我的pix的vpn的remote-to-site的ipsec的配置!
8 w% J" o/ R5 m4 N# ~( O6 A5 M" V4 S2 R$ S2 \+ ~: ^
vpngroup vpnclient address-pool vpnpool
3 \% @% K, E8 x8 i, v# Zvpngroup vpnclient dns-server 202.96.209.5 202.96.209.133
0 w, O# t( a& o% t1 G0 Yvpngroup vpnclient split-tunnel vpnclient_splitTunnelAcl J/ y1 V5 |9 n c
vpngroup vpnclient idle-time 18004 n5 Y& w3 B, l0 T4 r% A
vpngroup vpnclient password ********% z& q5 |( V8 z' d: u7 ^
; Q. [3 O8 i1 v" a& ?
另外的acl是:
3 K1 E- v4 _. I! S0 d( D, saccess-list vpnclient_splitTunnelAcl line 1 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=0) 2 C; _% {, |! V: M
3 r6 D' X7 @; s' I- l
access-list no_nat line 2 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=3009)& [, y/ {( z5 V6 M* y' Q
7 _, V$ N. }7 i/ ] |
nat (outside) 0 no_nat2 m" V, F' Q, G- b% @
% U+ Z' @: R8 h8 J) ~/ S以上是remote-to-site的vpn能甬道的配置!
# [* D; B! w, r! |. N0 r2 `; d0 Z有了vpngroup ***** split-tunnel vpnclient-splittunnelacl,按照道理来说,vpn 客户端访问内网的时候走的应该是vpnclient_splitTunnelAcl 这个访问列表;) K/ \/ \: l$ o, l9 x- G
但是事实证明走的还是no_nat这个访问列表!& H9 b( n0 }% E3 F
- s, J2 G/ W9 a T+ p+ P请高手解释一下,为什么? |