Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations gkittelson on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

VPN IPSec:ASA with two interfaces connected to a firewall 1

Status
Not open for further replies.

arthis

Technical User
Jul 22, 2009
2
FR
Hi,

I'm a new beginner in ASA and I'd like your point of view in a VPN design architecture.

As you can see on the jpg, an ASA has two interfaces (inside and outside), both connected to a firewall.
The outside interface has a public address.

Question: Which adresses pool should I configure on the ASA for the remote clients in order to set a remote Acces VPn IPsec connection ??
- Pool range taken from the 192.168.163.0/24
or - Pool range taken from the 172.26.0.0/16

I think the correct answer is 192.168.163.0/24 but the ASA should push 192.168.163.254 as the default gateway for the clients to be able to go on the Corporate LAN.

Thanks for any answers.

snap1qyq.jpg
 
Pool range taken from the 172.26.0.0/16 this is the subnet your LAN is on. just have your VPN users be on 172.26.50.0 or whatever, have your LAN be 172.16.40.0
 
Thanks a lot North323,

I see. In this case, I should configure some static routes on the ASA and specify 192.168.163.254 (firewall interface) as the gateway, for exemple:
route inside 172.26.40.0 255.255.0.0 192.168.163.254

and also configure a static route on the firewall and specify the inside interface of the ASA as the gateway:
route 172.26.50.0 255.255.0.0 192.168.163.253

 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top