我的pix的vpn的remote-to-site的ipsec的配置!$ D. @2 s9 c) }6 K
2 F4 f5 W5 N! R' A4 x3 }
vpngroup vpnclient address-pool vpnpool4 R8 {) [* B, z+ s9 u
vpngroup vpnclient dns-server 202.96.209.5 202.96.209.1330 e& L( b8 r+ e
vpngroup vpnclient split-tunnel vpnclient_splitTunnelAcl
: J- N1 e4 I% g" m* J( H" T6 C& Zvpngroup vpnclient idle-time 1800
- F+ b4 c. \( p z& j3 Gvpngroup vpnclient password ********- U( y! f# \. ?" [8 k8 A$ Q3 a
3 ^ B' _- V0 Z0 I+ U4 b另外的acl是:
: A/ X% y$ n* S u- ?. a, J9 F7 o: aaccess-list vpnclient_splitTunnelAcl line 1 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=0)
7 a5 B2 u, C8 k8 q& S/ N- M% m( S ^" r; B) t% U1 ~
access-list no_nat line 2 permit ip 192.168.1.0 255.255.255.0 192.168.100.240 255.255.255.240 (hitcnt=3009)
6 W: w. W6 w+ J- h; X( i) w! P1 E# \% ~7 k! o J( g
nat (outside) 0 no_nat
& V9 O" O, X* F$ v: ^! G6 f# q3 g8 n: `; C
以上是remote-to-site的vpn能甬道的配置!
d4 b$ i) M; o有了vpngroup ***** split-tunnel vpnclient-splittunnelacl,按照道理来说,vpn 客户端访问内网的时候走的应该是vpnclient_splitTunnelAcl 这个访问列表;
' M. U I. o% u2 t: e但是事实证明走的还是no_nat这个访问列表!, x( D& m/ G0 G& n' f2 A9 N
: c. R# X2 d4 H1 M7 C$ \2 ?
请高手解释一下,为什么? |