Solved

Need help with VPN group user access to distinct internal networks

Posted on 2007-11-14
3
196 Views
Last Modified: 2013-11-16
I have a working 5500 that I need to modify.  I need to be able to permit specific VPN groups to access certain internal networks.  For example I want one group to be able to access 10.41.20.0/23 and another access to 10.96.11.0/24.  I still would need one admin group that access to all internal network.  Any help would be greatly appreciated.  I have read all the docs I can get my hands on and nothing seems to work.
0
Comment
Question by:Sam Lowe
  • 2
3 Comments
 
LVL 28

Expert Comment

by:batry_boy
ID: 20286014
access-list LimitedAccess1 extended permit ip any 10.41.20.0 255.255.254.0
group-policy LA1 attributes
 vpn-filter value LimitedAccess
tunnel-group group1 general-attributes
 default-group-policy LA1

access-list LimitedAccess2 extended permit ip any 10.96.11.0 255.255.255.0
group-policy LA2 attributes
 vpn-filter value LimitedAccess
tunnel-group group2 general-attributes
 default-group-policy LA2

You should be able to take the above code and merge it into your existing group policy and tunnel group names, but that should do it.

For your admin group, just create another tunnel group and don't apply any filtering to it.  It defaults to not having an ACL applied to a tunnel group when you create one.
0
 
LVL 28

Accepted Solution

by:
batry_boy earned 250 total points
ID: 20286024
Whoops, change the following lines in the above post:

First set of commands:

change "vpn-filter value LimitedAccess" to "vpn-filter value LimitedAccess1"

Second set of commands:

change "vpn-filter value LimitedAccess" to "vpn-filter value LimitedAccess2"

sorry about that...
0
 

Author Comment

by:Sam Lowe
ID: 20286170
Thanks so much.  I also found the Cisco docs on the subject once you provided the correct syntax.  It was an easy find after that.  You saved me a lot of time and trouble.
0

Featured Post

Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DHCP and Internet Access Issue Cisco 4331 Router 9 66
Server 2012 R2 Radius server and Cisco AP 7 48
cisco asa proxy arp 2 27
Palo Alto site-to-site vpn monitoring 5 52
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Windows 10 is mostly good. However the one thing that annoys me is how many clicks you have to do to dial a VPN connection. You have to go to settings from the start menu, (2 clicks), Network and Internet (1 click), Click VPN (another click) then fi…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question