[c-nsp] OT: PIX 5 zone w/ VPN Client

Tim Devries tdevries at northrock.bm
Mon Jul 10 07:52:09 EDT 2006


I couldn't get the nat/pat to work with the VPN pool, the ASA just did
not like the config.  Eventually I just set it up without nat (i.e.
no-nat) though on a separate network from any of the interfaces, and
everything works fine.  

With regards to your inability to surf the net when connected, I would
check to make sure you have split tunneling enabled.

i.e.

access-list NGIvpn_splitTunnelAcl standard permit any
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value NGIvpn_splitTunnelAcl

Thanks,

Tim

-----Original Message-----
From: Daniel Lacey [mailto:daniel_p_lacey at yahoo.com] 
Sent: Friday, July 07, 2006 1:36 PM
To: Tim Devries
Cc: cisco-nsp at puck.nether.net
Subject: Re: [c-nsp] OT: PIX 5 zone w/ VPN Client

Tim,

I have not been able to get this to work on my 3 interface PIX either...
I would love some sample configs... I have been all over the Cisco docs 
to get this far...
The Cisco sample configs are good, but firewall configs are not as 
cookie cutter as a router.
When you want to add some functionality, the config. can change
radically...
Maybe that is just my experience.
 
I have VPN connections NATed to the "inside", I can access other 
interfaces, but cannot surf the Internet like the non-VPN inside hosts.
This was done with:

access-list mgmt_in extended permit ip any any
access-list no-nat-inside extended permit ip any 10.166.65.240 
255.255.255.240
ip local pool vpnpool 10.166.65.241-10.166.65.254 mask 255.255.255.240
nat (inside) 0 access-list no-nat-inside
access-group mgmt_in in interface inside
tunnel-group vpngroup general-attributes
 address-pool vpnpool
 
Or, I can set it up so that I VPN to the firewall, surf the Internet, 
but cannot access any other interface....
Got this from the Cisco "PIX ASA 7.x and VPN Client for Public Internet 
VPN on a Stick Configuration Example.pdf" config example.
same-security-traffic permit intra-interface   <--- Need this to VPN 
into outside interface AND go back out...

Tim Devries wrote:

>Hi,
>
> 
>
>I have configured a 5 zone ASA/Pix firewall.  Everything in the
>configuration is working fine.  Recently I have tried to configure a
>remote Client VPN (software) terminating on the firewall.  Rather than
>terminate the connection so that my remote users are on the 'inside'
>interface (as per most of the documentation on the subject), I have
>created a separate pool of IP's in a different network, and have added
a
>nat statement (on the outside) for that network as well as a global
>interface pat to the other 4 interfaces.
>
> 
>
>I can connect fine, and authenticate the user no problem.  However,
when
>I try and access any resources in the other zones I am unable to do so.
>I've been searching Cisco's site for a document that might explain how
>to do this configuration with 5 interfaces but so far have not had much
>luck.  I also don't see much in the log, one statement I do see is that
>it is unable to create a translation for the vpn network when I attempt
>to access resources in another zone, which strikes me as strange as I
>have used the nat and global statements, and AFAIK I don't need statics
>to make this work.
>
> 
>
>Anyone have any ideas or sample configs for this sort of thing?
>
> 
>
>Thanks,
>
> 
>
>Tim Devries
>
> 
>
>_______________________________________________
>cisco-nsp mailing list  cisco-nsp at puck.nether.net
>https://puck.nether.net/mailman/listinfo/cisco-nsp
>archive at http://puck.nether.net/pipermail/cisco-nsp/
>
>  
>



More information about the cisco-nsp mailing list