Yes you can. Under VPN settings, Advanced Settings you need to enable "Forward packets to remote VPNs" which basically will allow packets destined for tunneled networks to pass through the required tunnel.
Julian Dragut
If you knew that you wouldn't fall, how far would you have gone?
I've been having this issue for 3 years, and we and Avaya tried everything humanly possible and couldn't find a solution!
Anything that worked for you?
Cheers,
Julian
No the internal IP's are not the same.
RemoteSite's IP address is 192.168.1.0
HQSite = 192.168.0.0
PIX1 - ISP1
PIX2 - ISP2
PIX1 + PIX2 protect the same LAN (192.168.0.0), that's why RemoteSitePIX has two maps with the same proxy source, but using two diferent peer addresses
Hope this helps!
Take a look at this:
Cisco's VPN engineer's respons:
Thanks you for all your concern and providing all the info in this regard.
Please see that I was not feeling well, so couldn't get back to you soon. My apologies for any production impact caused.
What we need to do in this scenario is to...
Hi,
I am going nuts with this, if anybody has been there..... this is a cry for help ;-).
This is my situation.
LAN1 - 2 ISP's, 2 PIX's
LAN2 - 1 ISP, 1 PIX
I have a vpn tunnel from PIX1-LAN1 going to PIX1-LAN2. Now I'm trying to create a secondary vpn tunnel from PIX2-LAN1 going to...
Hi,
I am trying to map an external ip address given by the ISP's DHCP to an internal IP address given the the PIX's DHCP for port 5555
What I do is:
access-list outside_in permit tcp any host 24.200.200.200 eq 5555
access-group outside_in in interface outside
static (inside,outside) tcp...
I have the same problem, and in the vpn-client I allowed local lan access but doesn't do anything, the moment it connects to the PIX the option is disables.
Any ideeas?
That's it!
The remote users can access the unix boxes now.
They are not able to browse the net or access other sites, but it is good how it is for now.(cannot exit on the same if you entered - right?)
Highly appreciated
Thanks alot.
The Unix boxes in each site
I have 192.168.254.0-10 mask 255.255.255.240 ipvpnpool
and I think I have this
access-list outside permit ip 192.168.254.0 255.255.255.240 192.168.0.0 255.255.255.0 (res: 192.168.1.0, 2.0 , 3.0 so on)
I simplified the schema, because what I'bve got here's a mess...
Here is my setup:
4 sites
3 sites with pix 505 (workgroup + dhcp + wins)
1 site with 515 (A) (nt4 domain + dhcp + wins)
A
***
* * *
* * *
B * C
* * *
* * *...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.