Our VPN is comprised of a ASA 5510 at the hub and ASA 5505s at the spokes. Presently bidirectional communication is possible between all spokes and the hub; however, spoke to spoke communication is impossible. In an attempt to add spoke to spoke communication I added the following commands to our 5510 and two of the 5505s:
ASA 5510 (central site, 10.20.0.0)
same-security-traffic permit intra-interface
access-list 27351_to_13765 extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list 13765_to_27351 extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
access-list nonat extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list nonat extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
nat (inside) 0 access-list nonat
ASA 5505 (remote site, 10.101.0.0)
same-security-traffic permit intra-interface
access-list vpn_to_27351 extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
access-list nonat extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
nat (inside) 0 access-list nonat
ASA 5505 (remote site, 10.123.0.0)
same-security-traffic permit intra-interface
access-list vpn_to_13765 extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list nonat extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
nat (inside) 0 access-list nonat
After making those changes I think it should work; however, it does not. Additionally, I don't fully understand the purpose of the "nat (inside) 0 access-list nonat" command; however, I added it following some reading on the Cisco website.
Thoughts?
Richard
ASA 5510 (central site, 10.20.0.0)
same-security-traffic permit intra-interface
access-list 27351_to_13765 extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list 13765_to_27351 extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
access-list nonat extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list nonat extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
nat (inside) 0 access-list nonat
ASA 5505 (remote site, 10.101.0.0)
same-security-traffic permit intra-interface
access-list vpn_to_27351 extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
access-list nonat extended permit ip 10.101.0.0 255.255.255.0 10.123.0.0 255.255.255.0
nat (inside) 0 access-list nonat
ASA 5505 (remote site, 10.123.0.0)
same-security-traffic permit intra-interface
access-list vpn_to_13765 extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
access-list nonat extended permit ip 10.123.0.0 255.255.255.0 10.101.0.0 255.255.255.0
nat (inside) 0 access-list nonat
After making those changes I think it should work; however, it does not. Additionally, I don't fully understand the purpose of the "nat (inside) 0 access-list nonat" command; however, I added it following some reading on the Cisco website.
Thoughts?
Richard