Trying to figure out how to get my SSL VPN users to gain access to a remote server on the other side of a site to site vpn.
SSL VPN users ---> ASG F/W ---> inside network
10.242.2.0 xx.xx.xx.xx 192.168.200.x (fictitious)
This works fine but now I need to add access to a remote server.
I have a site to site vpn between 2 cisco asa devices in order to get to a server say with an address of 192.168.100.100. I route all traffic on my inside network 192.168.200.x going to 192.168.100.100 from the ASG F/W to my Cisco ASA and get to the remote server fine.
But the SSL VPN users are not part of the 192.168.200.x subnet but are part of the 10.242.2.0. If I add in the SSL VPN ip range to the encryption domain of the site to site vpn... how do I add routes to the end user's ssl session?
SSL VPN users ---> ASG F/W ---> inside network
10.242.2.0 xx.xx.xx.xx 192.168.200.x (fictitious)
This works fine but now I need to add access to a remote server.
I have a site to site vpn between 2 cisco asa devices in order to get to a server say with an address of 192.168.100.100. I route all traffic on my inside network 192.168.200.x going to 192.168.100.100 from the ASG F/W to my Cisco ASA and get to the remote server fine.
But the SSL VPN users are not part of the 192.168.200.x subnet but are part of the 10.242.2.0. If I add in the SSL VPN ip range to the encryption domain of the site to site vpn... how do I add routes to the end user's ssl session?