I need your help! I have Server 2003 Domain Controller running Exchange and OWA. Sending and Receiving Email no problem. when I want to access OWA from outside that doesnt work. If I change the settings OWA works but clients(inside) cannot access internet. VPN Clients cannot access Server.
Here is the PIX configuration working VPN, Internet and Exchange
PIX Version 6.3(4)
interface ethernet0 auto
interface ethernet1 100full
nameif ethernet0 outside security0
nameif ethernet1 inside security100
enable password xxxxxxx encrypted
passwd xxxxxxx encrypted
fixup protocol <REMOVED>
name 192.168.1.100 SERVER
name 82.yy.yy.yy MAIL
access-list inbound permit tcp any host MAIL eq smtp
access-list inbound permit icmp any any
access-list inbound permit ip any any
access-list inbound permit tcp any any eq www
access-list inbound permit tcp any any eq https
access-list XXXXXXX_splitTunnelAcl permit ip host SERVER any
access-list inside_outbound_nat0_acl permit ip host SERVER 192.168.5.0 255.255.255.224
access-list outside_cryptomap_dyn_20 permit ip any 192.168.5.0 255.255.255.224
access-list XXXX_splitTunnelAcl permit ip any any
access-list XXX_splitTunnelAcl permit ip host SERVER any
1. Adding those acl lines should absolutely not prevent inside users from accessing the internet. When you say inside clients cannot access the internet when those lines are in place, do you just mean they cannot access owa? From inside, users will not be able to use the public ip address 213.x.x.x. They will have to use 192.168.1.100. Same goes for vpn clients unless you change your nat exemption acl.
2. You have a line in your inbound acl "access-list inbound permit ip any any". That should not be there as it is allowing all inbound traffic.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :