03-22-2010 09:21 PM - edited 02-21-2020 04:33 PM
Armed with an ASA 5505 Security Plus, I have setup IPSec VPN for RA. The VPN IP Address pool is in the 192.168.2.0/28 network.
The Lan is 192.168.1.0/24 with the inside interface at .254.
The VPN works fine. What I would like to do is route all internet traffic through the Firewall when users are connected to the VPN. I have set the default tunnel gateway to 192.168.1.254, but I am having no luck getting this to work.
Any ideas?
Thanks in advance!
Solved! Go to Solution.
03-22-2010 10:42 PM
Are you just going to route the internet traffic from the remote vpn client towards the ASA and straight back out to the internet?
If the above statement is correct, you don't need to configure the tunnel default gateway.
But you need to configure NAT for the ip pool so they can go out to the internet, as well as the "same-security-traffic" command as follows:
nat (outside) 1 192.168.2.0 255.255.255.0
same-security-traffic permit intra-interface
Also, assuming you do not have split tunnel configured.
03-22-2010 10:42 PM
Are you just going to route the internet traffic from the remote vpn client towards the ASA and straight back out to the internet?
If the above statement is correct, you don't need to configure the tunnel default gateway.
But you need to configure NAT for the ip pool so they can go out to the internet, as well as the "same-security-traffic" command as follows:
nat (outside) 1 192.168.2.0 255.255.255.0
same-security-traffic permit intra-interface
Also, assuming you do not have split tunnel configured.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide