Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 
Community Member

Network neighborhood browsing thru vpn


I have nearly the same problem, what my friend has a couple of threads b4.

At my customer's place I am using pix 501 witha small microsoft network with client server architecture having wins and dns installed. Checked vpn using pptp server without using pix everything works, even network neighborhood works.

But after adding pix 501, I had configured vpdn group on pix to have vpn, and gave my clients connecting using vpn client from microsoft ip address of local pool, and did nat 0, everything works, they can access all resources on the network, I can acess there laptops and even see there shares using ip from my local pool used in pix, but they cannot see the server using network neighborhood.

Pls help this is very important for us, otherwise no payment.

Here is configuration with false ips.

name sbs2k

access-list nonat permit ip

ip local pool bigpool

global (outside) 1 interface

nat (inside) 0 access-list nonat

vpdn group 1 accept dialin pptp

vpdn group 1 ppp authentication mschap

vpdn group 1 ppp encryption mppe auto required

vpdn group 1 client configuration address local bigpool

vpdn group 1 client configuration dns sbs2k

vpdn group 1 client configuration wins sbs2k

vpdn group 1 client authentication aaa topix

vpdn group 1 pptp echo 60

vpdn username vpn password ********

vpdn enable outside

Thanks in advance,


Cisco Employee

Re: Network neighborhood browsing thru vpn

Config looks OK, assuming the WINS servers are being passed down correctly. You could try adding this WINS server address into the lmhosts file on the individual PC's and see if that makes a difference. Do you have the "sysopt connection permit-pptp" command in the PIX, make sure you do.

CreatePlease to create content