<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Giving another VLAN access to a VTI tunnel on an ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021970#M1109338</link>
    <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Sorry this was me testing, the subnet is actually 192.168.64.0/21 but we only need the 192.168.67.0/24. I have removed this and put in the correct one now:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;S        192.168.67.0 255.255.255.0 [1/0] via 192.168.254.10, DC1-PW
C        192.168.254.8 255.255.255.254 is directly connected, DC1-PW
L        192.168.254.9 255.255.255.255 is directly connected, DC1-PW&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Feb 2024 14:13:09 GMT</pubDate>
    <dc:creator>aligidpro</dc:creator>
    <dc:date>2024-02-21T14:13:09Z</dc:date>
    <item>
      <title>Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021900#M1109325</link>
      <description>&lt;P&gt;Hey Guys,&lt;/P&gt;&lt;P&gt;I have got a problem with a VTI site to site tunnel we created between two ASA's.&lt;/P&gt;&lt;P&gt;The VTI tunnel is up and running and we can use it to access the other site, however on site B we have an extra VLAN which also need access to the subnet on the other side but I can't seem to get it to work.&lt;/P&gt;&lt;P&gt;Site A:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface Tunnel1
nameif PW-DC1
ip address 192.168.254.10 255.255.255.254
tunnel source interface OUTSIDE
tunnel destination 82.XXX.XXX.XX
tunnel mode ipsec ipv4
tunnel protection ipsec profile GP-UNIVERSAL-PROFILE

tunnel-group 82.XXX.XXX.XX type ipsec-l2l
tunnel-group 82.XXX.XXX.XX general-attributes
default-group-policy GP-GROUP-POLICY
tunnel-group 82.XXX.XXX.XX ipsec-attributes
peer-id-validate nocheck
ikev2 remote-authentication pre-shared-key XXXXX
ikev2 local-authentication pre-shared-key XXXXX

access-list PW-DC1-TUNNEL_access_in extended permit ip any any
access-list PW-DC1-TUNNEL_access_in extended deny ip any any

access-group PW-DC1-TUNNEL_access_in in interface PW-DC1


route PW-DC1 10.30.5.0 255.255.255.0 192.168.254.9 1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;interface Tunnel3005
nameif DC1-PW
ip address 192.168.254.9 255.255.255.254
tunnel source interface OUTSIDE
tunnel destination 185.XXX.XXX.X
tunnel mode ipsec ipv4
tunnel protection ipsec profile GP-UNIVERSAL-PROFILE

tunnel-group 185.XXX.XXX.X type ipsec-l2l
tunnel-group 185.XXX.XXX.X general-attributes
default-group-policy GP-GROUP-POLICY
tunnel-group 185.XXX.XXX.X ipsec-attributes
peer-id-validate nocheck
ikev2 remote-authentication pre-shared-key XXXX
ikev2 local-authentication pre-shared-key XXXX

access-list DC1-PW-TUNNEL_access_in extended permit ip any any
access-list DC1-PW-TUNNEL_access_in extended deny ip any any

access-group DC1-PW-TUNNEL_access_in in interface DC1-PW


route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;The tunnel works however I want to give VLAN3005 also access to the subnet 192.168.67.X. If I create a route on a windows server on vlan 3005) using:&amp;nbsp;route -p add 192.168.67.0 mask 255.255.255.0 10.30.5.254 (this is the asa/gateway), the tunnel works but we have a lot of clients and I can't do this on every client. Is there a way to make this work?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021900#M1109325</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T13:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021912#M1109326</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687117"&gt;@aligidpro&lt;/a&gt; do the windows clients use the ASA as the default gateway? How is the routing setup on the LAN?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:30:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021912#M1109326</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T13:30:48Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021924#M1109327</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;The clients use the ASA as gateway. We only have 1 route to the outside&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route OUTSIDE 0.0.0.0 0.0.0.0 XXX.XXX.XXX.X 1&lt;/LI-CODE&gt;&lt;P&gt;And a few other routes for all the vti tunnels we have set up&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021924#M1109327</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T13:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021931#M1109328</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687117"&gt;@aligidpro&lt;/a&gt; so if the ASA is the default gateway for the clients you need to add static routes to the next hop tunnel interface, do this on both ASAs. Or just enable a routing protocol and redistribute the routes.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:46:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021931#M1109328</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T13:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021936#M1109329</link>
      <description>&lt;P&gt;Can i see show route in both sites&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:48:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021936#M1109329</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-21T13:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021940#M1109330</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;We have tried the following but with no succes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route VLAN3005 192.168.67.0 255.255.255.0 10.30.5.254 1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We get the error:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ERROR: Invalid next hop address 10.30.5.254, it matches our IP address&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also tried&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route VLAN3005 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/LI-CODE&gt;&lt;P&gt;But this doesn't work, the clients still have no access to the other subnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021940#M1109330</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T13:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021949#M1109333</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Here are the routes:&lt;/P&gt;&lt;P&gt;SITE A:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Gateway of last resort is 82.XXX.XXX.6 to network 0.0.0.0

S*       0.0.0.0 0.0.0.0 [1/0] via 185.XX.XX.5, OUTSIDE
C        10.11.0.0 255.255.0.0 is directly connected, VLAN2
L        10.11.254.254 255.255.255.255 is directly connected, VLAN2
S        10.30.5.0 255.255.255.0 [1/0] via 192.168.254.9, PW-DC1
C        10.67.10.0 255.255.255.0 is directly connected, VLAN10
L        10.67.10.254 255.255.255.255 is directly connected, VLAN10
C        10.68.10.0 255.255.255.0 is directly connected, VLAN11
L        10.68.10.253 255.255.255.255 is directly connected, VLAN11
C        10.194.194.14 255.255.255.254 is directly connected, PW-DC2
L        10.194.194.15 255.255.255.255 is directly connected, PW-DC2
C        82.XX.XX.4 255.255.255.252 is directly connected, OUTSIDE
L        82.XX.XX.6 255.255.255.255 is directly connected, OUTSIDE
S        192.168.8.0 255.255.252.0 [1/0] via 10.194.194.16, PW-DC2
C        192.168.16.0 255.255.255.0 is directly connected, VLAN200
L        192.168.16.254 255.255.255.255 is directly connected, VLAN200
C        192.168.64.0 255.255.248.0 is directly connected, VLAN1
L        192.168.67.254 255.255.255.255 is directly connected, VLAN1
C        192.168.254.10 255.255.255.254 is directly connected, PW-DC1
L        192.168.254.10 255.255.255.255 is directly connected, PW-DC1&lt;/LI-CODE&gt;&lt;P&gt;SITE B: (i have removed some vlans that to make it shorter but kept all the important vlans)&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;S*       0.0.0.0 0.0.0.0 [1/0] via 185.XXX.XXX.1, OUTSIDE
C        10.0.1.0 255.255.255.0 is directly connected, MNGT
L        10.0.1.1 255.255.255.255 is directly connected, MNGT
C        10.0.2.0 255.255.255.0 is directly connected, OOB
L        10.0.2.1 255.255.255.255 is directly connected, OOB
C        10.16.255.0 255.255.255.252
           is directly connected, vti-DC1-ASA-20.XXX.XXX.54
L        10.16.255.1 255.255.255.255
           is directly connected, vti-DC1-ASA-20.XXX.XXX.54
C        10.29.99.0 255.255.255.0 is directly connected, VLAN2999
L        10.29.99.254 255.255.255.255 is directly connected, VLAN2999
C        10.30.2.0 255.255.255.0 is directly connected, VLAN3002
L        10.30.2.254 255.255.255.255 is directly connected, VLAN3002
C        10.30.5.0 255.255.255.0 is directly connected, VLAN3005
L        10.30.5.254 255.255.255.255 is directly connected, VLAN3005
C        10.30.7.0 255.255.255.0 is directly connected, VLAN3007
L        10.30.7.254 255.255.255.255 is directly connected, VLAN3007
B        10.255.0.0 255.255.240.0 [20/0] via 10.255.1.254, 2d10h
S        10.255.1.254 255.255.255.255
           [1/0] via 10.16.255.2, vti-DC1-ASA-20.XXX.XXX.54
S        20.XXX.XXX.54 255.255.255.255 [1/0] via 185.XXX.XXX.1, OUTSIDE
B        172.16.0.0 255.255.0.0 [20/0] via 10.255.1.254, 2d10h
C        172.16.0.0 255.255.255.0 is directly connected, VLAN1
L        172.16.0.1 255.255.255.255 is directly connected, VLAN1
S        172.16.80.0 255.255.252.0 [1/0] via 192.168.254.6, DC1-DC2
C        185.XXX.XXX.0 255.255.255.0 is directly connected, OUTSIDE
L        185.XXX.XXX.4 255.255.255.255 is directly connected, OUTSIDE
S        192.168.8.0 255.255.252.0 [1/0] via 192.168.254.6, DC1-DC2
S        192.168.64.0 255.255.248.0 [1/0] via 192.168.254.10, DC1-PW
S        192.168.114.0 255.255.254.0 [1/0] via 192.168.254.2, DC1-OFFICE
C        192.168.254.0 255.255.255.254 is directly connected, DC1-OFFICE
L        192.168.254.1 255.255.255.255 is directly connected, DC1-OFFICE
C        192.168.254.4 255.255.255.254 is directly connected, DC1-DC2
L        192.168.254.5 255.255.255.255 is directly connected, DC1-DC2
C        192.168.254.8 255.255.255.254 is directly connected, DC1-PW
L        192.168.254.9 255.255.255.255 is directly connected, DC1-PW&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021949#M1109333</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T13:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021950#M1109334</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687117"&gt;@aligidpro&lt;/a&gt; the next hop would be the remote tunnel interface, which is either 192.168.254.10 or .9 depending on which ASA the route is being configured on.&lt;/P&gt;
&lt;P&gt;You are using the incorrect nameif aswell, example:&lt;/P&gt;
&lt;P&gt;Site A&lt;BR /&gt;route &lt;STRONG&gt;PW-DC1&lt;/STRONG&gt; &amp;lt;subnet&amp;gt; &amp;lt;mask&amp;gt; 192.168.254.9&lt;/P&gt;
&lt;P&gt;Site B&lt;BR /&gt;route &lt;STRONG&gt;DC1-PW&lt;/STRONG&gt; 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 13:58:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021950#M1109334</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T13:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021961#M1109336</link>
      <description>&lt;LI-CODE lang="markup"&gt;S        192.168.64.0 255.255.248.0 [1/0] via 192.168.254.10, DC1-PW &amp;lt;&amp;lt;- this I think overlapping with prefix you need to add
&lt;/LI-CODE&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (125).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/210750i29AF0066D20492EC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (125).png" alt="Screenshot (125).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:03:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021961#M1109336</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-21T14:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021965#M1109337</link>
      <description>&lt;P&gt;I got the following:&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/LI-CODE&gt;&lt;P&gt;But with this I will need to add a static route on the client itself&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What do you mean incorrect nameif? I have chosen to not give it the same nameif on both sites so others can see which site is which or do you mean something else?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021965#M1109337</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T14:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021970#M1109338</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;Sorry this was me testing, the subnet is actually 192.168.64.0/21 but we only need the 192.168.67.0/24. I have removed this and put in the correct one now:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;S        192.168.67.0 255.255.255.0 [1/0] via 192.168.254.10, DC1-PW
C        192.168.254.8 255.255.255.254 is directly connected, DC1-PW
L        192.168.254.9 255.255.255.255 is directly connected, DC1-PW&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021970#M1109338</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T14:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021980#M1109339</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687117"&gt;@aligidpro&lt;/a&gt; you said the clients use the ASA as the default gateway. So the clients should route all traffic to the ASA and then the ASA needs routes in place to route the traffic over the VPN.&lt;/P&gt;
&lt;P&gt;The nameif is configured under the ASA interface:&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;interface Tunnel3005&lt;BR /&gt; &lt;STRONG&gt;nameif DC1-PW&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:16:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021980#M1109339</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T14:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021989#M1109340</link>
      <description>&lt;P&gt;-friend share the last show route&lt;BR /&gt;check if there is overlapping&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-also you need static route for new subnet only in one side not both&amp;nbsp;&lt;BR /&gt;i.e.&lt;/P&gt;
&lt;P&gt;you add it to &lt;STRONG&gt;PW-DC1&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;then you need to add static route in other side &lt;BR /&gt;route&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;DC1-PW&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;lt;subnet&amp;gt; tunnel IP&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:22:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021989#M1109340</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-21T14:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021999#M1109341</link>
      <description>&lt;P&gt;Hi MHM,&lt;/P&gt;&lt;P&gt;This is the show route:&lt;/P&gt;&lt;P&gt;SITE A&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Gateway of last resort is 82.XXX.XXX.5 to network 0.0.0.0

S*       0.0.0.0 0.0.0.0 [1/0] via 82.XXX.XXX.5, OUTSIDE
C        10.11.0.0 255.255.0.0 is directly connected, VLAN2
L        10.11.254.254 255.255.255.255 is directly connected, VLAN2
S        10.30.5.0 255.255.255.0 [1/0] via 192.168.254.9, PW-DC1
C        10.67.10.0 255.255.255.0 is directly connected, VLAN10
L        10.67.10.254 255.255.255.255 is directly connected, VLAN10
C        10.68.10.0 255.255.255.0 is directly connected, VLAN11
L        10.68.10.253 255.255.255.255 is directly connected, VLAN11
C        10.194.194.14 255.255.255.254 is directly connected, PW-DC2
L        10.194.194.15 255.255.255.255 is directly connected, PW-DC2
C        82.XXX.XXX.4 255.255.255.252 is directly connected, OUTSIDE
L        82.XXX.XXX.6 255.255.255.255 is directly connected, OUTSIDE
S        192.168.8.0 255.255.252.0 [1/0] via 10.194.194.16, PW-DC2
C        192.168.16.0 255.255.255.0 is directly connected, VLAN200
L        192.168.16.254 255.255.255.255 is directly connected, VLAN200
C        192.168.64.0 255.255.248.0 is directly connected, VLAN1
L        192.168.67.254 255.255.255.255 is directly connected, VLAN1
C        192.168.254.10 255.255.255.254 is directly connected, PW-DC1
L        192.168.254.10 255.255.255.255 is directly connected, PW-DC1&lt;/LI-CODE&gt;&lt;P&gt;SITE B:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;S*       0.0.0.0 0.0.0.0 [1/0] via 185.XXX.XXX.1, OUTSIDE
C        10.0.1.0 255.255.255.0 is directly connected, MNGT
L        10.0.1.1 255.255.255.255 is directly connected, MNGT
C        10.0.2.0 255.255.255.0 is directly connected, OOB
L        10.0.2.1 255.255.255.255 is directly connected, OOB
C        10.1.0.0 255.255.255.0 is directly connected, ESXI-MNGT
L        10.1.0.1 255.255.255.255 is directly connected, ESXI-MNGT
C        10.2.0.0 255.255.255.0 is directly connected, AD
L        10.2.0.254 255.255.255.255 is directly connected, AD
C        10.2.1.0 255.255.255.0 is directly connected, Exchange
L        10.2.1.254 255.255.255.255 is directly connected, Exchange
C        10.2.2.0 255.255.255.0 is directly connected, Exchange-Sync
L        10.2.2.254 255.255.255.255 is directly connected, Exchange-Sync
C        10.3.0.0 255.255.255.0 is directly connected, VLAN300
L        10.3.0.1 255.255.255.255 is directly connected, VLAN300
C        10.4.0.0 255.255.255.0 is directly connected, VLAN400
L        10.4.0.254 255.255.255.255 is directly connected, VLAN400
C        10.4.1.0 255.255.255.0 is directly connected, VLAN401
L        10.4.1.254 255.255.255.255 is directly connected, VLAN401
C        10.10.1.0 255.255.255.0 is directly connected, VLAN1001
L        10.10.1.254 255.255.255.255 is directly connected, VLAN1001
C        10.10.2.0 255.255.255.0 is directly connected, VLAN1002
L        10.10.2.254 255.255.255.255 is directly connected, VLAN1002
C        10.10.3.0 255.255.255.0 is directly connected, VLAN1003
L        10.10.3.254 255.255.255.255 is directly connected, VLAN1003
C        10.10.4.0 255.255.255.0 is directly connected, VLAN1004
L        10.10.4.254 255.255.255.255 is directly connected, VLAN1004
C        10.10.5.0 255.255.255.0 is directly connected, VLAN1005
L        10.10.5.254 255.255.255.255 is directly connected, VLAN1005
C        10.10.6.0 255.255.255.0 is directly connected, VLAN1006
L        10.10.6.254 255.255.255.255 is directly connected, VLAN1006
C        10.10.7.0 255.255.255.0 is directly connected, VLAN1007
L        10.10.7.254 255.255.255.255 is directly connected, VLAN1007
C        10.10.8.0 255.255.255.0 is directly connected, VLAN1008
L        10.10.8.254 255.255.255.255 is directly connected, VLAN1008
C        10.10.9.0 255.255.255.0 is directly connected, VLAN1009
L        10.10.9.254 255.255.255.255 is directly connected, VLAN1009
C        10.10.10.0 255.255.255.0 is directly connected, VLAN1010
L        10.10.10.254 255.255.255.255 is directly connected, VLAN1010
C        10.16.255.0 255.255.255.252
           is directly connected, vti-DC1-ASA-20.XXX.XXX.54
L        10.16.255.1 255.255.255.255
           is directly connected, vti-DC1-ASA-20.XXX.XXX.54
C        10.20.0.0 255.255.255.0 is directly connected, VLAN2000
L        10.20.0.1 255.255.255.255 is directly connected, VLAN2000
C        10.20.1.0 255.255.255.0 is directly connected, VLAN2001
L        10.20.1.1 255.255.255.255 is directly connected, VLAN2001
C        10.20.2.0 255.255.255.0 is directly connected, VLAN2002
L        10.20.2.1 255.255.255.255 is directly connected, VLAN2002
C        10.20.3.0 255.255.255.0 is directly connected, VLAN2003
L        10.20.3.1 255.255.255.255 is directly connected, VLAN2003
C        10.20.4.0 255.255.255.0 is directly connected, VLAN2004
L        10.20.4.1 255.255.255.255 is directly connected, VLAN2004
C        10.20.5.0 255.255.255.0 is directly connected, VLAN2005
L        10.20.5.1 255.255.255.255 is directly connected, VLAN2005
C        10.20.6.0 255.255.255.0 is directly connected, VLAN2006
L        10.20.6.1 255.255.255.255 is directly connected, VLAN2006
C        10.20.7.0 255.255.255.0 is directly connected, VLAN2007
L        10.20.7.1 255.255.255.255 is directly connected, VLAN2007
C        10.20.8.0 255.255.255.0 is directly connected, VLAN2008
L        10.20.8.1 255.255.255.255 is directly connected, VLAN2008
C        10.20.9.0 255.255.255.0 is directly connected, VLAN2009
L        10.20.9.1 255.255.255.255 is directly connected, VLAN2009
C        10.20.10.0 255.255.255.0 is directly connected, VLAN2010
L        10.20.10.1 255.255.255.255 is directly connected, VLAN2010
C        10.29.99.0 255.255.255.0 is directly connected, VLAN2999
L        10.29.99.254 255.255.255.255 is directly connected, VLAN2999
C        10.30.2.0 255.255.255.0 is directly connected, VLAN3002
L        10.30.2.254 255.255.255.255 is directly connected, VLAN3002
C        10.30.5.0 255.255.255.0 is directly connected, VLAN3005
L        10.30.5.254 255.255.255.255 is directly connected, VLAN3005
C        10.30.7.0 255.255.255.0 is directly connected, VLAN3007
L        10.30.7.254 255.255.255.255 is directly connected, VLAN3007
C        10.40.89.0 255.255.255.0 is directly connected, VLAN4089
L        10.40.89.1 255.255.255.255 is directly connected, VLAN4089
C        10.40.90.0 255.255.255.0 is directly connected, VLAN4090
L        10.40.90.1 255.255.255.255 is directly connected, VLAN4090
B        10.255.0.0 255.255.240.0 [20/0] via 10.255.1.254, 2d11h
S        10.255.1.254 255.255.255.255
           [1/0] via 10.16.255.2, vti-DC1-ASA-20.XXX.XXX.54
S        20.XXX.XXX.54 255.255.255.255 [1/0] via 185.XXX.XXX.1, OUTSIDE
B        172.16.0.0 255.255.0.0 [20/0] via 10.255.1.254, 2d11h
C        172.16.0.0 255.255.255.0 is directly connected, VLAN1
L        172.16.0.1 255.255.255.255 is directly connected, VLAN1
S        172.16.80.0 255.255.252.0 [1/0] via 192.168.254.6, DC1-DC2
C        185.XXX.XXX.0 255.255.255.0 is directly connected, OUTSIDE
L        185.XXX.XXX.4 255.255.255.255 is directly connected, OUTSIDE
S        192.168.8.0 255.255.252.0 [1/0] via 192.168.254.6, DC1-DC2
S        192.168.67.0 255.255.255.0 [1/0] via 192.168.254.10, DC1-PW
S        192.168.92.0 255.255.252.0 [1/0] via 192.168.254.8, DC1-BLOSH
S        192.168.114.0 255.255.254.0 [1/0] via 192.168.254.2, DC1-OFFICE
C        192.168.254.0 255.255.255.254 is directly connected, DC1-OFFICE
L        192.168.254.1 255.255.255.255 is directly connected, DC1-OFFICE
C        192.168.254.4 255.255.255.254 is directly connected, DC1-DC2
L        192.168.254.5 255.255.255.255 is directly connected, DC1-DC2
C        192.168.254.6 255.255.255.254 is directly connected, DC1-BLOSH
L        192.168.254.7 255.255.255.255 is directly connected, DC1-BLOSH
C        192.168.254.8 255.255.255.254 is directly connected, DC1-PW
L        192.168.254.9 255.255.255.255 is directly connected, DC1-PW&lt;/LI-CODE&gt;&lt;P&gt;The only route I have added is:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site A:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route PW-DC1 10.30.5.0 255.255.255.0 192.168.254.9 1&lt;/LI-CODE&gt;&lt;P&gt;Site B:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;But this doesn't work unfortunately&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5021999#M1109341</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T14:34:09Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022002#M1109343</link>
      <description>&lt;P&gt;Aah I see what you mean, the ASA has a route, for example:&amp;nbsp;route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/P&gt;&lt;P&gt;But this isn't enough for VLAN3005 because clients on that vlan can not contact devices on 192.168.67.x/24 and if I try adding other routes, it either doesn't work anymore or gives me an error that I can't use it or its the ip of the asa etc&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 14:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022002#M1109343</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-21T14:36:33Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022020#M1109345</link>
