In addition this command i have an access-list applied to the outbound interface inbound which permits icmp, ssh. When i VPN to the Pix, the tunnel is established, but, i can not sent traffic across the network behind the Pix. I see the packets encrypted at my workstation, but, no decriptions.
Would i have to open up gre on the access-list applied inbound on the outside interface, but, thought sysopt connection permit-ipsec took care of that.
also when i get an ip address from the PIX after VPNing, it does not have a default gateway in it, I find that very strange, any thoughts?
Glenn probably hit the nail on the head but I thought I would go ahead and add one other (probably obvious) thought. Make sure the network behind the PIX that you cannot get to has a route for the pool of addresses that you hand to the VPN clients pointing back to the inside interface on the PIX. If you default routes pointing to the inside interface of the PIX from your entire network, then you are good to go. Just a thought....
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...