Thanks for the tips!
I'm going to test it as soon as I get time, hopefully already today.
I already have "same-security-traffic permit intra-interface" on both site A and B cisco configuration. Do you mean something else?
/ms
Hi PScottC!
Had been a busy week so I hadn't have time to respond :-(
Here is the config:
Site-A
nat (Outside) 1 10.10.6.0 255.255.255.0
nat (Inside) 0 access-list Inside_nat0_outbound
nat (Inside) 1 0.0.0.0 0.0.0.0
access-list inside extended permit ip any any
access-list outside extended...
No, now I get nothing :-)
Nothing for that network session.
I'm going to read a lot this weekend so maybe I figure out what's wrong :-)
If you come up with some idea pleas let me know.
/ms
Hi, thanks for the advice.
But it didn't work :-(
I see that the traffic goes through the VPN-tunnel and the cisco but intstead of staing behinde the firewall it goes out to the internet via our ISP. No traffic to network 10.4.6.0/24.
The log-viewer says:
10.10.6.255 No translation group...
Hi, thanks for the help.
I have been troubleshooting this and what I see is that when the user tries to access the internal resource 10.4.6.15, on site-B, the traffic dosn't go trhough the Cisco ASA. The traffic goes just through my ISP right out into the net...
I've been trying with nat...
Hi!
I have to offices, A(10.0.6.0/24) and B(10.4.6.0/24), being A the primary site into wich everybody can login via VPN(10.10.6.0/24).
Being on site A I can access all resources on site B and I'm happy. But if I login via VPN to site A I can't access site B.
All I get is...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.