01-27-2010 11:12 PM
We have an ASA 5505 running ASA 8.2.1, and using IPSec clients to Remote access into the main office. The remote access is working great, with full access to the network resources at the main office, and the one thing I can't get to work is internet access through the tunnel. I do not want to use split tunnelling. I am using ASDM 6.2.1 for configuration. Any assistance is appreciated. I am probably missing something simple, and have looked at it so much, I am probably looking right past the mistake. Thanks in advance for your time and assistance! Jim
Solved! Go to Solution.
01-28-2010 06:58 AM
add a nat statement for your client segment on the outside interface
then allow traffic to be routed back out the same interface it came in on
same-security-traffic permit intra-interface
*
*
*more info can be found here:
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml*
On Wed, Jan 27, 2010 at 11:12 PM, jimcanova <
01-28-2010 06:58 AM
add a nat statement for your client segment on the outside interface
then allow traffic to be routed back out the same interface it came in on
same-security-traffic permit intra-interface
*
*
*more info can be found here:
http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a00807e0aca.shtml*
On Wed, Jan 27, 2010 at 11:12 PM, jimcanova <
01-28-2010 05:29 PM
HI,
Just add the commands to Uturn the traffic from the outside inerface,
nat (outside) 1
global (outside) 1 interface
All the VPN client users would take ASAs public IP to go to the internet.Check Whatismyip.com
Regards,
Pradhuman
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: