I have a problem need your help. Our users will use VPN to remote access to office internal private network, they are assigned IP address from 192.168.1.0-192.168.1.254
We are using Juniper firewall as our Internet firewall and it will point to ISP PE router for access Internet. The VPN client will terminate at PIX 515 firewall.
This PIX has 2 interfaces: one facing Internet and the other facing another ASA firewall which will control the traffic to internal network.
I have add the route of this segment in the ASA and other network devices, and the PIX has a default route to Juniper and route internal network to ASA.
When the user use Cisco VPN client to connect VPN, the tunnel is successful to establish, and the PIX will automatically add a host route 192.168.1.1/32 to Juniper firewall.
The problem is the VPN client cannot ping or do remote desktop to internal private network. I have checked the ACL in ASA and route in ASA for both direction are correct.
Would you please tell me the how the routing work when VPN client establish tunnel with PIX, because from the client, its default gateway is the IP address itself, for example client has IP address 192.168.1.1 and the gateway also 192.168.1.1
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :