I have an issue where my vpn clients are unable to access certain vlans in my network.
I have configured an ASA 5520 with VPN access using the wizard and using the ASA as a dhcp server for VPN clients. I find that this allows the clients to access server resources such as the Exchange and Domain Controller but I find that these vpn clients are unable to ping each other as well as certain vlans that I have.
Is there a way to configure the ASA to use a particular vlan that is already configured on the core switches?
If I create a vlan interface and set the IP of it to 10.50.x.x then the vpn clients are suddenly unable to connect to any network resources...
The network that you can't get to need to know how to route back to the VPN Client IP Subnet, ie: it needs to be able to route back towards the ASA. Also, if you configure split tunnel, makes sure that those subnets that you can't access are listed in the split tunnel access-list. Lastly, you would also need to have NAT exemption configured on the ASA for those subnets, and have routes on the ASA for those subnets.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...