We have a default route on the Core switch saying all traffic goes towards the Core Router. I add a route on the Firewall saying that a host (22.214.171.124) should go towards the VPN router. I add NAT statement to nat the traffic towards the VPN router and out the Internet. When I ping from the firewall to 126.96.36.199 it doesnt ping. However when i remove the nats and the routes it pings.
My question is if there is a default route on the switch pointing to the core router, then will another specific static route on the firewall towards the VPN router work? it should work since its logical that I am pinging from the firewall.
This is my nat statement
nat (inside) 10 access-list site_to_site
global (vpn-network) 10 192.168.10.20
access-list site_to_site extended permit ip object-group internal_hosts host 188.8.131.52
The default route goes towards the ISP Router from the switch. Even if this is the case, since i have a default route on the firewall telling it to pass traffic towards the VPN router, isnt it logical that if i am pinging from the firewall it should pass towards the vpn router. The switches are behind the firewall so it wont even be looking at that side.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...