ebigs27
asked on
Terminating VPN tunnel on inside interface
Hello all. Have a question regarding termination of vpn on the inside interface with a public address. Currently running PIX 515 7.0(2) terminating to a 2621 router. Is it necessary to deny the inside address within my ipsec rules? Example
Inside interface 192.168.1.1 (public address)
Trusted network 192.168.2.0 (Public address on outside interface)
access-list deny host 192.168.1.1 192.168.2.0 255.255.255.0
access-list permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
Thanks
Inside interface 192.168.1.1 (public address)
Trusted network 192.168.2.0 (Public address on outside interface)
access-list deny host 192.168.1.1 192.168.2.0 255.255.255.0
access-list permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0
Thanks
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
We have to start converting all our private ip's to public. Talked to a cisco rep and he insists we have to deny the inside address for the tunnel to work. Currently I have the tunnels denying the inside address, then allowing the rest of the network through the tunnel. It is working fine. But for monitoring devices, can't ping the inside address because it is being denied through the tunnel.
I am not trying to do anything special, just want to be able to ping the inside of the device, and was wondering if by removing the deny and using the permit only rule, would this still work?
We are not allowed to use the outside address for termination, and some of the sites will be using split tunneling.
I am not trying to do anything special, just want to be able to ping the inside of the device, and was wondering if by removing the deny and using the permit only rule, would this still work?
We are not allowed to use the outside address for termination, and some of the sites will be using split tunneling.
>just want to be able to ping the inside of the device
Try using management interface:
management Access interface inside
I don't know that you'll ever be able to ping the inside interface, but you can telnet/snmp/PDM to the inside interface through a VPN tunnel only..
Try using management interface:
management Access interface inside
I don't know that you'll ever be able to ping the inside interface, but you can telnet/snmp/PDM to the inside interface through a VPN tunnel only..
Sorry... correct command is:
management-access inside
management-access inside
ASKER
Just set my remote device to allow telnet on the outside interface. Went in and removed the deny statement's from both ends of the tunnel. The tunnel stayed up and I am able to ping the inside address now.
Thanks for your help
Thanks for your help
https://www.experts-exchange.com/Security/Firewalls/
Easy question - 250 points