Forums before death by AOL, social media and spammers... "We can't have nice things"
|    comp.dcom.vpn    |    VPN protocols, clients, awesomeness    |    2,349 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 617 of 2,349    |
|    TEM to Suppa Lamah    |
|    Re: Cisco 837 to Cisco 837 VPN, ping OK,    |
|    19 Dec 03 13:15:06    |
      XPost: comp.dcom.sys.cisco       From: temartin@shtc.net              I think the following will cover it.              int loopback1              ip address 172.16.1.1 255.255.255.0                            int e0              ip policy route-map nonat                            route-map nonat permit 10               match ip address 120               set ip next-hop 172.16.1.2                            access-list 120 permit ip 192.168.1.0 0.0.0.255 10.1.1.0 0.0.0.255                            ip nat inside source list 102 interface e0                            access-list 102 deny ip 192.168.1.0 0.0.0.255 10.10.10.0 0.0.0.255              access-list 102 permit ip 192.168.1.0 0.0.0.255 any                                          where the responding LAN is the 192 address and the 10 address is the       initiating address.                            The idea is to block VPN traffic from the outbound interface (and NAT) and       route it to the loopback. The VPN traffic goes to the loopback, comes back       out to the outbound interface and is not recognized as needing NAT.                            I'm sure this is not the most graceful way to do it but it worked for me.                                          "Suppa Lamah" |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca