Hello...
I have a Pix to Pix vpn set up with a client that has been working fine. It protects any traffic originating from my external address (216.115.133.15) that is destined to the external address of the machine at the client's site (214.66.40.15). Now I've been asked to allow other traffic to pass through the same tunnel from our other external addresses to an internal address (10.1.1.x) at the client's site. Should I simply be able to add an access-list statement for this to work?
Orininal:
access-list 100 permit ip host 216.115.133.15 host 214.66.40.15
New statement (?):
access-list 100 permit ip 216.115.134.0 255.255.255.0 host 10.1.1.10
I've tried this and it has not worked. Is there an issue with the internal ip? Do I need a route statement or something? The client has no public ip's available and cannot use port redirection because they haven't upgraded to 6.0 yet.
Thanks for any help!
kc
I have a Pix to Pix vpn set up with a client that has been working fine. It protects any traffic originating from my external address (216.115.133.15) that is destined to the external address of the machine at the client's site (214.66.40.15). Now I've been asked to allow other traffic to pass through the same tunnel from our other external addresses to an internal address (10.1.1.x) at the client's site. Should I simply be able to add an access-list statement for this to work?
Orininal:
access-list 100 permit ip host 216.115.133.15 host 214.66.40.15
New statement (?):
access-list 100 permit ip 216.115.134.0 255.255.255.0 host 10.1.1.10
I've tried this and it has not worked. Is there an issue with the internal ip? Do I need a route statement or something? The client has no public ip's available and cannot use port redirection because they haven't upgraded to 6.0 yet.
Thanks for any help!
kc