07-10-2015 07:15 AM
Hello Everybody
I am Cisco ASA rookie and I prefer performing most of my work using ASDM before I 'have to' dig in to CLI. I am a CCNA and hopefully someday I can equip myself with enough experience and knowledge to be more comfortable running and interpreting the IOS command line on ASA devices.
So that's me.
Moving on - firstly I would like to highlight my objective: To be able to route multiple subnets sitting behind one VPN Peer site over IPSEC Tunnel to the other Peer.
Following are the hardware devices involved along with example subnets and configurations which are 'known to be working' at present:
Upon some research I found out that "traffic destined for the remaining 2 subnets in Site B originating from Site A" and the "traffic destined to Site A originating from the remaining 2 subnets in Site B" needs to be traversed through the existing IPSEC tunnel between the 2 sites.
I understand what needs to be done here (assuming the above is correct) but I cannot find any KB that can explain the steps involved in getting it done (preferably from ASDM but if not then CLI will have to do).
Can anyone of you experienced lots help me out here please ?
Solved! Go to Solution.
07-14-2015 09:39 PM
Hi,
You should be able to the same crypto map ACL include all source and destination subnets for the l2l VPN. Just make sure these ACLs are mirror of each other and the interesting traffic is exempted from NAT
Example:
Site A with one network a and Site B with 3 networks x, y, z
VPN ACL
permit ip a x
permit ip a y
permit ip a z
Site B will have acl in reverse direction.
HTH
Abaji.
07-14-2015 09:39 PM
Hi,
You should be able to the same crypto map ACL include all source and destination subnets for the l2l VPN. Just make sure these ACLs are mirror of each other and the interesting traffic is exempted from NAT
Example:
Site A with one network a and Site B with 3 networks x, y, z
VPN ACL
permit ip a x
permit ip a y
permit ip a z
Site B will have acl in reverse direction.
HTH
Abaji.
08-22-2015 02:20 AM
I was able to resolve the issue.
Instead of creating a S2S Profile with an Individual subnet IP (ex: 10.3.3.0/24), I created a Network Object Group containing ALL the subnets that existed behind the ASA that I needed to be accessible over the S2S Tunnel on the other side.
Therefore I created a Network Object Group on both ASA Peers containing the list of network on Site B.
I assigned this Network Object Group on the Source side on Site B and on the Destination side on Site A in their respective S2S VPN Profile.
This fixed the issue. Going forward, if any new subnet were to be added, we only need to amend the Network Object Group on 'both' sides if that new subnet had to accessible over the existing S2S tunnel.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide