TareefA
asked on
Cisco VPN and Port Forward Issue
All,
I have a Cisco PIX I have setup for VPN and Port Forwarding. I am forwarding two ports, web server and terminal services, to a server on the internal network. My problem is when I attempt to access terminal server or web server of that server while connected to VPN, I am unable to to connect.
Is it possible to connect to those ports if I am forwarding from my public IP address also?
Thanks,
Tareef
I have a Cisco PIX I have setup for VPN and Port Forwarding. I am forwarding two ports, web server and terminal services, to a server on the internal network. My problem is when I attempt to access terminal server or web server of that server while connected to VPN, I am unable to to connect.
Is it possible to connect to those ports if I am forwarding from my public IP address also?
Thanks,
Tareef
ASKER
Hello lrmoore,
Answers below:
Are you trying to access these by their public IP that you have static xlates for? No, private/internal
Are you using IP address or DNS name? tried both
Are you using a different IP subnet for your clients than the inside network? Yes, inside is 10.0.0.0, client vpn network is 10.1.0.0
Can you access anything else on the network while connected via VPN? Yes, anything not using port forwarding
Do you have any access-groups assigned to the inside interface? Yes, allowing all traffic from VPN client network
Do you have split-tunneling enabled? Yes
Thanks
Answers below:
Are you trying to access these by their public IP that you have static xlates for? No, private/internal
Are you using IP address or DNS name? tried both
Are you using a different IP subnet for your clients than the inside network? Yes, inside is 10.0.0.0, client vpn network is 10.1.0.0
Can you access anything else on the network while connected via VPN? Yes, anything not using port forwarding
Do you have any access-groups assigned to the inside interface? Yes, allowing all traffic from VPN client network
Do you have split-tunneling enabled? Yes
Thanks
>Do you have any access-groups assigned to the inside interface? Yes, allowing all traffic from VPN client network
Can you post your acl?
Can you post your acl?
ASKER
Here is my acl:
access-list inside_outbound_nat0_acl permit ip any 192.168.3.0 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any 192.168.3.0 255.255.255.0
access-list 103 permit icmp any any
access-list splitvpn permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.224
access-list splitvpn permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.224
Thanks,
Tareef
access-list inside_outbound_nat0_acl permit ip any 192.168.3.0 255.255.255.0
access-list outside_cryptomap_dyn_40 permit ip any 192.168.3.0 255.255.255.0
access-list 103 permit icmp any any
access-list splitvpn permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.224
access-list splitvpn permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.224
Thanks,
Tareef
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
I think that worked.
Thanks!
Tareef
Thanks!
Tareef
Are you using IP address or DNS name?
Yes, it should be possible to access those ports through the VPN even though you have static nat.
Are you using a different IP subnet for your clients than the inside network?
Can you access anything else on the network while connected via VPN?
Do you have any access-groups assigned to the inside interface?
Do you have split-tunneling enabled?