IPSEC to two internal vlan

Unanswered Question


I was running ASA with remote (IPSEC) vpn.The internal network was with only one vlan(default VLAN1)and everything seems working fine.

And Now due to one particular requirement I need to create one more vlan and allow internet access.There shouldn't be no communication among these vlans so I created access list on my L3 switch to block traffic between these two and allowed internet access only.

Would like to know can I access my new created vlan through remote vpn(with same credentials which were for vlan1).

In short one more vlan with no communication among them but remote vpn access.

What all changes are required if I want to allow vpn access to this vlan.



  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
michael.leblanc Tue, 06/03/2008 - 06:51
User Badges:
  • Silver, 250 points or more

If you are doing a policy push to the RAVPN client that includes an ACL, it might need to be changed due to the additional IP address space now occupied by the added VLAN.

Your interface ACLs may need to be modified depending on what is implemented currently (again, due to the added IP address space).


This Discussion