

Where my problem is, I believe, is that I have to make some changes to the ACL for the crypto map, but I'm getting very confused reading through the documentation and posts I can find on this subject. I've set the DHCP Relay Agent on the remote ASA as follows: dhcprelay server 10.0.10.153 outside Cisco ASA 5520, a member of the Cisco ASA 5500 Series, is shown in Figure 1 below. Cisco ASA 5500 Series appliances deliver IPsec and SSL VPN, firewall, and several other networking services on a single platform. There's no problem in reaching the DHCP server from that local network (10.29.8.x to 10.0.153) so the connection is fine between the two as long as the IP is already present and we're routing between the two. Site-to-Site IPSEC VPN Between Two Cisco ASA one with Dynamic IP. The local network is 10.29.8.0/24 with the ASA's inside IP being 10.29.8.1.Ī VPN is set up between the two locations and traffic between 10.29.8.0/24 and 10.0.0.0/8 is being tunneled. The remote location is behind a 5505 ASA, with no layer 3 switches or routers at the site, just a layer 2 switch behind the ASA. The ops center is behind a 5510 ASA with a 3560 core switch. How do I get the DHCP relay function of a Cisco ASA working over a site-to-site VPN?
