We have two ASAs with private networks on either side. These two ASAs have an IPSec site-to-site tunnel between them. The primary ASA at the main office has a bunch of AnyConnect clients. These clients can talk to each other and other systems in the office as expected, but are unable to communicate with any of the systems in the remote office's subnet.
Is there a way to enable the systems in the remote subnet to talk to the AnyConnect clients?
192.168.12.0/24 (VPN Client subnet) -> 192.168.0.0/22 (Main office) -(site-to-site IPSec tunnel)> 192.168.100.0/22 (Remote office)