Solved

PDM over IPSec tunnel

Posted on 2004-08-31
4
543 Views
Last Modified: 2010-04-08
I have a PIX 506E functioning as a VPN endpoint (with limited firewall) in a client's office.  This 506E is used to create an IPSec tunnel back to our main office for FTP uploads.

The tunneling, routing and firewalling are all working fine.  I can access PDM from a system on the client's office end.  However, I cannot access the PIX via PDM over the IPSec tunnel.  Here's my network layout

Main office  192.168.100.x      100.1 is PIX 515E VPN endpoint
Client office  192.168.107.x     107.1 is PIX 506E VPN endpoint

I can access PDM from a 107.x system, but not from a 100.x system.  PDM/HTTPS access is allowed for 192.168.107.0/24 on the Inside interface and 192.168.100.0/24 on the Outside interface.  Management Access Interface is currently None.  I have an access rule allowing 100.x to access 107.1 via HTTPS.

Any ideas?  Once I've established the IPSec tunnel and denoted 100.x as a valid network for PDM access, shouldn't I be able to run it from a 100.x machine?  Thanks for your assistance.
0
Comment
Question by:sloth10k
  • 2
  • 2
4 Comments
 
LVL 23

Accepted Solution

by:
Tim Holman earned 500 total points
ID: 11950317
Allow 192.168.100.0/24 on the Inside interface, not the Outside....
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 11952487
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 12092745
Are you still working on this? Do you need more information?
Can you close out this question?
0
 
LVL 23

Expert Comment

by:Tim Holman
ID: 12113999
Why only a B grade if the answer helped you both promptly and accurately in resolving this issue ?  
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question