PIX VPN: can't see the whole network

I just set up VPN on a PIX 525, and I need some assistance. Our network consists of networks in either or With these networks, we may have subnets such as, (you get the idea). So when setting up the VPN, here's the lines I used:

access-list split-tunnel permit ip access-list split-tunnel permit ip


access-list nat0 permit ip access-list nat0 permit ip

Ok, from what I know from my limited experience, I expect that everyone coming in via VPN should have access to the and networks. But that doesn't appear to be the case....since some servers and other equipment within those networks aren't accessible when connected via VPN (By the way, the Cisco VPN client is showing the "secured routes" as being and

An example would be servers or routers/switches on I simply can't access them when I'm connected via this PIX VPN. When I try to ping their IP addresses, it simply times out. Can someone please help my in figuring out why I can access "most" equipment on my two networks while I can't access others?

Thanks much in advance!

Reply to
Jon Doe
Loading thread data ...

That's really what I'm trying to figure out. Also, as I mentioned before, this is not a case in which the VPN clients can't get *anywhere* on the network. For instance, when I connect from home to VPN, I'm able to get to most (I'll give a rough estimate of 85%) of whatever I need to get access to. By the way, we're very heavy into VLANs here... in case that might have anything to do with it.

So, it's only a few VLANs here and there that I cannot get access to. The main reason I got word of this problem was that while connected to this new VPN, we can no longer get access to a few of our routers or switches... so we can't administer them while at home (which we really need to be able to do).

I should also mention here that the whole reason for the cisco vpn is that we're trying to get rid of the microsoft pptp vpn currently in place. When connected to the microsoft vpn, I have access to *everything*.

Reply to
Jon Doe

Are you absolutly certain, that this is not a simple route issue ?

meaning that the 10nw knows the route back to the Cisco VPN Clients ... (try from a server to ping the clients) and that you do not have any personal firewall services installed on servers/clients

else try post your cfg

hth Martin Bilgrav
Reply to
Martin Bilgrav

please verify our route-statements/protocols, and if there is any VACLs in place, ACL on routers etc. The IP pool used for VPN must be routed and allowed.




"Jon Doe" skrev i en meddelelse news: snipped-for-privacy@comcast.com...

Reply to
Martin Bilgrav

Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here. All logos and trade names are the property of their respective owners.