Already got it working today thanks to this cisco document http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807f9a89.shtml
Just needed to add the following line to allow traffic between the different vpn tunnels:)
same-security-traffic permit intra-interface
Sorry for the late reaction. Been busy with other stuff.
I did try your suggestion, but still not working. See the new config below.
Client vpn subnet is 192.168.100.0/24
Internal subnet of the asa is 192.168.1.1/24
Subnet of the remote site behind the Site-to-Site tunnel is 192.168.2.0/22
If I...
Hi,
We use a Cisco ASA 5505 as firewall for our branche office. On this ASA we have a Site-to-Site VPN tunnel running to our main office. Communication between all devices on both networks is allowed.
We are now trying to setup client vpn on the ASA to access the local network of the branch...
Lol! Thanks for the input. Made me laugh..
But I get the picture. This is way to complicated to be a viable option for us. Will just create the privilege levels and give him the cli commands he needs for the items he needs to be able to modify.
Please find attached my fictional and simplified config. I have been testing with this some more today and it seems that only the tcp rules in the ACL's are not working. Udp and esp are working fine. I have to change the rules with tcp into IP protocol to make it work. I am stunned. Hope you can...
I am trying to configure a cisco ASA 5510 with 2 different DMZ interfaces.
Outside interface is security lvl 0, inside is security lvl 100 and the 2 DMZ interfaces are security lvl 50.
I have 1 public ip range that I route with static NAT rules to the hosts in the different DMZ interfaces...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.