I have a PIX Firewall which I'd like to configure to allow IP addresses from the external interface (private IP range) to access multiple networks that exist on the internal network.
The internal network has a layer 3 switch with multiple vlans and I'd like to allow some IP addresses on the external lan access these internal networks. I've added the necessary 'route' commands on the pix and it can properly ping these internal networks/hosts. However, when trying to access them from the external network, I receive the 'no translation group found' error.
Assume the following setup:
Where 192.168.10.x is the internal network and 192.168.11.x the external.
I've also added:
route inside 192.168.14.0 255.255.255.0 192.168.10.5 so that the pix can reach the 192.168.14.0 network.
I need to access the 192.168.14.0 network from the external network.
I have already tried your suggestion and the debugging shows the original error I mentioned: "no translation group found" for 192.168.14.0.
Again, this error occurs when 192.168.11.x (outside) tries to access 192.168.14.x which is an internal network that's not directly attached to the pix inside interface (the pix has an internal IP as a gateway in order to get to the 192.168.14.x network).
Perhaps a static (inside,outside) 192.168.14.0 192.168.14.0 netmask 255.255.255.0 would do the job ?
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :