Have an ASA 5510 with three interfaces in use
Outside - public ip
Inside - 172.16.42.x /24
Third Interface - 172.16.52.x /24
Remote VPN Clients - 172.16.45.x /24
Both Inside and Third Interface have a security setting of 100 and routing between them works fine.
The problem is that when users connect to the ASA via the cisco vpn client, they are assigned an address from the 172.16.45.x /24 subnet. From this subnet they are able to communicate with the 172.16.42.x (Inside) subnet without any problem but can't connect to the 172.16.52.x (Third Interface) subnet.
I have these in the config -
same-security-traffic permit inter-interface
same-security-traffic permit intra-interface
and access lists that explicity allow traffic between 172.16.45.x and 172.16.52.x but traffic is being dropped.
Is it possible to have my Remote Access VPN users communicate with the Third Interface network?