William,
Off topic, can I ask why you are always pushing that ipcop crap on here so much? For the free OSS firewalls there are much better than ipcrap.
William,
I am using IPSEC and L2TP through my ASG beta no problem.
I use the Cisco IPSEC client with zero problems, and the Windows L2TP no problem.
Off topic, can I ask why you are always pushing that ipcop crap on here so much? For the free OSS firewalls there are much better than ipcrap.
Hi William,
Looking through this thread there seems to be only one NAT masq specified. Does your L2TP vpn use the same network pool as your internal network as assigned by DHCP or is it using the default L2TP VPN pool network?
If using L2TP Vpn pool network you will need a second NAT Masq for the VPN network to the external interface in order to pass traffic to the external world.
Also if you are using this ASG box as your non-default gateway for your internal PCs try setting a SNAT rule such as:
Source: L2TP network
Destination: Internal(network)
Service: Any
Change Source: Internal(address)
This will effectively masq the L2TP pool as the ASG address for return traffic.
Hi William,
Looking through this thread there seems to be only one NAT masq specified. Does your L2TP vpn use the same network pool as your internal network as assigned by DHCP or is it using the default L2TP VPN pool network?
If using L2TP Vpn pool network you will need a second NAT Masq for the VPN network to the external interface in order to pass traffic to the external world.
Also if you are using this ASG box as your non-default gateway for your internal PCs try setting a SNAT rule such as:
Source: L2TP network
Destination: Internal(network)
Service: Any
Change Source: Internal(address)
This will effectively masq the L2TP pool as the ASG address for return traffic.