We have a Cisco 5506x that we intend to use purely as a VPN concentrator. We have an external firewall, router, and DHCP server.
We're new to the ASA, but have made pretty good progress setting up our VPN clients. We would like to configure our asa-5506x to tunnel into several different subnets. Each subnet is directly connected to the asa. VPN clients receive correct ip in the dhcp scope assigned by group policy, but are unable to access local resources. We can get one subnet working at a time by setting the default tunnel gateway for VPN traffic, but have been unable to get both routes working at the same time.
For this to work we would need to use a route map, correct? Can anyone provide guidance on how this would work?
Assuming your 5506 is connected to a device on your LAN thats doing dynamic routing (and LAN routing) then simply put in a route to send the remote VPN subnet out through the 5506-X
>>asa-5506x to tunnel into several different subnets.
I typically put firewalls on their own /30 network and connect them to layer 3 switches then this sort of thing is simple to do.
If that's not an option, then you can try PATTING all incoming traffic from your remote VPN subnet so it appears on the network as the IP address of the interface on the 5506-X this is not elegant but it might work for you.
When we said the word “hybrid” in the past, it usually recalled the image of a new variety of plant or maybe an electric car. These days, it applies to the workplace too.
The future of work isn’t “changing” to a h...
Thanks for attending our Ask the Experts (ATXs) session! Here’s the post-session resources for easy reference.
New to ATXs? An ATXs session, offered at no cost, is an hour of real-time learning led by Cisco experts, who will answer your technology q...
Cisco Secure Endpoint
New packages fit for every organization
Every Cisco Secure Endpoint (formerly AMP for Endpoints) package comes with Cisco SecureX built-in. It’s our cloud-native platform that integrates all your security solutions into one view wit...
Our Cisco experts and guests chat about how the integration of Cisco Secure Firewall + Secure Workload is securely accelerating application delivery by allowing NetOps to start running at DevOps speed, and what that means for business success.