In a branch office I am trying to link two networks together using a Watchguard Firebox x50 and VPN. Here are the details:
192.168.2.0/24 internal network
192.168.22.252 optional port
Computers/printers use this
Cable access to internet
Primary firebox x50 router for this branch
192.168.22.0/24 internal network
Asterisk Server/ SIP phones use this
T1 access to internet
Edgemarc router for VOIP traffic
* Network A&B are segmented via a VLAN
Data center with primary firebox that links all branch offices together via VPN
Corporate office (where I sit)
Both network A&B are the main characters in this, but the others come into play to some extent.
Network A is fully accessible via VPN and only connects to the B network via it's optional port. Since Network B is isolated from the rest of the grid, I need some manner in which to manage both the Asterisk server and the SIP phones, so I configured the optional network in hopes that I could use the existing VPN and route from the trusted to the optional which in theory should give me access to the B network. I can ping 192.168.22.252 from the other remote locations (Data center, corp, etc) and the x50 on Network A shows the Asterisk server (192.168.22.200) in it's ARP table, but I can't access it.
The VPN setup in the Data Center (controls access to all BOVPN's) is setup to connect to both the 192.168.2.0/24 and 192.168.22.0/24 networks at the remote site. The VPN on Network A's Firebox is setup to allow access to both networks. Making that change allows me to access 192.168.22.252 (optional port of Network A) but I can't get any further. I have also disabled traffic filters between the Trusted and Optional interfaces but still no dice.
Any ideas what I'm missing (besides the art of brevity)?