<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-access/m-p/1055199#M894426</link>
    <description>&lt;P&gt;Redoing our network to remove the .1 subnet and replace it with a .12 subnet.  I can successfully authenticate from home, but I am unable to connect to any of the .12 boxes on the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's snippets of my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.12.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.10.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.2.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.11.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.11.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 103 remark IP Access for 10 range&lt;/P&gt;&lt;P&gt;access-list 103 permit ip host 192.168.10.1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.3&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.253 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool ippool 192.168.2.1-192.168.2.200&lt;/P&gt;&lt;P&gt;ip local pool remoteuser 192.168.2.201-192.168.2.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.5.0 255.255.255.0 192.168.1.210 1&lt;/P&gt;&lt;P&gt;route inside 192.168.6.0 255.255.255.0 192.168.1.210 1&lt;/P&gt;&lt;P&gt;route inside 192.168.9.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.11.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.12.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup new address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup new dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup new split-tunnel 101&lt;/P&gt;&lt;P&gt;vpngroup new idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup new password ********&lt;/P&gt;&lt;P&gt;vpngroup rjordan address-pool remoteuser&lt;/P&gt;&lt;P&gt;vpngroup rjordan dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup rjordan split-tunnel 102&lt;/P&gt;&lt;P&gt;vpngroup rjordan idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup rjordan password ********&lt;/P&gt;&lt;P&gt;vpngroup tenrange address-pool remoteuser&lt;/P&gt;&lt;P&gt;vpngroup tenrange dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup tenrange split-tunnel 103&lt;/P&gt;&lt;P&gt;vpngroup tenrange idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup tenrange password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:03:46 GMT</pubDate>
    <dc:creator>townofnewmarket</dc:creator>
    <dc:date>2019-03-11T14:03:46Z</dc:date>
    <item>
      <title>VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access/m-p/1055199#M894426</link>
      <description>&lt;P&gt;Redoing our network to remove the .1 subnet and replace it with a .12 subnet.  I can successfully authenticate from home, but I am unable to connect to any of the .12 boxes on the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's snippets of my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.3(1)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.12.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.10.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.2.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.11.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 102 permit ip 192.168.11.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list 103 remark IP Access for 10 range&lt;/P&gt;&lt;P&gt;access-list 103 permit ip host 192.168.10.1 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.3&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.253 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool ippool 192.168.2.1-192.168.2.200&lt;/P&gt;&lt;P&gt;ip local pool remoteuser 192.168.2.201-192.168.2.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.5.0 255.255.255.0 192.168.1.210 1&lt;/P&gt;&lt;P&gt;route inside 192.168.6.0 255.255.255.0 192.168.1.210 1&lt;/P&gt;&lt;P&gt;route inside 192.168.9.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.10.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.11.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.12.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vpngroup new address-pool ippool&lt;/P&gt;&lt;P&gt;vpngroup new dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup new split-tunnel 101&lt;/P&gt;&lt;P&gt;vpngroup new idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup new password ********&lt;/P&gt;&lt;P&gt;vpngroup rjordan address-pool remoteuser&lt;/P&gt;&lt;P&gt;vpngroup rjordan dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup rjordan split-tunnel 102&lt;/P&gt;&lt;P&gt;vpngroup rjordan idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup rjordan password ********&lt;/P&gt;&lt;P&gt;vpngroup tenrange address-pool remoteuser&lt;/P&gt;&lt;P&gt;vpngroup tenrange dns-server 192.168.1.4&lt;/P&gt;&lt;P&gt;vpngroup tenrange split-tunnel 103&lt;/P&gt;&lt;P&gt;vpngroup tenrange idle-time 1800&lt;/P&gt;&lt;P&gt;vpngroup tenrange password ********&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access/m-p/1055199#M894426</guid>
      <dc:creator>townofnewmarket</dc:creator>
      <dc:date>2019-03-11T14:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Access</title>
      <link>https://community.cisco.com/t5/network-security/vpn-access/m-p/1055200#M894427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you connecting to VPNGroup new or a different one. If you are connecting the "new" group and not able to access the 192.168.12.0 subnet, make sure that you bypass NAT for VPN Client Traffic. Include this below access-list and do the testing again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.12.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arul&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;*Pls rate if it helps*&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Oct 2008 23:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-access/m-p/1055200#M894427</guid>
      <dc:creator>ajagadee</dc:creator>
      <dc:date>2008-10-27T23:25:25Z</dc:date>
    </item>
  </channel>
</rss>

