cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1457
Views
0
Helpful
5
Replies

AnyConnect clients routing to other sites

unitron79
Level 1
Level 1

Hallo,

 

We have 2 sites connected through a site2site VPN between an ASA5516-X on site1 and ASA5505 on site2. Everything works fine both ways.
Our problem is that an AnyConnect client connected through ASA5516-X on site1 can’t reach devices on site2

 

regards,

Manole

1 Accepted Solution

Accepted Solutions

Cristian Matei
VIP Alumni
VIP Alumni

Hi,

   

  1.  Ensure that the IP pool/range used by the AnyConnect clients is specified in the crypto-ACL on both VPN gateways (if using crypto map for L2L), or routed via VTI (if using VTI for L2L).

  2. If both AnyConnect and S2S tunnels are established over the same interface of the ASA, the "same-security-level permit intra-interface" is requried on that ASA

  3. ensure that the traffic between AnyConnect IP pool and protected resources on the far-end side of the S2S tunnel are excluded from NAT, on both ASA's: this is done via one or more twice NAT statements.

 

 

Regards,

Cristian Matei.

View solution in original post

5 Replies 5

Cristian Matei
VIP Alumni
VIP Alumni

Hi,

   

  1.  Ensure that the IP pool/range used by the AnyConnect clients is specified in the crypto-ACL on both VPN gateways (if using crypto map for L2L), or routed via VTI (if using VTI for L2L).

  2. If both AnyConnect and S2S tunnels are established over the same interface of the ASA, the "same-security-level permit intra-interface" is requried on that ASA

  3. ensure that the traffic between AnyConnect IP pool and protected resources on the far-end side of the S2S tunnel are excluded from NAT, on both ASA's: this is done via one or more twice NAT statements.

 

 

Regards,

Cristian Matei.

Hi Matei,

 

thanks for your reply.

I think I have done that now but stil not working.

I wonder, do I need also some static route in the second ASA to AnyConnect subnet?

 

regards,

Manole

Hi,

 

   Yes, clearly, routing needs to work end-to-end, so the remote ASA needs to route traffic for AnyConnect VPN pool through the tunnel; if you have a default route already for Internet access, it's enough; you just need to ensure that this traffic from and to the AnyConnect pool is included in the encryption domain.

 

Regards,

Cristian Matei.


@Cristian Matei wrote:

..so the remote ASA needs to route traffic for AnyConnect VPN pool through the tunnel;..

Hi Cristian,

 

how do I do that? my Cisco knowledge is limited.

 

thanks,

Manole

 

I played a bit with the crypto map options and is working now.

thanks

Review Cisco Networking for a $25 gift card