crypto map mat-vpn 2 ipsec-isakmp set peer x.x.x.x set transform-set mat-mm-set match address ACL-MM ! ! ! ! ! ! ! interface GigabitEthernet0/1/0 ip address XXXXXXXXX media-type rj45 negotiation auto ! interface GigabitEthernet0/1/1 XXXXXXXXXXXX media-type rj45 negotiation auto crypto map mat-vpn ! interface Serial0/2/0 no ip address shutdown ! interface Serial0/2/1 no ip address shutdown ! interface Serial0/2/2 no ip address shutdown ! interface Serial0/2/3 no ip address shutdown ! interface GigabitEthernet0 vrf forwarding Mgmt-intf no ip address shutdown negotiation auto ! ! no ip http server no ip http secure-server ip route 0.0.0.0 0.0.0.0 XXXXXXXXX ip route 0.0.0.0 0.0.0.0 18.104.22.168 254 ip route 192.168.0.0 255.255.0.0 192.168.40.1 ! ip access-list extended ACL-MHQ permit ip 192.168.60.0 0.0.0.255 10.176.32.0 0.0.15.255 permit ip 192.168.60.0 0.0.0.255 10.176.58.0 0.0.1.255 permit ip 192.168.60.0 0.0.0.255 10.176.0.0 0.0.255.255 ip access-list extended ACL-MM permit ip 192.168.60.0 0.0.0.255 10.176.90.0 0.0.0.255 ! ! ! ! control-plane ! !
It looks like traffic is being matched on both tunnels so there will be unexpected results. Traffic going to 10.176.90.0/24 in the ACL-MM access-list will also match on 10.176.0.0/16 in ACL-MHQ access-list. Are you able to be more specific with the ALC-MHQ access-list?
ip access-list extended ACL-MHQ permit ip 192.168.60.0 0.0.0.255 10.176.32.0 0.0.15.255 permit ip 192.168.60.0 0.0.0.255 10.176.58.0 0.0.1.255 permit ip 192.168.60.0 0.0.0.255 10.176.0.0 0.0.255.255 ip access-list extended ACL-MM permit ip 192.168.60.0 0.0.0.255 10.176.90.0 0.0.0.255
-- Please remember to select a correct answer and rate helpful posts
Are you responsible for risk management, compliance management and auditing of a network?
If so, we’d like to speak with you to learn your current processes of enforcing compliance and managing risk to help us develop services that will ...
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...