07-31-2005 04:54 AM - edited 02-21-2020 01:53 PM
Hi,
We are unable to access or ping the LAN when connected to VPN. I have checked the Allow LAN access in the cisco vpn client. the subnet of our local LAN is 10.x.x.x. Any help on this issue will be greatly appreciated.
07-31-2005 10:51 PM
hi there
can u throw some more lite on ur connectivity setup and also post u r configs related to both the sides which will be helpful to analyse the problem which ur facing currently at present..
As u mentioned which LAN ur unable to ping remote end or your local lan ?
regds
08-01-2005 01:51 AM
Hello,
If it is local lan be sure that it is also set on VPN concentrator for relevant VPN group under Client Config in Split Tunneling policy following is set:
Tunnel everything, check "Allow the networks in list to bypass the tunnel", in Split tunneling network list choose "VPN Client Local LAN (default).
Regards,
D.
08-01-2005 09:10 AM
I am using a PIX 525 firewall where the VPN is terminated. split tunneling is not configured on the firewall. Is it necessary to configure split tunneling on the firewall in order for the communication between the LOCAL LAN Systems at the branch network. The IPs thrown by the VPN server belong to 10.243.6.0 network and the local LAN at the branch has a 10.0.0.0 network. i am able to access all the resources through the VPN client on the remote network. Please help.....................
Regards
Nahas
Regards
Nahas
08-01-2005 09:00 AM
My branch that is running vpn client has 10.0.0.0 network. I am connecting to the HO and able to access all the resources. The ip thrown to the vpn client is 10.243.6.0 network. The HO has the following networks 10.11.11.0, 10.11.2.0, 10.11.13.0, 10.11.14.0, 10.11.12.0.
I am unable to ping the local LAN in the branch on connecting to the VPN.
Any help would be appreciated.
Regards
Nahas
08-02-2005 12:51 AM
I think you have to enable split tunneling. On you pix create an access list like follows:
access-list 102 permit ip 10.11.2.0 255.255.255.0 10.243.6.0 255.255.255.0
access-list 102 permit ip 10.11.11.0 255.255.255.0 10.243.6.0 255.255.255.0
access-list 102 permit ip 10.11.12.0 255.255.255.0 10.243.6.0 255.255.255.0
access-list 102 permit ip 10.11.13.0 255.255.255.0 10.243.6.0 255.255.255.0
access-list 102 permit ip 10.11.14.0 255.255.255.0 10.243.6.0 255.255.255.0
Disable NAT between HQ and VPN:
nat (inside) 0 access-list 102
Add Split tunnelin to the VPN group:
vpngroup xxxxxx split-tunnel 102
This should allow you access local resources in remote LAN where the VPN client is located
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide