The Admin Context inside interface is on VLAN 250 with an IP address of 10.20.20.1 /24.
The 17 Security Contexts have an IP address on their outside interface in the 10.10.10.0 /24 subnet.
Admin context outside interface is connected to Layer2 VLAN100 with an IP address 126.96.36.199 /24.
I also have a VPNSM with an IP address on VLAN 100, 188.8.131.52 /24. I want to terminate all L2L connections on the VPNSM, and have the decrypted traffic routed to the Admin Context for security ACL checks, then routed out to the appropriate interface. There are other interfaces with IP's in different subnets. How can this be achieved?
The traffic that gets decrypted by the VPNSM will get routed to the MSFC and from there it can get to any of the other VLAN's on the MSFC. The other way is true. Users in one of the security contexts can go directly to the SVI configured for the VPNSM.
It is not very clear to me on what you are trying to achieve and it is very hard to tell without having more details. I am sure L2L VPNs can be terminated on the VPN module and the decrypted traffic sent to the other inside VLANs.
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...