03-22-2010 09:21 PM - edited 02-21-2020 04:33 PM
Armed with an ASA 5505 Security Plus, I have setup IPSec VPN for RA. The VPN IP Address pool is in the 192.168.2.0/28 network.
The Lan is 192.168.1.0/24 with the inside interface at .254.
The VPN works fine. What I would like to do is route all internet traffic through the Firewall when users are connected to the VPN. I have set the default tunnel gateway to 192.168.1.254, but I am having no luck getting this to work.
Any ideas?
Thanks in advance!
Solved! Go to Solution.
03-22-2010 10:42 PM
Are you just going to route the internet traffic from the remote vpn client towards the ASA and straight back out to the internet?
If the above statement is correct, you don't need to configure the tunnel default gateway.
But you need to configure NAT for the ip pool so they can go out to the internet, as well as the "same-security-traffic" command as follows:
nat (outside) 1 192.168.2.0 255.255.255.0
same-security-traffic permit intra-interface
Also, assuming you do not have split tunnel configured.
03-22-2010 10:42 PM
Are you just going to route the internet traffic from the remote vpn client towards the ASA and straight back out to the internet?
If the above statement is correct, you don't need to configure the tunnel default gateway.
But you need to configure NAT for the ip pool so they can go out to the internet, as well as the "same-security-traffic" command as follows:
nat (outside) 1 192.168.2.0 255.255.255.0
same-security-traffic permit intra-interface
Also, assuming you do not have split tunnel configured.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: