I have a Cisco 5512 ASA with Firepower Service running on a VPN. It currently has a Static IP out to the internet for WAN, and then one port being used on 192.168.2.5 and Firepower on 192.168.2.3 IP's.
Learning on how to set this up and playing with configs, but I can only access it when on a IP Address on the PC with 192.168.2.X network.
How can I set a config on this to allow me to access it from other IP's like 192.168.1.X etc.
ciscoasa(config)# route inside 192.168.3.0 255.255.255.0 192.168.2.5
ERROR: Invalid next hop address 192.168.2.5, it matches our IP address
Ken Boone
You need to use the next hop that the ASA needs to route to in order to reach the route destination
route inside 192.168.3.0 255.255.255.0 192.168.2.x <-- this needs to be a layer 3 device on the 192.168.2.x network that can route to the 192.168.3.x network.
William Murray
Did you use the management port for access to the Firepower service?
If you used the management interface you will need a route statement like. Or if you have a layer 3 router in your network,
ip route 192.168.2.0 255.255.255.0 via the inside ip on the asa?
NJ_CONSULTANT
ASKER
WIlliam, Yes the Firepower Module is using the Management Port
William Murray
So you then need a route route management 192.168.1.0 255.255.255.0 192.168.2.1
ok so if the ASA can reach the internal network, that means this asa knows how to route traffic to that network. Is this client vpn traffic of lan 2 lan vpn traffic?
Do you have a nat statement that basically tells the internal traffic to NOT nat when talking to VPN users?
Post your config lines that deal with the VPN.
NJ_CONSULTANT
ASKER
The Client is the Cisco AnyConnect, not L2L traffic
I do not know if I have a NAT statement Ken, do you have an example statement I can try?
I can dump my config. its pretty messy right now from trying things. Currently the ASA Connects to the Switch and then has a IP Passthrough to the ISP Router ( Wireless for Now Cradlepoint)