ā07-05-2016 01:23 AM - edited ā03-12-2019 12:59 AM
Hi friends.
I have a cisco ASA 5520 device configured with IPsec remote access VPN (ASA version 9.0)
I can connect INSIDE and DMZ network, but not able to access other clients connected to same VPN.
For example if I have 2 clients connected to VPN,(172.16.66.21 and 172.16.66.22) these both clients are not able to communicate with each other.
How can I fix this problem?
Thanks in advance.
Solved! Go to Solution.
ā07-05-2016 01:27 AM
Hi,
You need to configure same-security-traffic permit intra-interface on the ASA.
Also in the split tunnel
Regards,
Aditya
Please rate helpful posts and mark correct answers.
ā07-05-2016 01:27 AM
Hi,
You need to configure same-security-traffic permit intra-interface on the ASA.
Also in the split tunnel
Regards,
Aditya
Please rate helpful posts and mark correct answers.
ā07-05-2016 01:35 AM
Dear friend,
I have already configured same-security-traffic permit intra-interface on ASA and split tunnel standart access-list.
ā08-05-2016 04:00 AM
Hello,
You need to no-nat VPN traffic for communication client-client.
Example:
object network VPN-POOL
subnet 10.0.0.0 255.255.255.240
nat (OUTSIDE,OUTSIDE) 1 source static VPN-POOL VPN-POOL destination static VPN-POOL VPN-POOL
//Cristian
ā08-05-2016 01:15 AM
can anybody help me?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide