From my understanding, the answer is yes.suppose ASA interface connect to VPN is named outside and ASA interface connect to LAN is named inside, then NAT command for ASA would be like this:object network vpn-client host ip_address 192.168.5.20object ...
Refer to below link:http://www.cisco.com/en/US/docs/ios/12_0s/feature/guide/12s_pbr.html#wp1053101"If the interface associated with the first next hop specified with the set ip next-hop command is down, the optionally specified IP addresses are trie...
static (inside,inside2) tcp 83.43.44.45 https 192.168.20.40 https netmask 25255.255.255 for communications to be allowed between same security interfaces, you need to enable this (run this command in global configuration mode):same-security-traffic p...
Hi John,if you don't have license to create a third vlan or enable a third port then a way to workaround this i know is to change the default gateway for 10.0.0.0/24 network from ASA to your Debian machine (all other configurations/settings/cablings ...
I would suggest to enable a unused port in firewall, assign it with ip address 192.168.2.1 and plug debian machine's LAN cable into this port. this would make your firewall also acting as a router+firewall between 10.0.0.0 network and 192.168.2.0 net...