06-19-2017 01:36 AM - edited 03-12-2019 02:36 AM
Hi,
I am about to replace two Linux "open-VPN" machines with two ASA FWs. In one site the setup is straightforward (one outside interface, and one inside). But on the remote end hairpinning is required. The Linux was connected to the same LAN as the target server ("on-a-stick" mode), i.e. the tunnel ends on the same interface as the LAN.
Please see attached JPEG.
I would really appreciate some hints on documentation or examples on the setup.
Regards,
// Peter
06-19-2017 02:56 AM
You can configure it in the desired way, just make sure you allow hairpinning on the ASA:
same-security-traffic permit intra-interface
The internal router (.1) also needs to hairpin the traffic for the remote subnet to the ASA (assuming that this device is the default-gateway for the internal devices.
BUT: Wouldn't it be better to terminate the VPN on the outside firewall or at least place the VPN-ASA in a DMZ of the perimeter-firewall? That could make it less complex and you don't have to send your public VPN-traffic through the internal network.
06-19-2017 03:43 AM
Hello and thanks!
So the only difference from an ordinary VPN setup (using separate outside and inside interfaces) would be the "same-security-traffic" command?
Regarding your "BUT" comment:
Yes, i'd really prefer that solution, but unfortunately I must regard the existing conditions as "unchangeable".
// Peter
06-19-2017 04:01 AM
Yes, the setup will not be much different to a traditional setup. You only have an outside-interface that handles both the VPN- and cleartext-traffic. And the routing is slightly more complex.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide