Hi,
Hopefully this will be a nice easy question for someone to answer....I have a PIX 515E runing PIXOS 6.3, supporting a DMZ and IPSEC VPN.
When a VPN client connects they are assigned an address for the 192.168.1.0 /24 subnet and can access the internal 192.168.168.0 /24 subnet. Internal subnet users can access resources in the DMZ (192.168.169.0 /24 subnet) and outside of the network where ACL's permit.
However, VPN clients cannot access resources in the DMZ. When they query internal DNS the IP address returned is 192.168.169.#. But the traffic isn't routing correctly and when the VPN client then tries to route to 192.168.169# it goes straight out into the internet.
If I add an additional host (A) record to DNS with the NAT address of the machine in the DMZ that the VPN client is trying to access, it gets there no problem (after a short delay).
What basic piece of config am I missing?
Thanks
Hopefully this will be a nice easy question for someone to answer....I have a PIX 515E runing PIXOS 6.3, supporting a DMZ and IPSEC VPN.
When a VPN client connects they are assigned an address for the 192.168.1.0 /24 subnet and can access the internal 192.168.168.0 /24 subnet. Internal subnet users can access resources in the DMZ (192.168.169.0 /24 subnet) and outside of the network where ACL's permit.
However, VPN clients cannot access resources in the DMZ. When they query internal DNS the IP address returned is 192.168.169.#. But the traffic isn't routing correctly and when the VPN client then tries to route to 192.168.169# it goes straight out into the internet.
If I add an additional host (A) record to DNS with the NAT address of the machine in the DMZ that the VPN client is trying to access, it gets there no problem (after a short delay).
What basic piece of config am I missing?
Thanks