cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
638
Views
0
Helpful
6
Replies

Communicating between remote access VPN subnets

jgorman1977
Level 1
Level 1

I have two remote vpn subnets that need to communicate. I have my access list as

access-list No-NAT extended permit ip 172.16.140.0 255.255.255.0 172.18.3.0 255.255.255.0, however this does not seem to do the trick. Could these VPN's be terminating on different interfaces such as one external, one DMZ?

Thanks in advance

6 Replies 6

Olivier Jessel
Level 1
Level 1

hi,

Have you also setup an ACL allowing the traffic to this remote subnet 172.18.3.0/24 ?

CCIE #44658

I do have the ACL

access-list Internal line 40 extended permit ip 172.16.0.0 255.255.0.0 172.18.3.0 255.255.255.128 (hitcnt=0) 0x92cd7baf

Thanks

no hitcount... are you sure that any previous statement of this ACL doesn't deny the traffic ?

Is your VPN up ? ipsec or GRE ?

CCIE #44658

Both are IPSec and both are up. The 172.16.140.0/24 subnet is our VPN client subnet to the ASA and the 172.18.3.0/24 subnet are Cisco 871's terminating to the ASA.

if I right understand, both are remote...

Have you configured split-tunneling ?

CCIE #44658

Yes, they are both remote. I have the following split-tunnel acl:

access-list Indy-Remote_splitTunnelAcl_1 line 28 extended permit ip 172.18.0.0 255.255.0.0 172.16.140.0 255.255.255.0 (hitcnt=0) 0x5a58ce89

The main issue is i have users on the 172.18 subnet using IP communicator trying to contact users on the 172.16 subnet also using IP communicator. They cannot hear each other. The Call Manager server is located with the ASA, so I wouldn't think there would be enough delay to the packets to cause this issue.

Thanks again.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card