We need you help connecting three sites with our Central site having all the resources for the users including internet access.
All three sites will have the ASA 5505 as their WAN device.
We need to know is this possible, for configuring an IPsec Tunnel Between all three ASA's with Duplicate LAN Subnets.
Central Site two networks 192.168.1.x /24, 192.168.100.x /24
Remote One subnet 192.168.1.x /24
Remote Two one subnet 192.168.100.x /24
If above is possible we also need to do Hair pinging from Remote One, Remote Two to the Central Site for internet access, everything both sites need are located at the Central Site, including e-mail, network folders, other resource too.
We have no other way for doing this network, as all security is located at our Central Site, for Website filtering, Application filtering, all network traffic filtering.
We understand we can change both Remote sites to a different subnet from the Central Site but we have so many host devices this will take weeks or months to complete, along with changing the MS AD Domain for all end users, Servers too.
We really need your expertise for doing this in a lab then into production.
As jumora has mention, you can do this by using NAT. Setup a different subnet for each site and NAT to that subnet. Then create a crypto ACL that specifies the local LAN as the source and the NATed subnet as the destination. This must be done at each site.
The down side to this is that if you are using FQDNs to access servers/PCs at each site, then you would need to create static DNS entries for each new NATed server IP.
Please rate all helpful posts
Please remember to rate and select a correct answer
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :