PIX515 VPN - connected - but cannot access internal network
I am using a PIX-515R and the Secure VPN Client 3.5.2. I am able to successfully authenticate and establish a connection however I am unable to ping any host on LAN/DMZ/WWW when connected.
ipconfig /all reveals that the IP address on my NIC has not changed, and I understand that it is supposed to be replaced with the VPN IP address, and other IP addressing information specified by the vpngroup command.
Clicking on the padlock in the system tray under general, it appears that the VPN Client has successfully obtained a IP address from the VPN clients pool, however under the statistics tab I can see no secured routes to the internal network. I see 2 entries:
1) 0.0.0.0, 0.0.0.0
2) 203.47.xxx.200, 255.255.255.255
This is consistent with the information provided by the route print command.
Does anyone know what I am doing wrong? Any gotchas?
Here's some of the config from the firewall:
access-list nonat permit ip 10.0.0.0 255.0.0.0 10.0.0.0 255.0.0.0
access-list nonat permit ip 10.0.0.0 255.0.0.0 192.168.1.0 255.255.255.0
access-list nonat permit ip 192.168.1.0 255.255.255.0 10.1.100.0 255.255.255.0
access-list nonat permit ip 192.168.1.0 255.255.255.0 10.0.0.0 255.0.0.0
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :