Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 
Step-by-Step Configuration and Troubleshooting Best Practices for the NGFW, NGIPS and AMP Technologies A Visual Guide to the Cisco Firepower Threat Defense (FTD)
New Member

VPN issue


we have using PIX 515E and connected a site to site vpn between headoffice and branch office

In our PIX we used three interface

O/S - X.X.80.5

I/S - 10.195.21.X -------Vlan 5 in core switch

I/S 2 - 10.195.1.X ------vlan 6 in core switch

the VPN are working between I/S 2 and remote office but when i ping 10.195.21.X its not pinging

interface Ethernet1

nameif inside

security-level 100

ip address 10.195.21.X


interface Ethernet2

nameif inside2

security-level 80

ip address 10.195.1.X

the config is

access-list 101 extended permit ip

access-list 124 extended permit ip

global (outside) 1 interface

nat (inside) 1

nat (inside2) 0 access-list 101

nat (inside2) 1

whether it will work if i add no nat for inside also

or need to some ACL to allow remote network to access inside network


Re: VPN issue

Looks like you also need a nat 0 for inside.

access-list 102 extended permit

nat (inside) 0 access-list 102

then fix the net and mask for your other acl...

access-list 101 extended permit ip

nat (inside2) 0 access-list 101

New Member

Re: VPN issue

can i use the same access-list 101 for inside also

like nat (inside) 0 access-list 101

is any problem using this


Re: VPN issue

Like this?

access-list 101 extended permit ip

nat (inside) 0 access-list 101

nat (inside2) 0 access-list 101

Yes you can, it should work that way, but it is better to separate them in my opinion.

New Member

Re: VPN issue

is there any specfic reason for seperating the access-list


Re: VPN issue

It looks nicer!

CreatePlease to create content