I have a Cisco 3620 acting as VPN gateway IPSEC 3DES. My ACL only permits ESP and UDP500 inbound on the external interface. My VPN clients can initiate and establish the VPN connection, my router assigns an IP address from my IP local in the router. Then when my VPN client wants to pass traffic pass the VPN gw the inbound ACLc stops any traffic coming from the ip addresses assigned to the VPN client (local pool). In my opinion this behaviour is incorrect as there is no reason for ACL to allow traffic which is part of my local pool, this can lead to vulnerability on my network via this GW.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...