Allowing domain traffic to pass across point to point
i have a remote office that has a point to point between it and my companys main office. My problem seems to be that no domain traffic is passing from the remote end of the point to point to my main office network. example - i have set a user to change there log in password and there computer never prompts the user to change the password.
I have attached a copy of my routers config, please let me know if anything else needs to be posted.
Re: Allowing domain traffic to pass across point to point
after making that post i started doing some digging around on the internet and found what i think to be my problem.
About a year or so ago an ASA 5510 was installed and from the way that i remember during the setup of that device all traffic from my remote office was going to the firewall and the old firewall was routing it to the correct server/servers. Once the ASA was installed a NAT route was put on the ASA to correct this problem. Any traffic from the remote office back to the main office comes from there side as 10.1.x.x the firewall nats that traffic back to a 172.16.x.x.
With that explained is there any way to change the routes on both ends of the point to point and make them point to my DNS server?
I have attached a copy of both ends of the point to point ip route.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...