i have a remote branch that connects to HQ (one subnet only) via site to site vpn with split tunneling enable. the tunnel is set up and is working. my vendor support website allows only known ip to connect. my branch office does not have static ip but the HQ has. my goal is force branch office to go thru the tunnel when it goes to support website.
the branch has 871 router and HQ has ASA5510
here is a section of the router config
! 192.168.22.0 is branch ! 192.168.230.0 is HQ subnet it can connect ! a.b.c.d is support vendor website
ip nat inside source route-map NoNAT interface FastEthernet4 overload ! ip access-list extended S2Svpn permit ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255 permit ip 192.168.22.0 0.0.0.255 host a.b.c.d
access-list 100 remark set up for S2S vpn tunnel access-list 100 deny ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255 access-list 100 deny ip 192.168.22.0 0.0.0.255 host 220.127.116.11 access-list 100 permit ip 192.168.22.0 0.0.0.255 any access-list 100 deny ip any 192.168.230.0 0.0.0.255 access-list 100 deny ip any host a.b.c.d
route-map NoNAT permit 10
the problem is branch cannot access the support website. i did a trace route from branch. it seems it is going thru the tunnle but show xlate on asa does not show a translation. i have a NAT for the branch on the asa.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :