04-16-2007 12:23 PM - edited 02-21-2020 01:29 AM
I have a PIX 515 with 3 interfaces (inside,outsize,dmz)
When connecting using the Cisco Client VPN, I can access the inside no problem, however, I cannot access anything on the DMZ. I added the NAT 0 ACL line to include DMZ_network and the VPN_CLIENT_POOL network. I also added the split-tunnel respectively with no success. Any clues what to check? I connect to the PIX w/ the client and try to ping an IP and looking at the NAT 0 ACL, I don't see any hits on that line.
Solved! Go to Solution.
04-16-2007 12:37 PM
You cannot just add the acl line to the existing nat exemption acl because the nat statement is nat ("inside") 0, not DMZ. The best thing to do is to create a second acl for the dmz nat exemption
access-list dmz_nat0_outbound permit ip
nat (DMZ) 0 access-list dmz_nat0_outbound
04-16-2007 12:37 PM
You cannot just add the acl line to the existing nat exemption acl because the nat statement is nat ("inside") 0, not DMZ. The best thing to do is to create a second acl for the dmz nat exemption
access-list dmz_nat0_outbound permit ip
nat (DMZ) 0 access-list dmz_nat0_outbound
04-16-2007 12:52 PM
DOH! You're right. I sat there for like 20-30 minutes knowing I was overlooking something and as soon as I read "nat('inside') it clicked! Thank you!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide