Access Remote ASA usnig ASDM from HUB via Site to Site VPN...

Answered Question
Jan 22nd, 2014
User Badges:

HI,


I want to access my remote(spoke) ASA (ASDM) in my hub location..do not want to access via public IP from outside.


what configuration should be done on the spoke ASA..




                                               VPN Tunnel               SPOKE

      inside            HUB|=======================[ASA] inside 192.168.2.0/24

  192.168.1.0/24   ASA|

                                 |=======================[ASA] inside 192.168.3.0/24

                                            VPN Tunnel

Correct Answer by Jouni Forss about 3 years 6 months ago

Hi,


Did you get it working?


Please do remember to mark a reply as the correct answer if it answered your question.


Or did you have the chance to test it out yet?


- Jouni

Correct Answer by Jouni Forss about 3 years 6 months ago

Hi,


Provided that management connections are coming from a source address that is already configured on the L2L VPN and naturally that the destination address (Hub ASA interface IP) is also part of the current L2L VPN then you would essentially only need to add


management-access


Which would allow management connections through the L2L VPN to this internal interface


You would also need the appropriate statement to allow the ASDM management


http inside


I think you needed to use the "inside" at the end. Can't remember. Try "outside" if that doesnt work.


Naturally if you have any kind of VPN Filter ACLs or if you are preventing the default operation of VPN traffic bypassing external interface ACL then you will also have to allow the traffic.


Hope this helps


- Jouni

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (2 ratings)
Loading.
Correct Answer
Jouni Forss Wed, 01/22/2014 - 00:46
User Badges:
  • Super Bronze, 10000 points or more

Hi,


Provided that management connections are coming from a source address that is already configured on the L2L VPN and naturally that the destination address (Hub ASA interface IP) is also part of the current L2L VPN then you would essentially only need to add


management-access


Which would allow management connections through the L2L VPN to this internal interface


You would also need the appropriate statement to allow the ASDM management


http inside


I think you needed to use the "inside" at the end. Can't remember. Try "outside" if that doesnt work.


Naturally if you have any kind of VPN Filter ACLs or if you are preventing the default operation of VPN traffic bypassing external interface ACL then you will also have to allow the traffic.


Hope this helps


- Jouni

Correct Answer
Jouni Forss Wed, 01/22/2014 - 02:50
User Badges:
  • Super Bronze, 10000 points or more

Hi,


Did you get it working?


Please do remember to mark a reply as the correct answer if it answered your question.


Or did you have the chance to test it out yet?


- Jouni

suhas_syndrome Wed, 01/22/2014 - 03:17
User Badges:

Hi Jouni,


i have tested it on remoteaccess vpn and it is working fine. now only on site to site vpn i need to check.


suhas

Actions

This Discussion