我的pix的vpn的remote-to-site的ipsec的配置!
: T, w4 _' I3 N& ]% J8 K8 Q& Q& J$ P0 D5 C8 h4 Z5 Z
vpngroup vpnclient address-pool vpnpool3 {1 q) @, U2 v/ h$ V* C8 P" K& R3 J
vpngroup vpnclient dns-server 202.96.209.5 202.96.209.133 y2 U8 q. F2 C0 Y9 \) a
vpngroup vpnclient split-tunnel vpnclient_splitTunnelAcl
8 B7 f j( _. R4 pvpngroup vpnclient idle-time 18008 s/ V7 R1 u5 G! u% I3 g
vpngroup vpnclient password ********" ?% P5 t: e, G! f. A+ `
8 I) E. w) ^ _另外的acl是:
S$ Q8 B; l, Gaccess-list vpnclient_splitTunnelAcl line 1 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=0)
* P( Q1 G- e* X
8 |& e$ a1 b, S) j! @; Laccess-list no_nat line 2 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=3009)
# }$ l0 c! C( i* e( P4 {$ V8 ^/ _+ ` g) T% S/ _( I
nat (outside) 0 no_nat
* s0 {( q+ x7 w" q( F
4 A K" }+ |/ y, }- Q, K2 u$ E" h以上是remote-to-site的vpn能甬道的配置!
2 i/ f E( e5 l9 s& G- b有了vpngroup ***** split-tunnel vpnclient-splittunnelacl,按照道理来说,vpn 客户端访问内网的时候走的应该是vpnclient_splitTunnelAcl 这个访问列表;! ?. Q; i. \1 ?/ Z
但是事实证明走的还是no_nat这个访问列表!
0 Z* y2 e' J6 ^, Z) w& C% l) {+ b" g/ J& F7 B; u$ E
请高手解释一下,为什么? |