We have a data/voice network (VLAN1 and VLAN100 respectively), on the voice network resides our PABX server and i need to access the web interface of this device over our VPN network to which the ASA in question is a part thereof.
The data network on VLAN 1 is 192.168.1.0/24 and the Voice network on VLAN 100 is 192.168.100.0/24.
What sort of configuration is needed on the client side ASA so that i can access the 192.168.100.0/24 network over the other segments of our VPN network?
To clarify, the ASA is on the customer's site with connected interfaces in VLAN1 and VLAN100? You then have, I presume a site-to-site VPN or remote access VPN to the ASA from your end? Is this correct?
If so, for the VPN are you encrypting the interesting traffic of 192.168.100.0/24 from your blocks?
On the ASA you should have an ACL, which should be applied to a crypto map for example:
access-list client extended permit ip object-group client-networks object-group our-networks
crypto map outside-map 20 match address client.
The object-groups (client-networks) should have the objects with the necessary networks in i.e. 192.168.1.0/24 and 192.168.100.0/24. Our-networks should contain your netblocks for instance 10.10.10.0/24
If the VPN is fine and VLAN 100 is not connected to the ASA, you will need a route from the ASA to something which has a layer3 interface on both VLAN 1 and VLAN 100. If the ASA is connected to VLAN1 and a layer3 switch has an interface on VLAN1 and VLAN100, point a route from the ASA to 192.168.100.0/24 to the VLAN1 IP address on the layer3 switch.
It might be worth sharing some configuration of the ASA, if you require further help.
SymptomsOutage during FTD code upgrade DiagnosisThe FTD code upgrade thru FMC will cause the traffic interruptionSolutionBelow process will upgrade the FTD with no downtime and no traffic interruption.Before the upgrade process:Download the FTD platf...
Process for FTD migration with PolicyAs per Cisco documentation, we have below steps for for de-register and register process. Please follow below steps :Step 1 : Break HA pair and de-register your FTD from FMC (old).Step 2 : Register your primary FTD wit...
Hi There,Is there a relationship between the hardware of the Cisco ASA 5505 FWs (V02) and the 9.x software version? Multiple ASA have been successfully updated with the same software. The ASAs that have been updated without any problems are V06 versi...
Dear Cisco Customers and Partners,
We know that the Cisco Identity Services Engine (ISE) is a critical element of your network security and so stability is of paramount importance. As a result, many of you asked us for a suggested release given sev...
Over 100-year-old Yokogawa Engineering Asia deploys Cisco Advanced Malware Protection (AMP) to shield itself against cyber attacks. With Cisco Talos threat intelligence, it stays ahead of the latest malicious behavior on the Internet. Learn more at http:/...