Scenario: small business network, 25 users, pix 506e.
Inside network: 192.168.105.0/24, 192.168.151.0/24
no routers, all devices connected to the same Netgear switch.
Critical PIX configs:
access-list vpn_nonat permit ip any 192.168.151.0 255.255.255.0
ip address inside 192.168.105.1 255.255.255.0
ip local pool corppool 192.168.151.1-192.168.151.50
global (outside) 1 interface
nat (inside) 0 access-list vpn_nonat
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
vpngroup corpvpn split-tunnel vpn_nonat
Q1: Will this work correctly if the vpn client pool is a differnet network than what the PIX resides on? In this case the inside address of the PIX is 192.168.105.1 but the client vpn pool is defined on a different network 192.168.151.0?
Q2: access-list vpn_nonat permit ip any 192.168.151.0 255.255.255.0
Here I am defining the interesting traffic that needs to be encrypted so I am saying any packets from ANY source with destination 192.168.151.0 must be encrypted.
Is it OK or prudent to use the ANY? Should I specifically define a "source" network?
What is the impact on the split-tunnel?
How does the split-tunnel work with the PIX (done it with vpn3000 and know how that works and configures)?
i.e. if i am a dialup user and get an ip address of 66.10.10.35 and then i connect to the pix and get a client ip address of 192.168.151.1, how does split-tunnel work?
What if the corp network had nets 10.0.0.0 and 172.16.0.0 too and i wanted any traffic going to 192.168.0.0, 10.0.0.0 and 172.16.0.0 to be encrypted and go through the vpn tunnel but all other traffic be routed to my local internet connection?
THX folks for any opinions or suggestions,
Inside network: 192.168.105.0/24, 192.168.151.0/24
no routers, all devices connected to the same Netgear switch.
Critical PIX configs:
access-list vpn_nonat permit ip any 192.168.151.0 255.255.255.0
ip address inside 192.168.105.1 255.255.255.0
ip local pool corppool 192.168.151.1-192.168.151.50
global (outside) 1 interface
nat (inside) 0 access-list vpn_nonat
nat (inside) 1 0.0.0.0 0.0.0.0 0 0
vpngroup corpvpn split-tunnel vpn_nonat
Q1: Will this work correctly if the vpn client pool is a differnet network than what the PIX resides on? In this case the inside address of the PIX is 192.168.105.1 but the client vpn pool is defined on a different network 192.168.151.0?
Q2: access-list vpn_nonat permit ip any 192.168.151.0 255.255.255.0
Here I am defining the interesting traffic that needs to be encrypted so I am saying any packets from ANY source with destination 192.168.151.0 must be encrypted.
Is it OK or prudent to use the ANY? Should I specifically define a "source" network?
What is the impact on the split-tunnel?
How does the split-tunnel work with the PIX (done it with vpn3000 and know how that works and configures)?
i.e. if i am a dialup user and get an ip address of 66.10.10.35 and then i connect to the pix and get a client ip address of 192.168.151.1, how does split-tunnel work?
What if the corp network had nets 10.0.0.0 and 172.16.0.0 too and i wanted any traffic going to 192.168.0.0, 10.0.0.0 and 172.16.0.0 to be encrypted and go through the vpn tunnel but all other traffic be routed to my local internet connection?
THX folks for any opinions or suggestions,