I replaced the nat (optional) 0 access-list nonat command and VPNers can see the DMZ by literally assigned addresses again.
No split tunneling here, VPN users cannot get to the Internet while they're connected.
Is there a possibility I have DNS doctoring going on here? I'm fairly new to Cisco...
I removed the "nat (optional) 0 access-list nonat" from my config, no VPN connections cannot see the DMZ at all.
That's the closest thing in my config to what you're talking about.
Before I did that I changed my alias commands to look like:
alias outside.world.ip.address...
I have a PIX-515E (v6.22) and I need to have my VPN connections see my DMZ like everything else does.
The outside world sees them as their aliased addresses and the inside network also sees them as their aliased addresses.
Any VPN connections see them as their litterally assigned IP addresses...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.