I have two sites (Site A and Site B) connected by Cisco ASA 5506 site to site VPN. Internally, routing appears to work fine. Device in Site A can access devices in Site B and vice versa.
Site A has all servers, DNS. DUO authentication is setup to do 2FA for remote users that connect to Site A. At Site B, there are no servers, no DNS, no DUO Auth. All users must use the Site A VPN to connect to the corporate network. I have users that must VPN to Site A and use RDP to access workstations in Site B.
However, these users can access Site A devices only. They cannot ping nor otherwise RDP to the devices in Site B while connected to the VPN at Site A. I am sure the devices in Site B do not know how to get back to the remote VPN subnet.
Interestingly, the ASAs cannot ping the devices at the other site either. If I try to ping the server at Site A from the ASA in Site B, it does not reply. I feel this is an internal routing issue in the ASAs configuration.
I feel this is an internal routing issue in the ASAs configuration.
ASKER
ASKER
2) I had to add the SSL VPN IP range into a address object in the firewall for Site B and create a policy allowing it to access the desired VLAN(s)
ASKER
A router is a networking device that forwards data packets between computer networks. Routers perform the "traffic directing" functions on the Internet. The most familiar type of routers are home and small office cable or DSL routers that simply pass data, such as web pages, email, IM, and videos between computers and the Internet. More sophisticated routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers that forward data at high speed along the optical fiber lines of the Internet backbone. Though routers are typically dedicated hardware devices, use of software-based routers has grown increasingly common.
TRUSTED BY
ASKER