There is a ASA 7.2 acting as a VPN gateway for a Remote Access VPN.
There are primarily three networks behind the ASA inside network that are accessed by Remote VPN clients. They are:
There is an access-list on which the ASA is doing No natting and Split tunneling for these three networks.
From the above three networks, 192.168.7.0 and 192.168.8.0 are local network resources. The other network viz. 10.10.0.0 is a remote network to the ASA and is accessible via a MPLS link to the remote network.
All the three networks are reachable from the ASA but for the remote clients, only the local networks behind the ASA are reachable viz. 192.168.7.0 and 192.168.8.0. The remote network on other end of MPLS 10.10.0.0 is not reachable for the remote VPN clients.
Is it possible for these remote VPN users to access 10.10.0.0 network (remote network to ASA)? Just wanted to know if it is technically possible and any directions/ pointers?
I am also enclosing a copy of the config for your kind reference.
I dont think I have a solution to your problem, but your inside acl is poorly configured..
access-list inside extended permit ip host 192.168.8.51 any log critical
access-list inside extended permit ip any any
access-list inside extended permit icmp any any
access-list inside extended permit tcp any any eq ftp
access-list inside extended permit tcp any any eq ftp-data
your permit ip any any statement negates anything after it (and really everything before it). You dont even need that ACL on the inside interface, unless you want to specifically deny any traffic, or specifically permit any traffic while denying others. your permit ip any any causes EVERYthing to be allowed through.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :