<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Force VPN RA Users and Site-to-Site VPN Users to go Throuh Web P in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358463#M306609</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good article.&amp;nbsp; From the article, it appears that what I'm trying to do will work.&amp;nbsp; Looks like the key is the "tunnel" route to the inside network.&amp;nbsp; From there, traffic can be sent back out.&amp;nbsp; For now, I'll be utilizing the scenario with WCCP on the ASA and a standard inside router.&amp;nbsp; To answer your question, the ASA is the WCCP router for now.&amp;nbsp; We're going to end up putting the web proxy inline to get added scanning functionality per the vendor.&amp;nbsp; Before making that change, I'd like to get this working.&amp;nbsp; I'll see if I can get it to work over the next few days and report back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Dec 2013 13:37:48 GMT</pubDate>
    <dc:creator>andrewdours</dc:creator>
    <dc:date>2013-12-30T13:37:48Z</dc:date>
    <item>
      <title>Force VPN RA Users and Site-to-Site VPN Users to go Throuh Web Proxy</title>
      <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358461#M306607</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Forgive me if I didn't already see a posting on here.&amp;nbsp; There was one similar, but I couldn't understand the answer.&amp;nbsp; Here's what I have.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Remote Site ASA 5505 &amp;lt;-- VPN tunnel --&amp;gt; Main Site ASA 5525-X &amp;lt;-- Web Proxy (not currently inline, device is set up with WCCP for transparent... planning to put inline in the near future) --&amp;gt; Internal network.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Remote Access Cisco IPSEC client &amp;lt;-- VPN tunnel --&amp;gt; Main Site ASA 5525-X &amp;lt;-- Web Proxy (not currently inline, device is set up with WCCP for transparent... planning to put inline in the near future) --&amp;gt; Internal network.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Currently, VPN users that connect to the main site are not able to go to the internet while connected (no split tunnel allowed).&amp;nbsp; I would like to give users the functionality of getting to the internet while connected to VPN, but I would rather force them through our web proxy.&amp;nbsp; This way, they don't have to disconnect when access to the internet is needed and then reconnect when they need access to internal resources.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;In the past, to get around all of this, I had another "inside" firewall that terminated VPN connections on its "outside" interface.&amp;nbsp; I then set the default gateway on this firewall to go out the "inside" interface and land on the main site's core switch.&amp;nbsp; At this point, all traffic flowed through the web proxy without any issues.&amp;nbsp; Am I still limited to this?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thanks all,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;Andrew&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:22:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358461#M306607</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2019-03-12T03:22:31Z</dc:date>
    </item>
    <item>
      <title>Force VPN RA Users and Site-to-Site VPN Users to go Throuh Web P</title>
      <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358462#M306608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is the WCCP Router the ASA? The only way to have this working is with Anyconnect. &lt;/P&gt;&lt;P&gt;Check this scenario and let me know if this is the correct one: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/wsa/wsa7.0/user_guide/AnyConnect_Secure_Mobility_SolutionGuide.pdf"&gt;http://www.cisco.com/en/US/docs/security/wsa/wsa7.0/user_guide/AnyConnect_Secure_Mobility_SolutionGuide.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Dec 2013 21:10:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358462#M306608</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-12-29T21:10:17Z</dc:date>
    </item>
    <item>
      <title>Force VPN RA Users and Site-to-Site VPN Users to go Throuh Web P</title>
      <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358463#M306609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good article.&amp;nbsp; From the article, it appears that what I'm trying to do will work.&amp;nbsp; Looks like the key is the "tunnel" route to the inside network.&amp;nbsp; From there, traffic can be sent back out.&amp;nbsp; For now, I'll be utilizing the scenario with WCCP on the ASA and a standard inside router.&amp;nbsp; To answer your question, the ASA is the WCCP router for now.&amp;nbsp; We're going to end up putting the web proxy inline to get added scanning functionality per the vendor.&amp;nbsp; Before making that change, I'd like to get this working.&amp;nbsp; I'll see if I can get it to work over the next few days and report back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Dec 2013 13:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358463#M306609</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2013-12-30T13:37:48Z</dc:date>
    </item>
    <item>
      <title>Force VPN RA Users and Site-to-Site VPN Users to go Throuh Web P</title>
      <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358464#M306610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds Good. &lt;/P&gt;&lt;P&gt;Let us know. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Dec 2013 17:10:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358464#M306610</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-12-30T17:10:13Z</dc:date>
    </item>
    <item>
      <title>Update.  I was able to get</title>
      <link>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358465#M306611</link>
      <description>&lt;P&gt;Update.&amp;nbsp; I was able to get this to work with IPSEC and AnyConnect by adding the defualt tunnel route to our inside core switch.&amp;nbsp; I also added some NAT exempt rules for the IPSEC/AnyConnect subnets.&amp;nbsp; The site-to-site tunnel is not working quite as well.&amp;nbsp; It's very strange...&amp;nbsp; From the remote site, I'm able to browse the internet and&amp;nbsp;access resources at the main site through the IPSEC site-to-site tunnel.&amp;nbsp; However, I cannot initiate communication from the main site back to the remote site.&amp;nbsp; A traceroute from a main site PC shows as follows:&lt;/P&gt;&lt;P&gt;Tracing route to 192.168.104.99 over a maximum of 30 hops&lt;/P&gt;&lt;P&gt;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.65.0.10&lt;BR /&gt;&amp;nbsp; 2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.255.254.12&lt;BR /&gt;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.255.98.110&lt;BR /&gt;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.255.98.110&lt;BR /&gt;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;1 ms&amp;nbsp; 10.255.98.110&lt;BR /&gt;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 ms&amp;nbsp; 10.255.98.110&lt;/P&gt;&lt;P&gt;The tunnel route on the ASA points to 10.255.98.110.&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [255/0] via 10.255.98.110, inside tunneled&lt;/P&gt;&lt;P&gt;10.255.254.12 and 10.255.98.110 are both IP addresses on the inside core switch.&amp;nbsp; I may open a Cisco case on this one.&amp;nbsp; I just don't get it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Aug 2014 15:44:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/force-vpn-ra-users-and-site-to-site-vpn-users-to-go-throuh-web/m-p/2358465#M306611</guid>
      <dc:creator>andrewdours</dc:creator>
      <dc:date>2014-08-21T15:44:06Z</dc:date>
    </item>
  </channel>
</rss>

