<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Hairpinning Remote Access Connections in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008202#M916406</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah apologies, i shall give that a go in the morning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help so far&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Jul 2008 22:35:51 GMT</pubDate>
    <dc:creator>exonetinf1nity</dc:creator>
    <dc:date>2008-07-23T22:35:51Z</dc:date>
    <item>
      <title>Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008191#M916374</link>
      <description>&lt;P&gt;Greetings like many people we connect to our customers via either permanent vpn connectivity or via locking down management access to our external company ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure the ASA 5510 so that i can connect to it using the cisco vpn client from any location and then connect to customers network which are in turn locked down to only permit connections from our external network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At present i am having to connect to one of our internal servers and use it as a jump of point to connect to customer networks when im off site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:40:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008191#M916374</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2019-03-26T00:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008192#M916375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;include all needed networks in the split-tunneling ACL&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 05:37:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008192#M916375</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-21T05:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008193#M916376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply, i have tried adding said networks to the split tunnel list but am unable to connect to the customer networks via there outside management address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 21:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008193#M916376</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2008-07-21T21:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008194#M916377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, its possible.. I have alreay set up this for here but i want to know which FW is using by customer becoz I had make it on ASA which was installed on other location. Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 21:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008194#M916377</guid>
      <dc:creator>nikuhappy2010</dc:creator>
      <dc:date>2008-07-21T21:59:40Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008195#M916380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We'd have to see the config. Make sure you have something like...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (outside) 1 &lt;VPN.CLIENT.SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/VPN.CLIENT.SUBNET&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 22:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008195#M916380</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-07-21T22:00:26Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008196#M916381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using an ASA 5510 with 8.0.3(19) code, customer sites use a mix of ASA's, 2800's, 3800's etc for edge connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 22:04:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008196#M916381</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2008-07-21T22:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008197#M916384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cheers, i currently have the same-security-traffic permit intra-interface statement in place, please find the relevant config below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address ***.***.***.*** 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.997&lt;/P&gt;&lt;P&gt; vlan 997&lt;/P&gt;&lt;P&gt; nameif demo&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.27.255.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1.998&lt;/P&gt;&lt;P&gt; vlan 998&lt;/P&gt;&lt;P&gt; nameif guest&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; ip address 172.30.255.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif access&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.29.255.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif voice&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.28.255.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.255.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;access-list ITTelco_SpliTunnel remark ****** Split Tunnel Encrypted Traffic ******&lt;/P&gt;&lt;P&gt;access-list ITTelco_SpliTunnel standard permit 172.29.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list exempt_nat0_outbound extended permit ip 172.24.0.0 255.248.0.0 172.24.0.0 255.248.0.0 &lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu demo 1500&lt;/P&gt;&lt;P&gt;mtu guest 1500&lt;/P&gt;&lt;P&gt;mtu access 1500&lt;/P&gt;&lt;P&gt;mtu voice 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-60360.bin&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (outside) 2 guestoutbound&lt;/P&gt;&lt;P&gt;nat (demo) 0 access-list exempt_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (guest) 2 172.30.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (access) 0 access-list exempt_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (access) 1 172.29.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (voice) 0 access-list exempt_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (voice) 1 172.28.255.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 ***.***.***.*** 1&lt;/P&gt;&lt;P&gt;route demo 172.26.255.0 255.255.255.0 172.27.255.2 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect im im_Block&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt; match protocol msn-im yahoo-im &lt;/P&gt;&lt;P&gt;  drop-connection log&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect skinny  &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect sip  &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect http &lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;  inspect icmp error &lt;/P&gt;&lt;P&gt;  inspect pptp &lt;/P&gt;&lt;P&gt;  inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;  inspect im im_Block &lt;/P&gt;&lt;P&gt;policy-map serv-pol-outbound&lt;/P&gt;&lt;P&gt; class csc-scan-class&lt;/P&gt;&lt;P&gt;  csc fail-open&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:xxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;it-fw-5510# &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 Jul 2008 22:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008197#M916384</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2008-07-21T22:09:42Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008198#M916390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list ITTelco_SpliTunnel standard permit 172.24.0.0 255.248.0.0&lt;/P&gt;&lt;P&gt;no access-list ITTelco_SpliTunnel standard permit 172.29.255.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2008 05:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008198#M916390</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-22T05:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008199#M916394</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply, the above allows me to connect to all networks inside the firewall but doesn't allow me to connect via the vpn client then back out to a customers external IP address as per the attached image.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2008 21:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008199#M916394</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2008-07-22T21:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008200#M916398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;See my previous post. You have no "nat (outside)" command.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2008 22:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008200#M916398</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-07-22T22:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008201#M916402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do as Adam Comiskey said&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and in this case you should disable split tunneling. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 06:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008201#M916402</guid>
      <dc:creator>a.alekseev</dc:creator>
      <dc:date>2008-07-23T06:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008202#M916406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah apologies, i shall give that a go in the morning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help so far&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jul 2008 22:35:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008202#M916406</guid>
      <dc:creator>exonetinf1nity</dc:creator>
      <dc:date>2008-07-23T22:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008203#M916411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did anyone figure out how to do this, I am having same problem (need to be able to vpn in to office then make connections out to internet via the ip space of the remote office, for security reasons).&lt;/P&gt;&lt;P&gt;I am using a PIX501&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 19:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008203#M916411</guid>
      <dc:creator>jsdeprey</dc:creator>
      <dc:date>2008-09-16T19:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: Hairpinning Remote Access Connections</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008204#M916417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't be done with a pix 501 or any pix running version 6 code.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Sep 2008 21:18:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning-remote-access-connections/m-p/1008204#M916417</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-09-16T21:18:51Z</dc:date>
    </item>
  </channel>
</rss>

