<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Client access to servers behind ASA and CSS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-client-access-to-servers-behind-asa-and-css/m-p/1552837#M642750</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm wondering if this is possible : I seem to remember reading somewhere that it is, but do you think I can find the article?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(please see attached NET01.JPG file)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA5510 with a few servers sitting behind it and some users that authenticate locally to the ASA to access those servers sitting on the 3560, all on the 10.255.255.0/24 network.&amp;nbsp; Nothing too complicated there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've recently purchased a CSS11501 and have it configured to load balance between two WWW servers on a 10.0.120.0/24 network using a virtual IP address back on the 10.255.255.0/24 network (10.255.255.51).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I attach myself to the 3560 and use &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://10.255.255.51" target="_blank"&gt;http://10.255.255.51&lt;/A&gt;&lt;SPAN&gt; I see the expected results, HTTP requests from server 1, sometimes from server 2. The CSS is working just fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, now I need to get my remote clients access to the two servers behind the CSS and I'm finding it a little more tricky than I initially thought.&amp;nbsp; I'm sure I read somewhere that I can simply add a "route inside 10.0.120.0 255.255.255.0 10.255.255.10" to my ASA adding a route to the CSS and then that handles the routing from that point forward. Of course, I need to ensure that the VPN client split tunnel group my VPN clients are using includes both 10.0.120.10 and 10.0.120.11 and then I should be OK to move forward.&amp;nbsp; However in testing this doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestions?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:57:11 GMT</pubDate>
    <dc:creator>davemonk</dc:creator>
    <dc:date>2019-03-11T18:57:11Z</dc:date>
    <item>
      <title>VPN Client access to servers behind ASA and CSS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-access-to-servers-behind-asa-and-css/m-p/1552837#M642750</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm wondering if this is possible : I seem to remember reading somewhere that it is, but do you think I can find the article?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(please see attached NET01.JPG file)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA5510 with a few servers sitting behind it and some users that authenticate locally to the ASA to access those servers sitting on the 3560, all on the 10.255.255.0/24 network.&amp;nbsp; Nothing too complicated there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've recently purchased a CSS11501 and have it configured to load balance between two WWW servers on a 10.0.120.0/24 network using a virtual IP address back on the 10.255.255.0/24 network (10.255.255.51).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When I attach myself to the 3560 and use &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://10.255.255.51" target="_blank"&gt;http://10.255.255.51&lt;/A&gt;&lt;SPAN&gt; I see the expected results, HTTP requests from server 1, sometimes from server 2. The CSS is working just fine.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, now I need to get my remote clients access to the two servers behind the CSS and I'm finding it a little more tricky than I initially thought.&amp;nbsp; I'm sure I read somewhere that I can simply add a "route inside 10.0.120.0 255.255.255.0 10.255.255.10" to my ASA adding a route to the CSS and then that handles the routing from that point forward. Of course, I need to ensure that the VPN client split tunnel group my VPN clients are using includes both 10.0.120.10 and 10.0.120.11 and then I should be OK to move forward.&amp;nbsp; However in testing this doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-access-to-servers-behind-asa-and-css/m-p/1552837#M642750</guid>
      <dc:creator>davemonk</dc:creator>
      <dc:date>2019-03-11T18:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Client access to servers behind ASA and CSS</title>
      <link>https://community.cisco.com/t5/network-security/vpn-client-access-to-servers-behind-asa-and-css/m-p/1552838#M642776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the first half of your description, i understand the 2 servers being accessed using the VIP of 10.255.255.51 from the LAN works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when using the VPN client, are you going to be accessing the servers using their original IPs (10.0.120.10 and 10.0.120.11) or using the VIP (10.255.255.51)??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it's going to use the original IPs then what you have mnetioned is correct about the split tunnel access-lists. Also, ensure that the internal switch is able to route packets to the VPN pool of IP addresses to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it's going to use the VIP, then you will need to add the VIP to the split ACL (10.255.255.51). Please share a sanitized configuration and also the above details for a clearer problem description.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Oct 2010 07:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-client-access-to-servers-behind-asa-and-css/m-p/1552838#M642776</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-21T07:48:19Z</dc:date>
    </item>
  </channel>
</rss>

