<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 3020 - same interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306717#M950688</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as traffic routing and filtering is ok, then you should find no problems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 28 Jul 2009 20:09:17 GMT</pubDate>
    <dc:creator>Ivan Martinon</dc:creator>
    <dc:date>2009-07-28T20:09:17Z</dc:date>
    <item>
      <title>Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306716#M950687</link>
      <description>&lt;P&gt;I have 2 interfaces active - public and private IPs. Clients connect to the public IP address.&lt;/P&gt;&lt;P&gt;Does anyone know when you're connected using the VPN client, if you can send traffic immediately back out the public interface to a server on the same subnet as the 3020? I am using a IP pool that gets assigned to the clients on the private interface side as they pass through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306716#M950687</guid>
      <dc:creator>myounger</dc:creator>
      <dc:date>2020-02-21T11:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306717#M950688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as traffic routing and filtering is ok, then you should find no problems.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jul 2009 20:09:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306717#M950688</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-07-28T20:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306718#M950689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Routing of all local networks are added . But what do you mean by filtering.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 05:26:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306718#M950689</guid>
      <dc:creator>arpita_barman</dc:creator>
      <dc:date>2009-07-29T05:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306719#M950690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In WebVPN configuration filtering option is'inherit'.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 05:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306719#M950690</guid>
      <dc:creator>arpita_barman</dc:creator>
      <dc:date>2009-07-29T05:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306720#M950692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are not using webvpn are you? since you wrote VPN client I gather it is the cisco vpn client correct? what I mean is that the concentrator has filters bound to the interfaces, private public and external check those filters and what rules do those filters have to find out whether the traffic from those clients are allowed. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:20:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306720#M950692</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-07-29T13:20:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306721#M950693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No filters are defined or applied. The VPN client traffic seems to be getting lost in the 3020. Can the 3020 decrypt a packet and then send it back out the same interface on which the encrypted packet arrived?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306721#M950693</guid>
      <dc:creator>myounger</dc:creator>
      <dc:date>2009-07-29T13:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306722#M950695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have to say yes, it can since the concentrator can be defined as a hub for vpn traffic, in here I will ask you a question. Do the devices on the "outside" meaning on the public side of the concentrator know how to reach the vpn client? In other words do these devices have a route back to the concetrator to reach the vpn client's pool?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:39:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306722#M950695</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-07-29T13:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306723#M950696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes...the server has a route back to the VPN client pool, with the next hop for that network pool being the 3020 public IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 13:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306723#M950696</guid>
      <dc:creator>myounger</dc:creator>
      <dc:date>2009-07-29T13:57:47Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 3020 - same interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306724#M950697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can go ahead and create a filter with IP traffic and debug over that filter to check if packets are sent out and received back, as well you might want to check if there is any chance that a vpn tunnel might be catching this traffic instead.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Jul 2009 14:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-3020-same-interface/m-p/1306724#M950697</guid>
      <dc:creator>Ivan Martinon</dc:creator>
      <dc:date>2009-07-29T14:07:51Z</dc:date>
    </item>
  </channel>
</rss>

