cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 
cancel
2806
Views
5
Helpful
7
Replies

Any connect VPN to IPSEC VPN communication.

SurajS
Level 1
Level 1

Dear Team,

We have received on requirement as below:

We have one Any connect VPN which we want to use to communicate with our one IPSEC VPN.

How can we achieve this? Please find attached topology.

Any connect VPN subnet 192.168.40.0/24 want communicate with IPSEC VPN with source NATING 

LAN and DMZ are working fine with IPSEC with source Public IP NATING but unable to  work with Any connect VPN.

1 Accepted Solution

Accepted Solutions

@SurajS 

You'll need to enable the traffic to hairpin back out the same interface traffic came in on and configure a NAT rule.

Example:-

same-security-traffic permit intra-interface
nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp

You'll obviously need to ensure that the source nat address is included in the crypto ACL for the L2L VPN to the peer.

View solution in original post

7 Replies 7

@SurajS 

You'll need to enable the traffic to hairpin back out the same interface traffic came in on and configure a NAT rule.

Example:-

same-security-traffic permit intra-interface
nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp

You'll obviously need to ensure that the source nat address is included in the crypto ACL for the L2L VPN to the peer.

Hello Rob,

We have check with both way(OUTSIDE,OUTSIDE) and (ANY, OUTSIDE) but it not works, please find attached screen shot

It is included in the crypto ACL for the L2L VPN to the peer and LAN & DMZ are working.

This is FTD managed by FMC , Is there any reference documents. 

 

 

 

@SurajS 

If you use "any" you could cause other issues from traffic inside the network. For this communication it's not going to be "any" if the traffic is source from an AnyConnect client it would be from the "outside" interface.

 

You are translating the RAVPN traffic to the "outside" interface IP address, so therefore the crypto ACL includes the IP address of the "outside" interface? Has this been mirror on the remote peer?

 

Is an IPSec SA pair created for this communication?

Run packet-tracer and provide the output.

 


Phase: 9
Type: WEBVPN-SVC
Subtype: in
Result: DROP
Config:
Additional Information:

Result:
input-interface: Outside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule

ONEEARTH-SCADA-FPR2130-FW01#

We are getting above error, We have added RAVPN subnet in ACL.

And all three subnet like LAN, DMZ & RAVPN are NATED with subnet and that NATED subnet allowed by peer end for IPSEC.

@SurajS 

Have you run that packet-tracer using an IP address already assigned to a connect client? Re-try using a free IP address

If still a problem provide the full output for review and the configuration,

Hello Rob,

Thank you.

It is working with above command.

nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp 

That ping drop was coming due incorrect ACL. after changing ACL it works fine.

 

Review Cisco Networking for a $25 gift card