cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
551
Views
0
Helpful
4
Replies

Add unencrypted non IPSec to PIX

mvhurley9
Level 1
Level 1

Hi,

I was hoping I could get some help from the group on the following.

I'm working with a PIX that is set up to only do IPSec connections via the internet. I am trying to add the ability to make unencrypted non IPSec connections to the internet.

Below is a copy of the existing PIX config and what I tried adding to get an unencrypted connections to the internet.

Public IP addresses are not real (2.x.x.x & 6.x.x.x)

Seems like this should be simple. I must me missing something. I am attempting to use PAT (the 2.100.211.40 address)

Thanks,

Michael Hurley

4 Replies 4

husycisco
Level 7
Level 7

Hi Michael

no access-list internal_net_access_in extended permit ip 10.11.28.0 255.255.255.0 object-group CoLo

no nat (outside) 0 access-list outside_nat0_outbound

nat (internal_net) 0 access-list outside_nat0_outbound

nat (internal_net) 1 0 0

global (outside) 1 interface

no access-list outside_access_in extended permit icmp 10.0.10.0 255.255.255.0 10.11.28.0 255.255.255.0 echo-reply log

no access-list outside_access_in extended permit icmp 10.0.20.0 255.255.255.0 10.11.28.0 255.255.255.0 echo-reply log

no access-list outside_access_in extended permit icmp 10.0.30.0 255.255.255.0 10.11.28.0 255.255.255.0 echo-reply log

no access-list outside_access_in extended permit icmp 10.0.40.0 255.255.255.0 10.11.28.0 255.255.255.0 echo-reply log

no access-list outside_access_in extended permit icmp 10.0.50.0 255.255.255.0 10.11.28.0 255.255.255.0 echo-reply log

access-list outside_access_in extended permit icmp object-group CoLo 10.11.28.0 255.255.255.0 echo-reply log

no access-group internal_net_access_in in interface internal_net

clear xlate

Regards

Huseyin,

Are you suggesting I remove the IPSec stuff just for testing purposes? I may be able to do this.Eventually we need to have some traffic use IPSec and some traffic go directly to the internet.

Michael

mvhurley9
Level 1
Level 1

I am looking at Cisco Document ID 82020 that covers split tunneling. They mention the following: In order to set a split tunneling policy, issue the split-tunnel-policy command in the "group-policy configuration mode".

Can someone tell me how/where to get into the group-policy mode.

Thanks,

Michael

Michael,

My above suggestions are not for removing IPSec. It makes the traffic originated from 10.11.28.0 255.255.255.0 and destined to object-group CoLo flow through the IPSec Tunnel, and rest will flow through outside interface without IPSec directly to internet.

Split-tunneling is actually for Remote Access, and has no relationship with your issue.

Regards

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: