Need help with VPN group user access to distinct internal networks

I have a working 5500 that I need to modify.  I need to be able to permit specific VPN groups to access certain internal networks.  For example I want one group to be able to access 10.41.20.0/23 and another access to 10.96.11.0/24.  I still would need one admin group that access to all internal network.  Any help would be greatly appreciated.  I have read all the docs I can get my hands on and nothing seems to work.
Sam LoweJanitor, Fireman, MagicianAsked:
Who is Participating?
 
batry_boyConnect With a Mentor Commented:
Whoops, change the following lines in the above post:

First set of commands:

change "vpn-filter value LimitedAccess" to "vpn-filter value LimitedAccess1"

Second set of commands:

change "vpn-filter value LimitedAccess" to "vpn-filter value LimitedAccess2"

sorry about that...
0
 
batry_boyCommented:
access-list LimitedAccess1 extended permit ip any 10.41.20.0 255.255.254.0
group-policy LA1 attributes
 vpn-filter value LimitedAccess
tunnel-group group1 general-attributes
 default-group-policy LA1

access-list LimitedAccess2 extended permit ip any 10.96.11.0 255.255.255.0
group-policy LA2 attributes
 vpn-filter value LimitedAccess
tunnel-group group2 general-attributes
 default-group-policy LA2

You should be able to take the above code and merge it into your existing group policy and tunnel group names, but that should do it.

For your admin group, just create another tunnel group and don't apply any filtering to it.  It defaults to not having an ACL applied to a tunnel group when you create one.
0
 
Sam LoweJanitor, Fireman, MagicianAuthor Commented:
Thanks so much.  I also found the Cisco docs on the subject once you provided the correct syntax.  It was an easy find after that.  You saved me a lot of time and trouble.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.