using remote clinet access site to site network

Unanswered Question
Dec 28th, 2009
User Badges:

hi friends,


here is my scenario,


i have site to site tunnel between dubaidata center  to india, from dubai datacenter to dubai office leased line is there so i can communicate with india network also via leasedline through vpn


now i am configuring remoteclient in dubai datacenter asa , and i am connecting from my dubai office to dubai dc through remote client ,is it possible i can access india network through this remote client because my leased line in down between dubai office to dubai dc.


give me sugg ASAP



thanks

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
acomiskey Mon, 12/28/2009 - 09:31
User Badges:
  • Green, 3000 points or more

So you want to remote vpn into dubai data center then take the vpn tunnel to india?


You need to add this traffic to your crypto acl's for the site to site tunnel and allow intra-interface traffic on dubai data center ASA.


dubai dc ASA

same-security-traffic permit intra-interface

access-list extended permit ip


india ASA

access-list extended permit ip

access-list extended permit ip


Also, if you are split tunneling at dubai dc, make sure you add the india network to the split tunnel acl.

zeuscyril Wed, 03/10/2010 - 00:18
User Badges:

hi,


i tried what you are given to me still no



data center:

access-list vpn-aldafra extended permit ip 10.83.32.0 255.255.255.0 10.83.38.0 2
55.255.255.0
access-list vpn-aldafra extended permit ip 192.168.80.0 255.255.255.0 10.83.38.0
255.255.255.0


India:


ip access-list extended VPN
permit ip 10.83.38.0 0.0.0.255 10.83.32.0 0.0.0.255
permit ip 10.83.38.0 0.0.0.255 192.168.80.0 0.0.0.255
ip access-list extended internet
deny   ip 10.83.38.0 0.0.0.255 10.83.32.0 0.0.0.255
deny   ip 10.83.38.0 0.0.0.255 192.168.80.0 0.0.0.255
permit ip 10.83.38.0 0.0.0.255 any


10.83.32.0--dc

10.83.38.0 -- india

192.168.80.0 ---remote


thanks

cyril

zeuscyril Tue, 04/06/2010 - 05:53
User Badges:

hi,


i am able to access the site to site network ,


but once i connected the vpn client i got one IP from VPN pool ip.


once ip ping the ip from other side then only i can able to success

Jennifer Halim Tue, 04/06/2010 - 06:00
User Badges:
  • Cisco Employee,

If you have split tunnel configured, you also need to include india LAN (10.83.38.0/24).

zeuscyril Tue, 04/06/2010 - 06:06
User Badges:

i added in split tunnel already,


what happening you know ,


foreaxmple i am getting 192.168.80.107 ip once i connected through client



then i need to ping from india to this ip then only the communication happening


thanks

Jennifer Halim Tue, 04/06/2010 - 06:15
User Badges:
  • Cisco Employee,

Do you have CBAC configured on India router? Any access-list configured on the outside interface? Can you share the India router config?

Actions

This Discussion