Solved

access shared file behind ISA using VPN

Posted on 2008-10-13
4
353 Views
Last Modified: 2012-06-27
Hi All,

I have a VPN connection between tow ISA server. How can I access files behind ISA server: see following diagram:

Fileserver------ISA2 (VPN)--------------------- ISA1 (VPN)-----------------PC1
10.10.1.1          VPN IP:192.168.1.1            VPN IP:192.168.1.2            10.10.5.5


PC1 can access files on ISA2, but how can user from PC1 access share files on Fileserver?

thanks
0
Comment
Question by:rawandnet
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 51

Accepted Solution

by:
Keith Alabaster earned 500 total points
ID: 22704257
What subnet masks are you using for the 10.10 networks at either end?
0
 

Author Comment

by:rawandnet
ID: 22709702
subnet mask is: 255.255.0.0
the 192.168.0.0 is the ip that is created by VPN
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 22713523
Take a moment to understand that I have a life outside of experts-exchange. Like you, I have a day job and we respond to questions after we get home - in our own time - for nothing - to help you. If you want to dump the question - be my guest.

So you have the 10.10.0.0 255.255.0.0 network at both ends with a site to site vpn connection in the middle?
How would you expect traffic to know which part of the 10.10 network a client is going to be on? ie the local half of the network or the remote half of the network?

Unless you are bridging the vpn connection somehow (which I doubt), this is not going to work. You need different subnets so that you can route traffic accordingly based on destination addresses.
0
 

Author Comment

by:rawandnet
ID: 22718896
thanks
0

Featured Post

Enroll in June's Course of the Month

June's Course of the Month is now available! Every 10 seconds, a consumer gets hit with ransomware. Refresh your knowledge of ransomware best practices by enrolling in this month's complimentary course for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question