<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access ASA that is behind a vpn tunnel and other network devices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023076#M398243</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;copy of configurations from all ASA will definitely help. It is difficult to tell what is wrong without looking at the configurations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Oct 2012 14:20:39 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-04T14:20:39Z</dc:date>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices from behind another asa connected to same vpn</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023066#M398218</link>
      <description>&lt;P&gt; have an issue with accessing other asa's and network equipment from behind an asa that is connected to the network i need to access via vpn.&amp;nbsp; I have the asa able to access the network but for some reason am not able to.&amp;nbsp; Anyone have a solution?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023066#M398218</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2019-03-12T00:04:10Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023067#M398221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A network diagram and configuration from both ASA would help. Otherwise, we won't be able to tell why it's not working.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:27:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023067#M398221</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:27:09Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023068#M398224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Below is my map.&amp;nbsp; I am trying to get the two endpoint devies to communicate with each other as well as manage the main 5510 via asdm.&amp;nbsp; I will try to post the config here in a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/2/3/4/106432-asatoasa.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023068#M398224</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T13:36:43Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023069#M398228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How is the main 5510 connected?&lt;/P&gt;&lt;P&gt;Do you have site-to-site VPN between the 5505 and 5510?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023069#M398228</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:51:53Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023070#M398232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes. It is ipsec site to site.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023070#M398232</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T13:52:44Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023071#M398235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you mean the IPSec VPN is not UP at the moment?&lt;/P&gt;&lt;P&gt;What is the output of:&lt;/P&gt;&lt;P&gt;show cry isa sa&lt;/P&gt;&lt;P&gt;show cry ipsec sa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from both ASAs?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:54:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023071#M398235</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T13:54:29Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023072#M398238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the ipsec vpn is up.&amp;nbsp; I am able to access some of my network resources.&amp;nbsp; I just cant access the 5510 from the 5505 and cant access one 5505 from the other 5505.&amp;nbsp; Do i need to have reverse route enabled on the tunnel group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 13:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023072#M398238</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T13:55:59Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023073#M398240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't access the ASA itself? you mean you can't telnet/ssh/http to 5510 from 5505 LAN?&lt;/P&gt;&lt;P&gt;Are you trying to access it via its inside interface ip address?&lt;/P&gt;&lt;P&gt;Do you have "management-access inside" configured on 5510?&lt;/P&gt;&lt;P&gt;Do you have the 5505 LAN configured on 5510 telnet/ssh/http command?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;http &amp;lt;5505-lan&amp;gt; &lt;MASK&gt; inside&lt;/MASK&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:01:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023073#M398240</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T14:01:37Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023074#M398241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am unable to telnet/ssh/https to 5510 from 5505 or from 5505 to 5505.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the managment configured on the inside interface for all address in the range.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023074#M398241</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T14:05:47Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023075#M398242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also note that i have one of the 5505 setup as an any ip rule in teh 5510. So it should be able to access whatever it wants.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:15:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023075#M398242</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T14:15:09Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023076#M398243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;copy of configurations from all ASA will definitely help. It is difficult to tell what is wrong without looking at the configurations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:20:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023076#M398243</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-04T14:20:39Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023077#M398244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am working on getting you the config.&amp;nbsp; I just have to edit out the confidential stuff.&amp;nbsp; I may be a while.&amp;nbsp; Note that i am able to access everything from my internal network just fine.&amp;nbsp; However when the 5505's ping each other i am then able to access the management features etc.&amp;nbsp; I am still unable to access the 5510 even after a ping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:42:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023077#M398244</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T14:42:32Z</dc:date>
    </item>
    <item>
      <title>Access ASA that is behind a vpn tunnel and other network devices</title>
      <link>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023078#M398245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just checked the logs for the 5510.&amp;nbsp; It shows the 5505 trying to ping.&amp;nbsp; but is built and removed because of the inspect icmp command.&amp;nbsp; Do i need to add a rule for the 5505 to ping the 5510 so that the route is built?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Oct 2012 14:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-asa-that-is-behind-a-vpn-tunnel-and-other-network-devices/m-p/2023078#M398245</guid>
      <dc:creator>kylebqmacs</dc:creator>
      <dc:date>2012-10-04T14:47:04Z</dc:date>
    </item>
  </channel>
</rss>

