That's a little more advanced, and requires access-lists to encrypt that
specific traffic on the PIX.  I am assuming you mean LAN sites that are
in different IP subnets?

-----Original Message-----
From: Edward Sohn [mailto:[EMAIL PROTECTED]] 
Sent: Monday, December 09, 2002 6:07 PM
To: [EMAIL PROTECTED]
Subject: RE: more VPN fun... [7:58818]


thanks for the config

i can't seem to ping from the remote client to any lan sites,
though...any ideas?  the "allow local lan access" line is disabled in
the statistics, though i have it enabled in the client...

thanks,

ed

-----Original Message-----
From: Roberts, Larry [mailto:[EMAIL PROTECTED]] 
Sent: Monday, December 09, 2002 1:26 PM
To: 'Edward Sohn'; [EMAIL PROTECTED]
Subject: RE: more VPN fun... [7:58818]


Share the knowledge I say...
OK, this has been edited to protect my information, but other than that
its directly off of a PIX that has 2 lan 2 Lan tunnels and also allows
VPN remote access... I think I got all the leftover junk cleaned out as
well... ! access-list 100 permit ip m.y.h.o u.s.e.! 10.0.0.0 255.0.0.0
access-list 100 permit ip m.y.h.o u.s.e.! 172.16.0.0 255.240.0.0
access-list 100 permit ip m.y.h.o u.s.e.! 192.168.1.0 255.255.255.0
access-list 100 permit ip m.y.h.o u.s.e.! 192.168.2.0 255.255.255.0
access-list 120 permit ip m.y.h.o u.s.e.! 192.168.1.0 255.255.255.0
access-list 110 permit ip m.y.h.o u.s.e.! 10.0.0.0 255.0.0.0 access-list
110 permit ip m.y.h.o u.s.e.! 172.16.0.0 255.240.0.0 ip local pool
REMOTEUSER 192.168.2.1-192.168.2.255 nat (inside) 0 access-list 100
crypto ipsec transform-set TRANSFORM esp-3des esp-md5-hmac crypto
dynamic-map DYNOMAP 30 set transform-set TRANSFORM crypto map MYMAP 10
ipsec-isakmp crypto map MYMAP 10 match address 110 crypto map MYMAP 10
set peer e.f.g.h crypto map MYMAP 10 set transform-set TRANSFORM crypto
map MYMAP 30 ipsec-isakmp crypto map MYMAP 30 match address 120 crypto
map MYMAP 30 set peer a.b.c.d crypto map MYMAP 30 set transform-set
TRANSFORM crypto map MYMAP 100 ipsec-isakmp dynamic DYNOMAP crypto map
MYMAP interface outside isakmp enable outside isakmp key ********
address a.b.c.d netmask 255.255.255.255 isakmp key ******** address
e.f.g.h netmask 255.255.255.255 isakmp identity address isakmp policy 10
authentication pre-share isakmp policy 10 encryption des isakmp policy
10 hash md5 isakmp policy 10 group 1 isakmp policy 10 lifetime 86400
isakmp policy 20 authentication pre-share isakmp policy 20 encryption
des isakmp policy 20 hash md5 isakmp policy 20 group 2 isakmp policy 20
lifetime 86400 vpngroup DONTTHINK address-pool REMOTEUSER vpngroup
DONTTHINK dns-server 192.168.24.22 vpngroup DONTTHINK default-domain
groupstudy.rocks vpngroup DONTTHINK idle-time 1800 vpngroup DONTTHINK
password ********

Thanks

Larry
 

-----Original Message-----
From: Edward Sohn [mailto:[EMAIL PROTECTED]] 
Sent: Monday, December 09, 2002 3:44 PM
To: [EMAIL PROTECTED]
Subject: more VPN fun... [7:58818]


anyone have any working configs of a PIX set up for a site-to-site IPSec
tunnel with another PIX (at a remote site), as well as set up for mobile
user VPN access (through dialup/dsl/cable/etc)?  the client will user
secure VPN client 3.0 for windows.

i have the docs from CCO, but someone told me that their config for the
remote user is wrong and does not work right.

appreciate your help.  please email me directly.

ed




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=58853&t=58818
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to