc extended permit object-group DM_INLINE_SERVICE_6 any any log critical &lt;/P&gt;&lt;P&gt;access-list Inside_mpc_2 extended permit tcp object-group DM_INLINE_NETWORK_2 any eq www &lt;/P&gt;&lt;P&gt;access-list Cisco_splitTunnelAcl standard permit x.x.x.x 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit x.x.x.x  255.255.255.248 x.x.x.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit x.x.x.x 255.255.255.248 220.220.220.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip any x.x.x.x 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip any x.x.x.x 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list Inside_mpc_3 remark csc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list aba_splitTunnelAcl standard permit x.x.x.x 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list management_splitTunnelAcl standard permit x.x.x.x 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list Outside_access_in remark For vpn connection&lt;/P&gt;&lt;P&gt;access-list Outside_access_in extended permit object-group DM_INLINE_SERVICE_7 any any log notifications &lt;/P&gt;&lt;P&gt;ip local pool abavpnpool x.x.x.x-x.x.x.x mask 255.255.252.0&lt;/P&gt;&lt;P&gt;ip local pool testpool x.x.x.x-x.x.x.x mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (Outside) 1 x.x.x.x&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list Inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outacc in interface Outside&lt;/P&gt;&lt;P&gt;access-group Inside_access_in_1 in interface Inside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 x.x.x.x &lt;/P&gt;&lt;P&gt;route Inside x.x.x.x 255.255.252.0 x.x.x.x 1&lt;/P&gt;&lt;P&gt; vpn-group-policy abavpn&lt;/P&gt;&lt;P&gt;tunnel-group abavpn type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group abavpn general-attributes&lt;/P&gt;&lt;P&gt; address-pool abavpnpool&lt;/P&gt;&lt;P&gt; default-group-policy abavpn&lt;/P&gt;&lt;P&gt;tunnel-group abavpn ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;tunnel-group test type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group test general-attributes&lt;/P&gt;&lt;P&gt; address-pool testpool&lt;/P&gt;&lt;P&gt; default-group-policy test&lt;/P&gt;&lt;P&gt;tunnel-group test ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-ke&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Feb 2009 05:29:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229836#M876938</guid>
      <dc:creator>CSCO10320953</dc:creator>
      <dc:date>2009-02-04T05:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN connection</title>
      <link>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229837#M876941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that you need to define a group-policy that will use the defined split tunnel. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy test internal&lt;/P&gt;&lt;P&gt;group-policy test attributes&lt;/P&gt;&lt;P&gt; dns-server value x.x.x.x&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value Cisco_splitTunnelAcl &lt;/P&gt;&lt;P&gt; default-domain value xxx.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Feb 2009 16:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-connection/m-p/1229837#M876941</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2009-02-04T16:14:01Z</dc:date>
    </item>
  </channel>
</rss>

