04-24-2010 02:22 PM
Original configuration:
Remote site VPN (192.168.1.0/24) could terminate tunnel on ASA outside interface - and was then allowed to access network 172.31.1.0/24 across DMZ (DMZ port was reallocated to another Internet connection). Internal network (*see attachment) 10.0.0.0/12 cold also connect to 172.31/24 via this route.
Moved 172.31/24 into the network (on 10.0.0.0/24 network). Now 10.0/12 can access 172.31/24 - but remote VPN (192.168.1.0/24) cannot.
Changes made on ASA for this move:
Changed static route from pointing to DMZ for 172.31/24 network.
Added NAT exempt for 172.31/24 to remote VPN network.
From 192.168.1.0/24 - I can ping any host on the 172.16.0.0/16 and 10.0.0.0/12 network - but not 172.31/24
Can ping 172.31/24 from "allowed" host (this is a vendor connection) from 172.16.0.0/16 and from any host on 10.0.0.0/12
Cannot ping 172.31/24 from the ASA.
Can't seem to get my hands around this or know of any tool on the ASA to use to diagnose. Any ideas?
04-24-2010 09:32 PM
Can you share the ASA configuration?
Or at least share the following:
sh run interface
sh run route
sh run nat
sh run static
And any ACL that the above NAT statement refers to.
Also, please double check that the 10.1.7.60 and the other router closer to the 172.31.1.0/24 subnet has route back towards 192.168.1.0/24 which should be going back towards the ASA firewall.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
Subject | Author | Posted | |
---|---|---|---|
10-16-2024 01:49 AM | |||
02-16-2025 03:52 PM | |||
03-03-2025 12:25 AM | |||
07-17-2024 11:25 PM | |||
08-19-2022 05:13 PM |