I have a network with 2 Firewalls, an old one (I think Fortigate) and a new Cisco/ASA (5515, 9.1.2).
Different VLANs, one of which is for "Server" and one is the DMZ.
Both have NATs (over 40 object-NATs, PAT in reality) to publish services.
The default-gateway of the DMZ is the "old" firewall, while the VLAN Server is rotated by a Layer-3 Switch.
With reference to the attached diagram, the current DG is CORSWT01, which route all the "external" traffic to the "old" Firewall."
There is also a new Layer-3 (MILSWT01) that route all the "external" traffic to the "new" Firewall.
First problem:
NAT on the new Firewall does not work, nor those of the machines in the DMZ nor those machines on VLAN "Server" (routed).
The internal machines respond to calls from "outside" only if I configure a second DG, but this causes me other problems.
Second problem:
With client VPN I can reach machines on VLAN "Server" because the Switch Layer-3 has a route to the IP address of the client class.
But I DO NOT reach the machines in the DMZ, despite the ACL also incorporates this class IP.
Any idea?