Hi Piotr,

Could you please explain why SSH 10.70.X.X Inside?


Regards,
Parvez

On Sat, Jul 7, 2012 at 12:06 PM, Piotr Tokarzewski <
[email protected]> wrote:

> Hi,
>
> You must set management interface:
> management-access inside
>
> and then use this interface instead of outside:
>
> SSh 10.70.X.X Inside
>
> SSh 10.60.X.X Inside
>
> Regards
> Piotr
>
> 2012/7/7 Parvez Ahmad <[email protected]>
>
>> Hello,
>>
>> Topology
>>
>>
>> LAN1(10.70.X.X)-------ASA1(Public)--------------Internet-------------(Public)Router1-----(Outside)ASA2(Inside)----LAN2(10.60.X.X)
>>
>>
>>
>> There is site to site IPSec tunnel between ASA1 and Router1; I want to
>> access ASA2 over the VPN form LAN1.
>>
>>
>> I put below commands on ASA2 by taking remote.
>>
>>
>> SSh 10.70.X.X outside
>>
>> SSh 10.60.X.X Inside
>>
>>
>> And apply an ACL to permit source IP (10.70.x.x)and destination IP (any)
>> port tcp 22 on outside interface.
>>
>>
>> But it is still not working. However it is working form LAN2.
>>
>>
>> Please  suggest, how I can access ASA2 over the IPSec VPN from LAN1.
>>
>>
>>
>> Thanks,
>>
>> Parvez
>>
>> _______________________________________________
>> For more information regarding industry leading CCIE Lab training, please
>> visit www.ipexpert.com
>>
>> Are you a CCNP or CCIE and looking for a job? Check out
>> www.PlatinumPlacement.com
>>
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Are you a CCNP or CCIE and looking for a job? Check out 
www.PlatinumPlacement.com

Reply via email to