07-01-2010 02:34 AM
Hi,
I have two sites each having an ASA 5510 firewall. Anyconnect clients connected to one site can access resources in both sites. Webvpn clients connected to one site cannot access resources in another site. Is there something I have missed out?
Thanks,
Simon
07-01-2010 06:02 AM
Hi Simon,
When you refer to AnyConnect clients you refer to SSL VPN clients and webvpns to client-less SSL connections corrrect?
If this is so, do you have split-tunneling configured for both VPNs?
Are you using a separate group-policy for AnyConnect and webvpn? If this is so, you might have a different split-tunneling policy.
Is the pool of addresses the same for both connections?
Federico.
07-01-2010 06:04 PM
Hi Simon,
Most probably the crypto ACL between the site-to-site tunnel does not include the following for the webvpn client to access resources behind the remote LAN:
- On the ASA where the webvpn is terminating, the site-to-site crypto ACL should include access-list to permit the outside interface ip address of the ASA towards the remote LAN subnets, and the mirror image ACL on the remote ASA.
This is because ASA is proxying the webvpn traffic and traffic from the ASA towards the network resources is sourced based on the routing. Since network resources behind the remote LAN will be routed towards the outside interface, the webvpn traffic is sourced from the outside interface.
- Secondly, the NAT exemption on the remote ASA should include ACL that permits remote LAN subnets towards the HQ ASA outside interface IP.
Hope that helps.
07-01-2010 11:15 PM
Hi Halijenn,
Thanks very much for your help, it works. I forgot to include the outside ip in the remote crypto acl and nat exemption in the remote asa.
Thanks,
Simon
07-01-2010 11:49 PM
Thanks, glad to hear it's working now.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide