08-26-2020 09:09 AM
Hi
We have several site to site vpns on our new FTD devices i have noticed that if traffic (DNS) originates from the remote 3rd party side of the vpn it gets blocked, e.g servers on the remote end need to hit our DC's so the servers are initiating the request, I thought all traffic would be allowed bidirectional through the tunnel,? I had to explicitly allow on the Outside interface does anyone know why this happens.???
Thankyou
Solved! Go to Solution.
08-27-2020 01:52 PM
Correct, you would need an explicit ACP rule from 3rd party on "outside" interface to "inside" for when the 3rd party initiates the connection.
You are currently only permitting traffic when initiated from your side of the VPN, the return traffic from the 3rd party will be permitted because the firewall is stateful.
08-26-2020 09:21 AM
08-26-2020 10:39 AM
Hi Rob
yes 3rd party do access our network on ASA's and no didn't have to explicitly permit on Outside.?
Thanks
08-26-2020 10:45 AM
08-27-2020 04:07 AM
Hi Rob
As requested I have obviously obfuscated element’s (see attached)
Here is a summary
Step 1. User launches application which is hosted at 3rd party location across the site to site
Step 2. 3rd party Server needs to talk to Server on our side for authentication to complete
What I could see was traffic (DNS) being blocked and I had to explicitly allow this traffic on the Outside interface in whereas with the ASA we don’t everything is allowed both directions through the Tunnel. Hope this helps
appreciated
08-27-2020 04:08 AM
08-27-2020 04:39 AM
Hi,
So you are only permitting traffic initated from inside to outside. Yes the return traffic will be permitted....but if the remote site initiated traffic then you do not have a rule for this. You will need to specifically define rules sourced from outside to destination inside.
HTH
08-27-2020 06:03 AM
Hi Rob
Thanks again for the info, so its FTD behaviour then as we don't have to do this on our ASA>??
08-27-2020 06:09 AM
On FTD decrypted traffic is subjected to Access Control Policy by default. This was not the case on ASA, you probably the command no sysopt connection permit-vpn configured on the ASA.
HTH
08-27-2020 01:46 PM
Hi Rob
So are you saying that any traffic that comes through the tunnel and is initiated by the 3rd party will need an explicit ACP entry on the Outside Interface, so through the tunnel decrypted then interface check ?????
Thanks
08-27-2020 01:52 PM
Correct, you would need an explicit ACP rule from 3rd party on "outside" interface to "inside" for when the 3rd party initiates the connection.
You are currently only permitting traffic when initiated from your side of the VPN, the return traffic from the 3rd party will be permitted because the firewall is stateful.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide