05-16-2008 06:20 AM - edited 02-21-2020 02:01 AM
I have three ASA 5505s in three different locations. Each location has its own subnet (10.0.0.x, 10.0.1.x, and 10.0.2.x). I have VPN tunnels from each location to both of the others, making a sort of triangle. Now, I also have one of those ASAs (10.0.2.254) handling VPN clients from the outside as well which have their own IP pool of 10.0.3.x. The tunnels work fine, the clients can connect and access all resources on the 10.0.2.x network. However the problem is that they cannot access anything on the 10.0.0.x or 10.0.1.x networks which they should have equal access to. I've tried some things with the access lists, but nothing seems to work. Where do I have to put these permissions in? I just can't seem to figure out on which interface in which direction I need to put the ACL. Thanks.
05-16-2008 06:33 AM
This should do the trick...
10.0.2.0 ASA -
same-security-traffic permit intra-interface
access-list
access-list
10.0.0.0 ASA -
access-list
access-list
nat (inside) 0 access-list
10.0.1.0 ASA -
access-list
access-list
nat (inside) 0 access-list
05-19-2008 01:04 PM
I guess I need a little bit of clarification. I'm pretty sure that I need to create new names for the
Here's what's currently there:
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
Which refer to:
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 10.0.0.0 255.255.255.0
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 10.0.2.0 255.255.255.0
05-20-2008 05:57 AM
You don't need to add an other "nat" statement. Just replace
10.0.2.0 ASA -
same-security-traffic permit intra-interface
access-list
access-list
10.0.0.0 ASA -
access-list
access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 10.0.3.0 255.255.255.0
10.0.1.0 ASA -
access-list
access-list inside_nat0_outbound extended permit ip 10.0.1.0 255.255.255.0 10.0.3.0 255.255.255.0
05-23-2008 07:44 AM
Okay, I've tried setting it up and must still be missing something. Could you take a look at these? I do know I might have a line or two in there that needs to get cleaned out, but everyone should be connecting to VPN on the 10.0.2.0 ASA and then getting to the rest of the network from there.
05-30-2008 10:45 AM
Can anyone tell me what I'm doing wrong with the access-lists' crypto lines?
05-30-2008 11:21 AM
10.0.1.0 ASA-
no access-list inside_nat0_outbound extended permit ip 10.0.3.0 255.255.255.0 10.0.0.0 255.255.255.0
no access-list inside_nat0_outbound extended permit ip 10.0.3.0 255.255.255.0 10.0.2.0 255.255.255.0
no access-list vpn_crypto extended permit ip 10.0.1.0 255.255.255.0 10.0.3.0 255.255.255.0
no access-list vpn_nat extended permit ip 10.0.1.0 255.255.255.0 10.0.3.0 255.255.255.0
10.0.0.0 ASA-
access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.255.255.0 10.0.2.0 255.255.255.0
access-list outside_cryptomap_1 extended permit ip 10.0.0.0 255.255.255.0 10.0.3.0 255.255.255.0
access-list outside_cryptomap_2 extended permit ip 10.0.0.0 255.255.255.0 10.0.1.0 255.255.255.0
no access-list outside_cryptomap_2 extended permit ip 10.0.0.0 255.255.255.0 10.0.3.0 255.255.255.0
All of your crypto acl's need to be mirrored on the other end of the tunnel
10.0.0.0 is...
Crypto A -
0 to 1
Cryto B -
0 to 2
0 to 3
10.0.1.0 is...
Crypto A -
1 to 0
Cryto B -
1 to 2
1 to 3
10.0.2.0 is...
Crypto A -
2 to 0
3 to 0
Cryto B -
2 to 1
3 to 1
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide