11-09-2010 03:46 PM
I am trying to see if it is possible to accomplish what I am trying. I have an ASA 5505 with the following setup.
1. There is an outside connection, connected to the ISP. Lets say that it is 10.1.1.1/24 for ease. There is a remote VPN setup that people access through this interface.
2. There is the inside network which is the normal LAN. This is the wired network in the office. lets say that it is 172.20.0.1/24.
3. There is a wireless network on a seperate VLAN called WLAN. It has an IP of 192.168.1.1/24. There is an ACL allowing traffic from this VLAN to the public internet.
Basically I would like users to be able to use the same VPN settings that they use when connecting from outside the office while connected to WLAN.
Also I would like them to be able to access the public IP addresses that I have NAT'd to internal servers. That way they can use the IP addresses that they use when on the public internet.
Can this be done?
Solved! Go to Solution.
11-10-2010 08:17 PM
Hello,
Well that is not going to be possible, the only thing that you can really do is to enable the crypto map on the WLAN facing interface, by design you cannot access VPN,ping Nor manage the Device on an interface that is not directly connected to you.
Hope this helps.
Mike
11-09-2010 04:14 PM
Hello,
Is it like you want the users on the WLAN to connecto via IPsec VPN client to the outside IP address of the firewall?
Let me know.
Mike
11-09-2010 08:10 PM
yes, that is exactly what I am trying to do.
11-10-2010 08:17 PM
Hello,
Well that is not going to be possible, the only thing that you can really do is to enable the crypto map on the WLAN facing interface, by design you cannot access VPN,ping Nor manage the Device on an interface that is not directly connected to you.
Hope this helps.
Mike
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide