Apologies in advance if my situation has already been addressed elsewhere in the forums; I've searched and found several posts close to my situation, but unfortunately I have not been able to resolve the issue with the information that I have seen thus far.
I have an ASG320 in my main office, a RED in a branch office, and an IPSec VPN connection to a data center. My users in the branch office connected via the RED cannot communicate over the IPSec VPN to the data center, and vice-versa (data center to branch office). I can communicate with both the branch office and the data center from the main office without any issues, and both the data center and the branch office can communicate with my main office network with no problems - it is just communications between the branch office and the datacenter that are failing.
I have tried creating Firewall rules to allow any traffic between the branch office network and the datacenter network, but when I monitor the Firewall Live Log I never see any packets at all. I am running the RED in Standard / Split mode, and I have the datacenter network and my main office network defined as split networks in the RED configuration. I saw some other posts recommending that the RED network should be defined as a local network in the IPSec connection properties, but doing this just generates error messages and doesn't allow communications to happen.
Any advice would be greatly appreciated.
This thread was automatically locked due to age.