Can anyone suggest how I can configure the ASA to permit the QuickVPN client at the remote site (with the ASA) to connect to the RV042 at SiteA?
Alternatively, advise how I might troubleshoot this?
I suspect it could be a matter of identifying what is being dropped by the ASA (maybe an ICMP packet). I do know the ASA does permit stations at SiteB to ping internet addresses (so ping and reply packets are permitted for normal NAT traffic). Or perhaps it is dropping or not routing the encrypted return traffic (which my logic would indicate should not be treated any different than other traffic).
In my case the RV042 is a client's firewall/router and we want to be able to connect to it from SiteB.
FYI, on a scale of 1 to 10 my skills with the ASA would be about 4 (I could set one up act as a NAT router and get L2TP\IPSEC VPN to work, but not much else). I'm hestitant to just log a TAC because the VPN client will likely be considered 3rd party to the ASA support group (same company, different division).
FYI: just before submitting this to the forum I found this article which I'll try later today:
Title: CISCO ASA 5510, 5505 Creating A VPN Passthrough
This event continues the conversation of our recent Community Ask Me Anything event "Secure Remote Workers".
To participate in this event, please use the button to ask your questions
Here’s your ch...
User Experience Enhancements
As part of the Cisco Common User Experience program, we are working towards a more uniform user experience and terminology alignment. This program runs across all Cisco security products.
Early Access introduces a...
This video features a step by step walk through of configuring Cisco AnyConnect on FTD managed by FMC. Timestamps included for certificate installation, Access Control, Licensing, NAT, and Deployment failures.
I am trying to solve a CSR signing issue in a home lab.Can someone clarify this theoretical point? According to Wikipedia: "Before creating a CSR, the applicant first generates a key pair, keeping the private key secret. The...
Threat Response integrates with Cisco's Web Security Appliance (WSA) to provide visibility into web-bourne threats. By adding a Web Security or SMA Web module to Threat Response, investigators will be able to search for domains, URLs, and file hashes th...