We currently have exchange servers in one of our sites in Canada . Remote users login to this server by using their VPN client.VPN is being handled by a PIX firewall which gives out a 10.10.10.x address to anyone that connects.
We also have a site to site tunnel between the firewall in Canada and our office in Vienna , VA . We have created object groups and the corresponding access-lists which allow all the subnets in Ottawa to talk to all of our subnets in Vienna through the VPN.
The subnets in Vienna are 10.11.x.x and the subnets in Canada are 10.0.250.x and 10.0.150.x
We are moving the exchange servers from Canada to Vienna and herein lies the problem.
Users logging in via the VPN client now get the IP address 10.10.10.x. I have added this network to the object group here in Vienna and also in Ottawa . This however did not work. The VPN user was unable to access the test server while he had an IP address of 10.10.10.x
My question is this .. what changes do I need to make on the firewalls to ensure that the remote user logging in via VPN client is able to access my server here in Vienna.In other words , how I let the 10.10.10.x address know that in order to get to 10.11.x.x , it needs to take the existing site- site VPN tunnel.
I need to fix this problem quickly and any help on this matter would be greatly appreciated.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :