08-31-2014 06:52 PM
i have a remote branch that connects to HQ (one subnet only) via site to site vpn with split tunneling enable. the tunnel is set up and is working. my vendor support website allows only known ip to connect. my branch office does not have static ip but the HQ has. my goal is force branch office to go thru the tunnel when it goes to support website.
the branch has 871 router and HQ has ASA5510
here is a section of the router config
! 192.168.22.0 is branch
! 192.168.230.0 is HQ subnet it can connect
! a.b.c.d is support vendor website
ip nat inside source route-map NoNAT interface FastEthernet4 overload
!
ip access-list extended S2Svpn
permit ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255
permit ip 192.168.22.0 0.0.0.255 host a.b.c.d
access-list 100 remark set up for S2S vpn tunnel
access-list 100 deny ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255
access-list 100 deny ip 192.168.22.0 0.0.0.255 host 1.2.3.4
access-list 100 permit ip 192.168.22.0 0.0.0.255 any
access-list 100 deny ip any 192.168.230.0 0.0.0.255
access-list 100 deny ip any host a.b.c.d
route-map NoNAT permit 10
the problem is branch cannot access the support website. i did a trace route from branch. it seems it is going thru the tunnle but show xlate on asa does not show a translation. i have a NAT for the branch on the asa.
what do i miss
09-01-2014 12:06 AM
Something goes wrong with your ACL 100. what are the last two deny-lines for and is that the ACL that you reference in the NoNAT route-map?
Have you enabled same-security-traffic permit intra-interface
on the ASA?
09-03-2014 01:47 PM
Solve the problem!
the NAT was incorrect set on the ASA. should have set it to the outside interface.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide