All,
I have a cisco 5505 running on a plus license.
It has a number of physical ports which are members of seperate vlans with different private ranges applied to them.
I have just added a second site to site VPN which terminates on the outside interface. I have a vlan called inside-test with a 172.16.20.254 address and would like it to go over the 2nd VPN on the outside interface. the IPSec sa establishes, however I cannot ping down the tunnel. My original VPN is accessed from the inside interface (which runs on another private range) and works fine.
In order for the inside-test vlan to be able to access the tunnel on the external interface will I have to set up the outside interface as a trunk port so it can route the traffic?
Hope this makes sense.
I have a cisco 5505 running on a plus license.
It has a number of physical ports which are members of seperate vlans with different private ranges applied to them.
I have just added a second site to site VPN which terminates on the outside interface. I have a vlan called inside-test with a 172.16.20.254 address and would like it to go over the 2nd VPN on the outside interface. the IPSec sa establishes, however I cannot ping down the tunnel. My original VPN is accessed from the inside interface (which runs on another private range) and works fine.
In order for the inside-test vlan to be able to access the tunnel on the external interface will I have to set up the outside interface as a trunk port so it can route the traffic?
Hope this makes sense.