This is a follow up to thread557-1362337
The problem the original poster mention was they had a default route set on the ASA through the outside interface, but when they tried to use the Web VPN portal, they couldn't reach any of there internal servers and received a no route to host error message.
On the Cisco ASA's you have the system default route, which most network folks would have set up for any device before. This is what is going to get your packets back out to end users on another ISP.
There is also the 'tunneled' default route, which is used for any traffic requested via the Web VPN link translating proxy function, or from the DTLS/TLS/IPSEC full IP layer VPN sessions.
For Example. Lets say the 'outside' interface is the 10.0.0.0/255.255.255.0 (24) network, and 'inside' is the 192.168.0.0/255.255.255.0 (24) network.
Your static routing would look like this:
route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
route inside 0.0.0.0 0.0.0.0 192.168.0.254 1 tunneled
With .254 being the next hop routers on both networks. The key is the 'tunneled' at the end of the default route that will lead to your internal infrastructure network.
-James
The problem the original poster mention was they had a default route set on the ASA through the outside interface, but when they tried to use the Web VPN portal, they couldn't reach any of there internal servers and received a no route to host error message.
On the Cisco ASA's you have the system default route, which most network folks would have set up for any device before. This is what is going to get your packets back out to end users on another ISP.
There is also the 'tunneled' default route, which is used for any traffic requested via the Web VPN link translating proxy function, or from the DTLS/TLS/IPSEC full IP layer VPN sessions.
For Example. Lets say the 'outside' interface is the 10.0.0.0/255.255.255.0 (24) network, and 'inside' is the 192.168.0.0/255.255.255.0 (24) network.
Your static routing would look like this:
route outside 0.0.0.0 0.0.0.0 10.0.0.254 1
route inside 0.0.0.0 0.0.0.0 192.168.0.254 1 tunneled
With .254 being the next hop routers on both networks. The key is the 'tunneled' at the end of the default route that will lead to your internal infrastructure network.
-James