shednik wrote: » Are you saying something like this Internet | Firewall | ASA Internal network--- | If so there are a few variables I would consider. Is this an IPSec or SSL VPN? I don't think a remote access VPN will work with an inbound NAT on IPSec, atleast it's never worked for me in my testing. Since it's a 5505 why can't you just make the one interface a trunk and have and inside and outside vlan? You would have to have a public transfer network for the outside vlan and a transfer network for the inside vlan. If it is an SSL VPN only it my work with a single NAT'd IP address but I would have to lab that out to confirm. For NATing if you are on 8.3 you wouldn't have to worry about NAT, if you're not you would still need to I would think. hope this helps... joe
shednik wrote: » Yea pretty much, since it's a 5505 you can create a trunk link on the firewall and ASA for an inside and outside vlan which will serve as transfer networks. Then you can setup your routing like this Default --> Firewall interface for outside vlan Internal Routes--> Firewall interface for inside vlan