LedZepRock
MIS
Hi I have a PIX515e and have noticed that the access lists I though I had working for a VPN aint working as I expected. Here is a example of what I have
access-list nonatinside permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
access-list inside_in permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
access-list hostedVPN_10 permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
So I can connect to hosted machines over the VPN (with NoNAT) and that works great, the problem though is that I have since found that items at our hosted site can also connect back to the LAN (bad). Where do I add access lists to prevent this???
Do I ammend the VPN access list, the NoNAT access list or the access list on a Interface (and if it is the interface which on the inside or outside)???
I hope my question makes some sense...
Simon
access-list nonatinside permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
access-list inside_in permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
access-list hostedVPN_10 permit ip host 192.168.101.0 255.255.255.0 host 192.168.1.0 255.255.255.0
So I can connect to hosted machines over the VPN (with NoNAT) and that works great, the problem though is that I have since found that items at our hosted site can also connect back to the LAN (bad). Where do I add access lists to prevent this???
Do I ammend the VPN access list, the NoNAT access list or the access list on a Interface (and if it is the interface which on the inside or outside)???
I hope my question makes some sense...
Simon