Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations TouchToneTommy on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

restricting vpn traffic to DMZ host/port 1

Status
Not open for further replies.

br0ck

MIS
Apr 25, 2002
467
US
I need to let some one on our in the dmz via rdp with the cisco vpn client

i set a vpn group for him and i am trying to only grant him access to port 80,443 and 3389 on the server.


The access lists im using are as follows

access-list nonat permit ip 192.168.10.0 255.255.255.0 192.168.36.0 255.255.255.0
this works but allows everything….. not what I want

so I attempted to tighten the acl to

access-list nonat permit tcp host 192.168.10.100 192.168.36.0 255.255.255.0 eq 3389

nata now no traffic will flow

any ideas?!
 
The above access rule doesn't control or filter the traffic it only disables NAT for the VPN traffic and that is how you can access the servers using their private IP, you need to remove the "sysopt connection permit-ipsec" command and then control the traffic with whatever ACL that's applied to the outside interface


Hope that helps
 
Thank you sir,
That was what i was looking for!

 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top