I have been trying to march to my own drummer but it looks like I can't get that square peg into that round hole no matter how hard is shove.
Now it's time to ask the community for some suggestions as to how I might resolve my problem. Just for your information, the Splash Page being used is NoCatSplash and I have that working without a problem once the wireless node hits the server (159.xxx.xxx.20).
I have been tasked to make our three wireless networks go through a common Splash Page. The three wireless networks break down as follows.
Local wireless network is directly connected to the same Cisco ASA 5510 as the destination Splash page.
Looks like this 10.1.0.0/24 all output needs to go through here 159.xxx.xxx.20 (Splash Page IP)
Remote wireless network #1 is connected to the Cisco ASA 5510 as the destination Splash page through a tunnel.
Looks like this 192.168.103.0/24 needs to go through here 159.xxx.xxx.20 (Splash Page IP)
Remote wireless network #2 is connected to the Cisco ASA 5510 through a Nat IP that is allowed on the ASA.
Looks like this 10.1.0.0/24 needs to go here 159.xxx.xxx.20 (Splash Page IP)
I have WAPs available that let me see the Wireless Nodes IP addresses at 159.xxx.xxx.20 without NAT for the Local Wireless and Network 1.
I am not even going to think about network 2 right now because I think it will require a different solution, but is part of the big picture.
Local Wireless Network --- ASA 5510 --- 159.xxx.xxx.20
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...