Solved

SIMPLE PIX515e VPN Question

Posted on 2004-08-17
7
242 Views
Last Modified: 2013-11-16
I'm able to get my VPN working using the Cisco client VPN software but when connected I can only access my internal network equipment but not any outside network equipment like google.com or anything.  What's my problem?
0
Comment
Question by:rkekos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 11826496
0
 
LVL 15

Accepted Solution

by:
Yan_west earned 500 total points
ID: 11826557
Hmmm, Does is your ACL related to your VPN connection allows you going through it? did you bind your connection to a ACL that permit you to get out?
0
 

Author Comment

by:rkekos
ID: 12013072
I answered this myself.  I didn't have an ACL for the VPN connection so I could only access inside equipment, nothing external.  Seems to be working perfectly now.  My comcast connection does all traffic with exception to when I access a secured IP range which is then passed via the VPN.  Does that all sound correct?

Yan should get the points but I didn't get what he fully stated originally, so I just played around until I got it ... a month later :-).
0
 
LVL 15

Expert Comment

by:Yan_west
ID: 12015771
Thanks :)
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 13703126
How's it going? Can you close this question?

http://www.experts-exchange.com/help.jsp#hs5

Thanks for attending to this long-forgotten question.

<-8}
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

632 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question