Hi,
On this case you may not be able to reach those IP addresses for R1 and R2, because the Remote users reach the interface of outside and if U-turn is nor permitted the packet will be dropped, and if it is permitted they will be NATed dynamically.
You will need to place the following configuration:
- Permit u-turn(A packet that gets to this interface and be routed through the same interface)
same-security permit intra-interface
- NAT exemption on the outside to avoid be dynamically NATed.
If your ASA is pre 8.3:
object network IP_POOL
range 192.168.88.200 192.168.88.250
object-group network OUTSIDE_ROUTERS
network-object host XXXXXXX -> Router 1
network-object host YYYYYYY -> Router 2
access-list NAT_EXEMPT permit ip object IP_POOL object-group OUTSIDE_ROUTERS
nat (oustside) 0 access-list NAT_EXEMPT
If your ASA is Post 8.3:
object network IP_POOL
range 192.168.88.200 192.168.88.250
object-group network OUTSIDE_ROUTERS
network-object host XXXXXXX -> Router 1
network-object host YYYYYYY -> Router 2
nat (outside,outside) 1 source static IP_POOL IP_POOL destination static OUTSIDE_ROUTERS OUTSIDE_ROUTERS no-proxy-arp route-lookup
Now you should be able to access those routers,
Please proceed to rate and mark as correct this Post!
David Castro,
Regards