      <description>&lt;P&gt;this route 10.30.5.0 is direct attach to site B and static route in site A this correct&amp;nbsp;&lt;BR /&gt;Site A:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;route PW-DC1 10.30.5.0 255.255.255.0 192.168.254.9 1&lt;/LI-CODE&gt;
&lt;P&gt;site B RIB&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;C        10.30.5.0 255.255.255.0 is directly connected, VLAN3005
L        10.30.5.254 255.255.255.255 is directly connected, VLAN3005&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site B:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1&lt;/LI-CODE&gt;
&lt;P&gt;site A RIB&lt;BR /&gt;the prefix is different between the "C" and what you add in site B static route&amp;nbsp;&lt;/P&gt;
&lt;PRE class="lia-code-sample  language-markup"&gt;&lt;CODE&gt;C        192.168.64.0 255.255.248.0 is directly connected, VLAN1
L        192.168.67.254 255.255.255.255 is directly connected, VLAN1&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;take cup of tea or coffee and check the route you need to add newly is it appear in both site RIB or not&amp;nbsp;&lt;BR /&gt;it issue of conflict no more I think.&lt;BR /&gt;&lt;BR /&gt;you also can use&amp;nbsp;&lt;BR /&gt;&lt;FONT color="#00FF00"&gt;&lt;STRONG&gt;&lt;SPAN class="keyword kwd"&gt;show route&lt;/SPAN&gt;&amp;nbsp;&lt;VAR&gt;ip_address&lt;/VAR&gt;&amp;nbsp;&lt;KBD class="ph sep"&gt;[&amp;nbsp;&lt;/KBD&gt;&lt;VAR&gt;mask&lt;/VAR&gt;&amp;nbsp;&lt;KBD class="ph sep"&gt;][&amp;nbsp;&lt;/KBD&gt;&lt;SPAN class="keyword kwd"&gt;longer-prefixes&lt;/SPAN&gt;&amp;nbsp;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 15:04:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022020#M1109345</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-21T15:04:15Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022028#M1109346</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1687117"&gt;@aligidpro&lt;/a&gt; change the route:-&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;no route DC1-PW 192.168.67.0 255.255.255.0 192.168.254.10 1
route DC1-PW 192.168.64.0 255.255.248.0 192.168.254.10 1&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 15:14:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022028#M1109346</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-02-21T15:14:17Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022248#M1109350</link>
      <description>&lt;P&gt;The routing should be correct, that Site A has a route over VTI to 10.30.5.0/24 and Site B has a route to 192.168.67.0/24 also over VTI. Nothing more should be needed for the VPN part.&amp;nbsp; What I am thinking is that this is being blocked in access rules. Have you verified that this traffic is permitted inbound on Site A PW-DC1 interface and also verify that it is permitted in on&amp;nbsp;VLAN3005. interface&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Feb 2024 21:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5022248#M1109350</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2024-02-21T21:26:56Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5024355#M1109442</link>
      <description>&lt;P&gt;Thank you everyone for helping, a reboot of the asa fixed the problem somehow.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 11:05:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5024355#M1109442</guid>
      <dc:creator>aligidpro</dc:creator>
      <dc:date>2024-02-26T11:05:26Z</dc:date>
    </item>
    <item>
      <title>Re: Giving another VLAN access to a VTI tunnel on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5024452#M1109447</link>
      <description>&lt;P&gt;thanks for update us&amp;nbsp;&lt;BR /&gt;please close this post by select your comment as answer.&amp;nbsp;&lt;BR /&gt;thanks a lot&amp;nbsp;&lt;BR /&gt;have a nice day&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2024 14:38:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/giving-another-vlan-access-to-a-vti-tunnel-on-an-asa/m-p/5024452#M1109447</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-02-26T14:38:54Z</dc:date>
    </item>
  </channel>
</rss>

