<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA VPN routing issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325554#M344479</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From FW4 you are pinging on same subnet. Servers know about the local address (FW4 inside address which the ping comes from) via ARP - no routing involved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you try to reach other than server 4 via VPN, the servers see remote traffic form a non-connected network (192.168.2.0/24) and reply via their default gateway (FW 1/2/3). Those FWs need a static route inside to FW4 for the VPN pool otherwise they will send return traffic out their default gateway (normally outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route inside 192.168.2.0 255.255.255.0 192.168.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the other firewalls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 18 Aug 2013 04:20:07 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2013-08-18T04:20:07Z</dc:date>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325553#M344478</link>
      <description>&lt;P&gt;I am having an interesting routing issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 4 ASA 5520 firewalls. The inside interface for each ASA is on 192.168.1.x/24. FW1 has .1 FW2 has.2 and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW4 is setup to provide VPN access into this 192.168.1.x/24 network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many servers in this 192.168.1.x network. Server 1 has a default gw of .1 server 2 has a gw of .2 server3 has a gw of .3 and server 4 has a default gw of.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN network in FW4 is 192.168.2.x/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vpn works fine. I connect and can ping the server that has 192.168.1.4 FW4 as its default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THE PROBLEM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't ping or see server 1,2 or 3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the servers from the command line on FW4 leading me to believe this is a routing issuse..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have put that allow intra interface traffic command in to no avail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anybody ever made this work?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325553#M344478</guid>
      <dc:creator>jayturish</dc:creator>
      <dc:date>2019-03-12T02:27:05Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325554#M344479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From FW4 you are pinging on same subnet. Servers know about the local address (FW4 inside address which the ping comes from) via ARP - no routing involved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you try to reach other than server 4 via VPN, the servers see remote traffic form a non-connected network (192.168.2.0/24) and reply via their default gateway (FW 1/2/3). Those FWs need a static route inside to FW4 for the VPN pool otherwise they will send return traffic out their default gateway (normally outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; route inside 192.168.2.0 255.255.255.0 192.168.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the other firewalls.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 04:20:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325554#M344479</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-08-18T04:20:07Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325555#M344480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another option would be to configure static routes to the 192.168.2.0/24 network pointing to FW4 on the servers themselves.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 08:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325555#M344480</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-18T08:16:15Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325556#M344481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's correct Marius - host routes are also an option. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tend not to recommend them except as a last resort since they don't sacle as well. Many sys admins ae unfamiliar with them and they're not immediately apparent to anyone who comes along later and tries to troubleshoot.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 14:03:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325556#M344481</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-08-18T14:03:54Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325557#M344482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All the other 3 firewall now have the static route..&amp;nbsp; I am still dead in the water..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its interesting to note that my VPN client will get 192.168.2.2 every time and when I am at the cli on say FW1, I cant ping 192.168.2.2, but I can ping 192.168.1.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I try to ping 192.168.2.2 I get ?????&lt;/P&gt;&lt;P&gt;The route is in place as well.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 16:17:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325557#M344482</guid>
      <dc:creator>jayturish</dc:creator>
      <dc:date>2013-08-18T16:17:25Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325558#M344483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You cannot ping VPN clients from the firewall itself because the clients are seen as on the outside interface routing-wise and thus the fw will originate traffic to them using the outside interface address which won't work with the VPN encapsulation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the configs from FW4 and one of the others for us to look over? You can also try a host route as Marius suggested.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 16:22:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325558#M344483</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2013-08-18T16:22:43Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325559#M344484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If your firewalls have only one link to the local LAN (which I am assuming they do) you would need to add a line of config to allow the ASA to send traffic out the same interface it was received on:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 16:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325559#M344484</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2013-08-18T16:26:40Z</dc:date>
    </item>
    <item>
      <title>Cisco ASA VPN routing issue</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325560#M344485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fw1,2,3 all have this comand in place..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I am going to try the host route option next.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Aug 2013 16:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-vpn-routing-issue/m-p/2325560#M344485</guid>
      <dc:creator>jayturish</dc:creator>
      <dc:date>2013-08-18T16:28:37Z</dc:date>
    </item>
  </channel>
</rss>

