Hey guys, I'm running into difficulty trying to get the following scenario up and running:
I have a PIX 501 configured to allow VPN clients to access recources on our local network (192.168.5.0) using Cisco VPN client software. No problem..
The need has arisen to allow these VPN users to access a server located over a T1 to a remote network (192.168.13.0), which for some reason I can't get up and running. The Cisco Client on the user's PC only shows 192.168.5.0 as a secure route. How do I pass along the secure route to 192.168.13.0?
Here's my ACL and route config:
access-list nonat permit ip 192.168.5.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list nonat permit ip 192.168.13.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (inside) 0 access-list nonat
route inside 192.168.13.0 255.255.255.0 192.168.5.3
I can ping devices on the 192.168.13.0 network from the PIX, so the routes are OK.
VPN Users (VPN Pool 192.168.3.0)
|
|
Internet
|
|
DSL Modem
|
|
PIX 501
|
|
Local network (192.168.5.0)
|
|
Cisco 1602 Router (192.168.5.3)
|
|
Remote Network (192.168.13.0)
Thanks,
Matt
I have a PIX 501 configured to allow VPN clients to access recources on our local network (192.168.5.0) using Cisco VPN client software. No problem..
The need has arisen to allow these VPN users to access a server located over a T1 to a remote network (192.168.13.0), which for some reason I can't get up and running. The Cisco Client on the user's PC only shows 192.168.5.0 as a secure route. How do I pass along the secure route to 192.168.13.0?
Here's my ACL and route config:
access-list nonat permit ip 192.168.5.0 255.255.255.0 192.168.3.0 255.255.255.0
access-list nonat permit ip 192.168.13.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (inside) 0 access-list nonat
route inside 192.168.13.0 255.255.255.0 192.168.5.3
I can ping devices on the 192.168.13.0 network from the PIX, so the routes are OK.
VPN Users (VPN Pool 192.168.3.0)
|
|
Internet
|
|
DSL Modem
|
|
PIX 501
|
|
Local network (192.168.5.0)
|
|
Cisco 1602 Router (192.168.5.3)
|
|
Remote Network (192.168.13.0)
Thanks,
Matt