Showing results for 
Search instead for 
Did you mean: 

Unable to reach internal server usnig VPN



I have set up a Cisco VPN client, and it connects fine. However, I cannot browse to the local server, or ping it either once connected. I have setup a RDP through the firewall and that part works fine. I am including the sh route info plus the config. What am I missing?

Thanks - Wayne

Result of firewall command: "sh route"

outside 1 OTHER static

inside 1 CONNECT static

inside 1 OTHER static

outside 1 CONNECT static

PIX Version 6.3(3)

interface ethernet0 auto

interface ethernet1 auto

nameif ethernet0 outside security0

nameif ethernet1 inside security100


access-list acl_out permit tcp any any eq 3389

access-list inside_outbound_nat0_acl permit ip any

access-list outside_cryptomap_dyn_20 permit ip any

ip address outside

ip address inside

ip audit info action alarm

ip audit attack action alarm

ip local pool pool1

arp timeout 14400

global (outside) 1 interface

nat (inside) 0 access-list inside_outbound_nat0_acl

nat (inside) 1 0 0

static (inside,outside) tcp interface 3389 3389 netmask 0 0

access-group acl_out in interface outside

route outside 1

route inside 1

timeout xlate 0:05:00

timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00

timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00

timeout uauth 0:05:00 absolute

no snmp-server location

no snmp-server contact

snmp-server community public

no snmp-server enable traps

floodguard enable

sysopt connection permit-ipsec

crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac

crypto dynamic-map outside_dyn_map 20 match address outside_cryptomap_dyn_20

crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-MD5

crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map

crypto map outside_map interface outside

isakmp enable outside

isakmp nat-traversal 20

isakmp policy 20 authentication pre-share

isakmp policy 20 encryption 3des

isakmp policy 20 hash md5

isakmp policy 20 group 2

isakmp policy 20 lifetime 86400

vpngroup paisleyvpn address-pool pool1

vpngroup paisleyvpn dns-server

vpngroup paisleyvpn idle-time 1800

vpngroup paisleyvpn password ********

telnet timeout 5

ssh timeout 5

console timeout 0

dhcpd address inside

dhcpd dns

dhcpd lease 86400

dhcpd ping_timeout 750

dhcpd enable inside

1 Reply 1

Patrick Laidlaw


Try changeing your access-lists as follows:

access-list inside_outbound_nat0_acl permit ip

access-list outside_cryptomap_dyn_20 permit ip


Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: