01-22-2014 12:28 AM - edited 03-11-2019 08:34 PM
HI,
I want to access my remote(spoke) ASA (ASDM) in my hub location..do not want to access via public IP from outside.
what configuration should be done on the spoke ASA..
VPN Tunnel SPOKE
inside HUB|=======================[ASA] inside 192.168.2.0/24
192.168.1.0/24 ASA|
|=======================[ASA] inside 192.168.3.0/24
VPN Tunnel
Solved! Go to Solution.
01-22-2014 12:46 AM
Hi,
Provided that management connections are coming from a source address that is already configured on the L2L VPN and naturally that the destination address (Hub ASA interface IP) is also part of the current L2L VPN then you would essentially only need to add
management-access
Which would allow management connections through the L2L VPN to this internal interface
You would also need the appropriate statement to allow the ASDM management
http
I think you needed to use the "inside" at the end. Can't remember. Try "outside" if that doesnt work.
Naturally if you have any kind of VPN Filter ACLs or if you are preventing the default operation of VPN traffic bypassing external interface ACL then you will also have to allow the traffic.
Hope this helps
- Jouni
01-22-2014 02:50 AM
Hi,
Did you get it working?
Please do remember to mark a reply as the correct answer if it answered your question.
Or did you have the chance to test it out yet?
- Jouni
01-22-2014 12:46 AM
Hi,
Provided that management connections are coming from a source address that is already configured on the L2L VPN and naturally that the destination address (Hub ASA interface IP) is also part of the current L2L VPN then you would essentially only need to add
management-access
Which would allow management connections through the L2L VPN to this internal interface
You would also need the appropriate statement to allow the ASDM management
http
I think you needed to use the "inside" at the end. Can't remember. Try "outside" if that doesnt work.
Naturally if you have any kind of VPN Filter ACLs or if you are preventing the default operation of VPN traffic bypassing external interface ACL then you will also have to allow the traffic.
Hope this helps
- Jouni
01-22-2014 02:48 AM
Thank you...Jouni
01-22-2014 02:50 AM
Hi,
Did you get it working?
Please do remember to mark a reply as the correct answer if it answered your question.
Or did you have the chance to test it out yet?
- Jouni
01-22-2014 03:17 AM
Hi Jouni,
i have tested it on remoteaccess vpn and it is working fine. now only on site to site vpn i need to check.
suhas
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide