Not sure this is in right area but thought I would start here.
Have a client with a Catalyst 3650 at the main location. There are multiple VLAN's on this switch. Communications department was originally setup with a 129.9.200.x network address. This was causing some issues and needed to be changed. So to match the rest of the network scheme, it was changed to a 10.129.0.0 network with a /16 subnet mask.
Prior to this change, the Engineers office which is a 10.80.0.0 network could dial in to a machine at 188.8.131.52 via PPTP and access an application. After changing the IP to 10.129.0.25 yesterday, this connection no longer works. I have reviewed the configuration on the main office switch, the configuration on the Pix at the main location and cannot find anything that I missed that would prevent this connection. I have changed the PPTP connection on the machine at the other end to point to the new IP and still nothing.
This leads to the second part of the question. I have multiple cruisers with Verizon air cards (static ip's) that connect via PPTP to the main office Pix. From there, they need to do a second PPTP connection to the 10.129.0.25 machine to get access to the application. Is this possible? I tried everythign I could think of yesterday to no avail and am just simply out of ideas. If it's not even possible and I'm banging my head for no reason, it would be good to know.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...