Hi there,
i spent days, trying to figure out how i could limit network access for L2TP-VPN Users... i finally gave up [:@]
I hope someone here can help me with this.
Here is the scenario
1x ASG 220 (7.3.0.6)
1 Interface (eth0)is connected to the WAN (static IP) - 1 (eth1) is connected to the local LAN (192.168.192.x/24).
The roadwarriors use SSL-VPN to connect to the local network (works fine)
PPTP is used to connect VOIP-Phones around town to the local PBX (works fine)
Now here is my problem:
I connected a second WAN interface (eth8) to the AGS and configured it.
I can reach it (ping the new external IP) from the outside - so I guess everything is ok.
I also created a new local subnet on eth7 (192.168.200.x/24).
External customers are supposed to connect via L2TP to this new internal network (192.168.200.x/24) on eth7.
I created a new L2TP-VPN-Pool for those customers, gave it 192.168.200.0/24 and bounded it to the second external interface.
This works too... but when I test the connection (connect as a customer, using L2TP) I can reach BOTH internal networks (192.168.192.x/24 AND 192.168.200.0/24)
I tried packet filters, routing, Dnat, Snat... to resctrict the access to the internal network (192.168.192.0/24) but whatever I did, I was still able to reach it.
I'm quite sure, that this is a damn small problem and I get furious, that I don't see it *lol*
To summarize:
L2TP-Users should have acces to 192.168.200.0/24 and NOT 192.168.192.0/24
I hope, I was able to make this scenario understandable [:)]
If you need any additional information - plz let me know.
Excuse my bad english (it's not my native language - I'm a german guy)
Hopefully someone can help me with this.
thx a lot
This thread was automatically locked due to age.