Cisco pix 506e

I am assisting withg a cisco pix506e that currently is setup to connect two vpn tunnels. We have to now also allow for connectivity via a vpn client from anywhere. Inorder to enable the vpn client in the configuration, it appears we have to remove the " nat (inside) 0 nonat " command . Does the cisco pix506e support concurrently vpn tunnels as well as vpn client connects? if so, how is this handled?
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Sure does. Here's a sample configuration:

Configuring IPSec Between Two PIXes With VPN Client 4.x Access

Look at PIX 1 configuration from the link above, that's what you need.

If you have any questions about the config, don't hesitate to ask.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
> appears we have to remove the " nat (inside) 0 nonat " command...
  Don't delete your 'nat (inside) 0...' statement.  You can add to/modify what the 'nonat' ACL references, but you must have a 'nat (inside) 0 <ACL_name>' statement for both site-to-site & client VPN to work.

>Does the cisco pix506e support concurrently vpn tunnels as well as vpn client connects?
  Certainly, as stressedout2004 mentioned.  Both site-to-site & client VPN connections can co-exist nicely.

Good URL provided by stressedout2004.  As you can see in the example, your client VPN pool IP range ("ip local pool") must be different than the LAN behind the PIX 506e, as well as different from the LAN where the remote VPN client resides, or you'll run into a "routing loop."

Also be sure to add this on any PIX running 6.3:
  isakmp nat-t

Highly suggest you use the latest 4.8 series of Cisco VPN client software.

dseliAuthor Commented:
Good information provided. This config is 6.2 and the client is 4.8. I know I need to modify the ' nat (inside) 0...' statement- (by the way- this was very helpful to know). I was not sure if I need to create an additional access list. Here is the current config:
PIX Version 6.2(2)
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password 6GdrbAhENbpr1YbB encrypted
passwd 2KFQnbNIdI.2KYOU encrypted
hostname SMC
fixup protocol ftp 21
fixup protocol http 80
fixup protocol h323 h225 1720
fixup protocol h323 ras 1718-1719
fixup protocol ils 389
fixup protocol rsh 514
fixup protocol rtsp 554
fixup protocol smtp 25
fixup protocol sqlnet 1521
fixup protocol sip 5060
fixup protocol skinny 2000
access-list nonat permit ip
access-list nonat permit ip
access-list nonat permit ip
access-list nonat permit ip
pager lines 24
interface ethernet0 auto
interface ethernet1 auto
mtu outside 1500
mtu inside 1500
ip address outside
ip address inside
ip audit info action alarm
ip audit attack action alarm
pdm history enable
arp timeout 14400
global (outside) 1
nat (inside) 0 access-list nonat
nat (inside) 1 0 0
static (inside,outside) tcp smtp smtp netmask 0 0
static (inside,outside) tcp www www netmask 0 0
static (inside,outside) tcp 3389 3389 netmask 0 0
conduit permit icmp any any
conduit permit tcp host eq smtp any
conduit permit tcp host eq www any
conduit permit tcp host eq 3389 any
route outside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00
timeout uauth 0:05:00 absolute
aaa-server TACACS+ protocol tacacs+
aaa-server RADIUS protocol radius
aaa-server LOCAL protocol local
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
floodguard enable
sysopt connection permit-ipsec
no sysopt route dnat
crypto ipsec transform-set myset esp-3des esp-sha-hmac
crypto dynamic-map cisco 1 set transform-set myset
crypto map dyn-map 65000 ipsec-isakmp dynamic cisco
crypto map dyn-map interface outside
isakmp enable outside
isakmp key ******** address netmask no-xauth no-config-mode
isakmp identity address
isakmp policy 10 authentication pre-share
isakmp policy 10 encryption des
isakmp policy 10 hash md5
isakmp policy 10 group 1
isakmp policy 10 lifetime 3600
telnet inside
telnet timeout 5
ssh outside
ssh timeout 60
vpnclient vpngroup smgvpn password ********
vpnclient username test password ********
vpnclient server
vpnclient mode client-mode
terminal width 80
: end

Also- how do you account for the  VPN pool IP range on the LAN where the VPNclient resides, if it is potemtially mobil?

Thanks to stressedout2004 & calvinetter
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Software Firewalls

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.