In article , LLFF wrote: :access-list inside_outbound_nat0_acl permit ip any 10.0.*.* 255.255.255.*
:ip address inside 10.0.*.* 255.255.255.*
:nat (inside) 0 access-list inside_outbound_nat0_acl
For outgoing traffic, the ACL for a nat 0 access-list is read with the left address being the source (inside) IP and the right address being the destination (outside) IP. For incoming traffic, the ACL is read in reverse, with the right address used for the source and the left for the destination.
Thus, your nat 0 access-list statement indicates that traffic
*to* 10.0.
*.* is exempt from NAT.
But your "ip address inside" statement indicates that the
10.0.
*.* addresses are
*inside*, not on the far side of the link.
If this is not a side effect of over-obfuscation for posting purposes, then you will need to correct this.
It is, by the way, always better for nat 0 access-list to be as restrictive as feasible. Don't use 'any' as the source, use the inside IP range. Similarily, it is always better for the plain nat, nat (inside) 10 in your case, to be specific instead of using
0.0.0.0 0.0.0.0 .
Consider, for example, what happens when one of your hosts randomly DHCPs into the private range 169.254.x.x and then tries sending traffic out. The traffic will be permitted unless you specifically block such things, because the nat statement allows 0/0 to be translated to the global IP. If the traffic is to the outside, replies to it will get as far as the PIX on the return and be de-nat'd, but then will be dropped because the PIX will see that the route to 169.254 is via the outside interface which is where the reply packet just came from. If the traffic was destined across the VPN, then the other end will still be able to reply and the other end will forward the 169.254 packet along the default route which will punt it back to the PIX... where again it will be dropped. But in the meantime, in either case the remote end will have acted on the packet.
Now consider what happens if you get a virus loose inside and it starts forging all kinds of packets with random source IP addresses...