We are trying to establish a site-2-site VPN between 2 ASA 5520s the remote side is out of my control. ASA-A(my side) is only performing VPN functionality, ASA-B(remote) is performing Firewall and VPN functionality. The remote side's internal network must be NAT'd. There are several IP nets behind the remote. We want to NAT the remote internal nets to 1 IP address. It appears that when a device on the remote, internal network initiates traffic, ASA-A(my side) drops the traffic as it appears to be sourced from the internal IP address rather than the expected single NAT address. Based on the ACLs, the traffic is dropped. Can the traffic originiating on the ASA-B remote network be translated prior to entering the VPN tunnel? If so how is this performed?
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...