Unable to access the web when connected to VPN

When connected to VPN I can access my Outlook and network shares but unable to browse the Internet – why?

My VPN connections is assigned their own DHCP IP scope

The PIX is located on

PIX Version 6.3(3)
interface ethernet0 auto
interface ethernet1 auto
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password b4YMiQWlhCQP5KZD encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname vatican
domain-name thepope
clock timezone CEST 1
clock summer-time CEDT recurring last Sun Mar 2:00 last Sun Oct 3:00
fixup protocol dns maximum-length 512
fixup protocol ftp 21
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol http 80
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol sip 5060
fixup protocol sip udp 5060
fixup protocol skinny 2000
no fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol tftp 69
access-list outside_in permit tcp any interface outside eq smtp
access-list outside_in permit tcp any interface outside eq www
access-list outside_in permit tcp any interface outside eq ftp
access-list outside_in permit tcp any interface outside eq ftp-data
access-list outside_in permit tcp any interface outside eq 3389
access-list outside_in permit tcp any interface outside eq 4899
access-list no_nat_VPN permit ip
pager lines 24
mtu outside 1500
mtu inside 1500
ip address outside 195.184.116.xxx
ip address inside
ip audit info action alarm
ip audit attack action alarm
ip local pool VPN_Pool
pdm location inside
pdm location inside
pdm location inside
pdm logging informational 100
pdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list no_nat_VPN
nat (inside) 1 0 0
static (inside,outside) tcp interface smtp smtp netmask 0 0
static (inside,outside) tcp interface www www netmask 0 0
static (inside,outside) tcp interface ftp ftp netmask 0 0
static (inside,outside) tcp interface ftp-data ftp-data netmask 0 0
static (inside,outside) tcp interface 3389 3389 netmask 0 0
static (inside,outside) tcp interface 4899 4899 netmask 0 0
access-group outside_in in interface outside
route outside 195.184.116.xxx 1
timeout xlate 0:05:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00
timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
http server enable
http inside
http inside
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-pptp
telnet timeout 5
ssh timeout 5
console timeout 0
vpdn group PPTP accept dialin pptp
vpdn group PPTP ppp authentication pap
vpdn group PPTP ppp authentication chap
vpdn group PPTP ppp authentication mschap
vpdn group PPTP ppp encryption mppe auto
vpdn group PPTP client configuration address local VPN_Pool
vpdn group PPTP client configuration dns
vpdn group PPTP pptp echo 60
vpdn group PPTP client authentication local
vpdn username dsl77 password *********
vpdn enable outside
dhcpd auto_config outside
terminal width 80

I already looked at this article: http://www.expertsexchange.com/Networking/Q_20436866.html but without luck!

Who is Participating?

Improve company productivity with a Business Account.Sign Up

lrmooreConnect With a Mentor Commented:
You have found the biggest limitation of using MS PPTP client.
Because your inside LAN is a different subnet than your client pool, your client needs to have the "use default gateway on remote network" checked, else you can't get to your servers. However, that stops you from normal browsing.

Read through this thread:  http://www.experts-exchange.com/Security/Firewalls/Q_21160715.html

Sebo2000Connect With a Mentor Commented:
I would not call that limitation but the biggest security feature that exist.
While you are connected to company network nobody can hack you and access the corp net. You will need to configure the Internet for the VPN client over VPN.
Or uncheck “ use default gateway” option that might limit you from accessing other networks on you corpnet.
There are ways around that but I would think twice before you do it.

You could modify the routing tables on the clients and specify the networks that should be access with VPN, for the rest just use the route to the internet. But with regular Joe blow user at home I would never do that.
Increase Security & Decrease Risk with NSPM Tools

Analyst firm, Enterprise Management Associates (EMA) reveals significant benefits to enterprises when using Network Security Policy Management (NSPM) solutions, while organizations without, experienced issues including non standard security policies and failed cloud migrations

dsl77Author Commented:
One thing i don’t understand is, my old setup I had my gateway on and my vpn pool started at 192.168.101.xxx – and that worked fine!?

What I can read from the replies, there is no complete-easy-to-follow-and-install  solution for this MS PPTP vs. PIX?

Does Cisco have PPTP client that solves this issue? Or do I need to look for another VPN solution such as IPSec?

Any help is most appreciated – thanks! :)
The issue is discussed at length in the links I posted above.
There is a complete and easy to follow solution for MS PPTP. The limitation is that the PIX cannot interact with the client.
Cisco has their own IPSEC client that is extremely easy to setup and use. It solves this issue with "split-tunneling" and full control of the client from the PIX.

dsl77Author Commented:
Hi lrmoore..

Is it possible to add ‘split tunnelling’ to my Easy VPN installation – making is possible to access the web from a VPN connection. But as I understand that requires a concentrator to perform!?

Can I have IPSEC and PPTP running at the same time? If yes, can someone please post the IPSEC config I am missing according to the above config?
Yes, you can use both IPSEC and PPTP at the same time. Use this example to configure for the IPSEC client


dsl77Author Commented:
Thanks lrmoore..

The big picture is finally getting through my thick forehead…. That the way to go for me is IPSec!

One thing I was wondering about when reading through IPSec configuration examples, was that all refers to a vpngroup rather then a vpnd username as in PPTP?

Can I create separate IPSec clients accounts such as vpnuser 1, vpnuser2 etc when using IPSec?

Thanks a hole lot.. :)
Sure, you can create multiple groups, or have one common group with multiple username/passwords, or on common group with MS Radius authentication..
dsl77Author Commented:
Do you have an example on that somewhere…?

I’m up and running with IPSec at the moment one account ‘vpn3000’. One thing that I was wondering about is when conneted to the VPN I open the statistics on the VPN client and under ‘Tunnel details’ I can see my client address but under ‘Route details’ I only have the as secured routes – is that good enough?
Yes, only the traffic to that nework will be encrypted. All the rest of the traffic goes out your normal internet connection..

This is the config I suggest, using Microsoft IAS RADIUS server. It's a snap to set up..
dsl77Author Commented:
The RADIUS client that I am setting up under IAS, does it represent my VPN users or one static user?

I have registered IAS with AD thinking that users would get their logon credentials from AD!?
dsl77Author Commented:
hehe.. the 'static' client is of cause the PIX itself - got it to work now, thanks lrmoore :)
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.