11-15-2016 11:14 PM - edited 02-21-2020 09:03 PM
Hi Security Expert,
I got a VPN client office using 192.168.14.0/24 network. Once they established the Anyconnect vpn connection to the main office, they're unable to access to their own local 192.168.14.0 servers and printers. I've check our VPN split-tunnel ACL is actually injecting the generic 192.168.0.0/16 network to the client, that causing their windows lost their own windows route 192.168.14.0/24 point to its own NIC interface.
This looks like overlapping of subnet 192.168.14.0/24 from the client office which fall under the generic injected split-tunnel route 192.168.0.0/16.
How can we tackle this issue instead of requesting the client office to change their IP segment away ?
Appreciate the idea and i will rate for helpful response. Thanks.
Regards
Tzy
11-16-2016 10:01 PM
Hi ,
I guess you are looking for below solution
http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/70847-local-lan-pix-asa.html
Please mark correct if usefeul
Thanks
shakti
11-17-2016 05:09 PM
Partially related but it never told how to tackle overlapping issue... I still rate your helpful share, thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide