![]() Or, if I source the packet tracer packets from inside, then they are dropped because "Reverse-path verify failed". ![]() Without hinting to the Packet Tracer to use a VPN conneciton, then if I trace from the outside port, the packets are blocked, because generic outside packets can't get here, only packets via the VPN. ![]() Is there a way to set the Packet Trace to be as if its source is via an established VPN connection? I was hoping to use the built-in Packet Tracer to experiment with this, but I don't know how to get the Packet Tracer to use the VPN tunnel. Are they from the Outside interface? Does the VPN magically map them into the DMZ or Inside interface? What controls this? ![]() ![]() I have a working site-to-site IPsec VPN (created with the ASDM wizard), where the remote hosts come into our network through the range 172.16.203.0/24, and they can access some hosts in our local DMZ at addresses 172.168.1.74.īut, I don't have a good conceptual understanding of how the ASA processes these packets. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |