Skip to main content

Allow traffic between L2L and remote VPN subnets

More
9 years 2 months ago - 9 years 2 months ago #38681 by gustaav
Hello. We have this VPN scenario with our Cisco ASA firewalls:
  • Our main's office LAN subnet: 172.16.0.0/25
  • Our branch's office LAN subnet: 172.16.1.0/25
  • Our branch's office IP pool for remote VPN: 172.16.1.128/25
There's a site-to-site VPN configured between the Cisco ASA firewall of the main office and the Cisco ASA firewall of the branch office. The branch office has several VPN remote users. So:
  • Traffic between subnets 172.16.0.0/25 and 172.16.1.0/25 works fine.
  • Traffic between subnets 172.16.1.0/25 and 172.16.1.128/25 works fine through Cisco VPN client.
The question is: What ACL/NAT configuration do I need in the branch's firewall in order to allow traffic between 172.16.1.128/25 subnet and 172.16.0.0/25 subnet?
Thanks in advance!
Last edit: 9 years 2 months ago by gustaav.
More
9 years 2 months ago #38682 by gustaav
I made some changes, but still no luck! Now, this second VPN scenario is this:
  • Our main's office LAN subnet: 172.16.0.0/25
  • Our branch's office LAN subnet: 172.16.0.1/25
  • Our branch's office IP pool for remote VPN: 172.16.1.101/25 - 172.16.1.109

In this scenario, the IP pool for remote VPN are in the same subnet of branch's office LAN, but still, there's no traffic between remote VPN and main's office subnet. Any clue why this scenario or the previous doesn't work for me?
Time to create page: 0.112 seconds