Solved

ASA Remote Access VPN to two inside interfaces

Posted on 2014-01-10
6
1,236 Views
Last Modified: 2014-01-28
Hello I a VPN inquiry. Here are the details:

ASA 5520 v8.3
“inside” interface (network 1, 172.16.0.x/24)
“inside2” interface (network 2, 192.168.0.x/24)

REMOTE ACCESS VPN
I have an IPsec remote access vpn setup to access the first network on the “inside” interface, but I cannot access the second network on the “inside2” interface. I am not sure if I can make a static route on the ASA or other config.

Question: Will the ASA allow me to setup one remote access VPN to two inside interfaces or do I have to have one connection profile per interface?

I am not sure, but I am guessing there are a couple of solutions. Any suggestions that can get me headed in the right direction will help.

Just a note, there are two separate networks and Windows Domain. Each ASA physical inside interface is connected to a core switch to each respective network. I need to be able to remotely manage each network.
0
Comment
Question by:ItSecurePro
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 3
6 Comments
 
LVL 31

Accepted Solution

by:
Gareth Gudger earned 300 total points
ID: 39772329
Hi ItSecurePro,

No, you would not need a route. The ASA is aware of every subnet directly connected to its interfaces.

Off the top of my head, you should only need to modify an ACL. You would have created an ACL for the VPN when you first set it up. If you need the name of the ACL associated with the VPN it is likely referenced as:

NAT (inside) 0 access-list <name of ACL>.

Look for NAT 0. Probably the first NAT statement.

Just add an extra line in that ACL that permits traffic from the INSIDE IP subnet to the INSIDE2 IP subnet.

ie. access-list <name of VPN ACL> extended permit ip 172.16.0.0 255.255.255.0 192.168.0.0 255.255.255.0

That should do it.
0
 

Author Comment

by:ItSecurePro
ID: 39772515
Thank you! I will give this a try and report back.
0
 

Author Closing Comment

by:ItSecurePro
ID: 39777869
Thank you for leading towards the right direction. I had to add the other network (on the other inside interface) and fix my NAT rule for the vpn.

I created a ACL for my VPN IP Pool, then added an ACE for both network (172.16.0.x/24, and 192.168.0.x/24.

Next I added a any, any static NAT for traffic on both inside interfaces:

nat (any,any) source static any any destination static VPN-Hosts-Object VPN-Hosts-Object
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 39778216
Glad you got it resolved! I just noticed you were on 8.3 as well. I was giving you instructions for 8.2 and earlier - Sorry!
0
 

Author Comment

by:ItSecurePro
ID: 39815431
No problem. It is taking me a little time to get used to the changes for 8.3 and higher. The NAT commands are completely different now, but I got it down. Thanks.
0
 
LVL 31

Expert Comment

by:Gareth Gudger
ID: 39815644
Yes.... they are very different.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question