I have one Cisco ASA 5520 which has 3 interfaces.
1- Interface gigabitEthernet0/0 (Name: outside, security-level 0)
2- Interface gigabitEthernet0/1 (Name: inside, security-level 100)
3- Interface gigabitEthernet0/2 (Name: vpnbranch, security-level 50)
The outside interface of the ASA is connected to Internet router which is using public IP, and inside interface is private. My local host now can access Internet normally.
The question is how to configure ASA for the DMZ(vpnbranch interface) to allow inbound vpn traffic as this interface will connect to our branch offices by vpn connection and how to allow branch's host to access Internet via the ASA 5520 and my local server farm.
Note: Branch office is using Pix506E and the connection between the branch to headoffice doesn't have Internet access, meaning just only bridge connection.
Any solution would be highly appreciated.