Please let me know if my understanding wrong.... You want to create a IPSEC vpn connectivity between your branch office to a data centre.... in your office you have the lan connected to two WAN links say (Link 1 and Link 2) but in data centre you have only 1 WAN link in to the outside interface of the firewall. You want to make your IPSEC vpn between branch and DC for both the links from your brach office LAN.
The below configuration is just an example... you can try this out.... this should work as per my knowledge... pls work with this model and let me know if you get the results... hoping for a good result...
Site 1 with 2 Internet Links
access-list in-to-out extended permit ip 192.168.200.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list in-to-out extended permit if any
access-list in-to-out extended deny ip any any
access-group in-to-out in interface inside
access-list Outside_1_cryptomap extended permit ip 192.168.200.0 255.255.255.0 192.168.2.0 255.255.255.0
access-list Outside_1_cryptomap2 extended permit ip 192.168.200.0 255.255.255.0 192.168.2.0 255.255.255.0
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...