[SIZE=14px]Hello. We have this VPN scenario with our Cisco ASA firewalls:[/SIZE]
Our main’s office LAN subnet: 172.16.0.0/25
Our branch’s office LAN subnet: 172.16.1.0/25
Our branch’s office IP pool for remote VPN: 172.16.1.128/25
[SIZE=14px]There’s a site-to-site VPN configured between the Cisco ASA firewall of the main office and the Cisco ASA firewall of the branch office. The branch office has several VPN remote users. So:[/SIZE]
Traffic between subnets 172.16.0.0/25 and 172.16.1.0/25 works fine.
Traffic between subnets 172.16.1.0/25 and 172.16.1.128/25 works fine through Cisco VPN client.
[SIZE=14px]The question is: What ACL/NAT configuration do I need in the branch’s firewall in order to allow traffic between 172.16.1.128/25 subnet and 172.16.0.0/25 subnet?[/SIZE] [SIZE=14px]Thanks in advance![/SIZE]