06-06-2023 11:48 AM
We have migrated from a AS 5516 to a NGFW 1140. Everything seems to be working great so far. What I was wondering is we have site-to-site tunnels configured and it appears the normal internet traffic is also trying to go through the tunnel. How can we separate this? We just want the tunnel traffic to use it and normal internet traffic to use our proxy and go out an ACL, not the tunnel. For users that don't use the tunnel, it works fine.
Or is it not possible to split it like the 5516's did?
Solved! Go to Solution.
06-07-2023 07:54 AM
Good Morning guys,
Thanks for the information. We have found the problem and it required some cleanup on our part. The vendor URL's that users were hitting was the same IP range that we had in the VPN Tunnel. Once we removed that range the sites stopped going through the tunnel. Thanks for the clarification that nothing really needs to be done to separate the traffic, except make sure you don't have IP ranges that you don't need in there. lol
06-06-2023 11:52 AM
@scoutt what destination network have you defined in the VPN configuration? The configuration of the VPN should define just the correct networks that should be tunnelled. Make sure you haven't defined "any" as the destination in the VPN configuration.
06-06-2023 12:18 PM
So under the Node A protected networks, yes, all networks we want to be tunneled are there. As for the destination Node B protected Network, no internal networks defined there.
06-06-2023 12:22 PM
@scoutt so what is defined as the destination networks then? When using a policy based VPN (which is sounds like you are) only interesting traffic that matches networks defined is routed via the tunnel.
Provide some screenshots of your configuration.
Run packet-tracer from the CLI of internet traffic to see what it believes should happen with the traffic.
06-06-2023 12:39 PM
you use ACL local LAN to ANY <<- this make all traffic pass through tunnel, change it to
LOCAL LAN -> Remote LAN
06-06-2023 12:52 PM
Thanks, sorry, the destination for the protected network on Node B is the IP of the partner, a state vendor. We see it leave the firewall under the events but most of the initiators info is blank and the response never gets back to us. The state vendor says they do not see us hitting them, so we are thinking that all the web traffic is also going through the site-to-site tunnel, which we don't want
We have ACL rules pointing like you said, Local LAN -> Remote LAN for tunnel traffic. But we also enabled "sysopt permit-vpn" in the VPN configuration. Will this make a difference and shoot everything though the tunnel?
06-06-2023 12:55 PM
@scoutt sysopt connection permit-vpn just tells the ASA to ignore the interface ACLs for VPN traffic, it won't route all traffic via the VPN.
Run packet-tracer as mentioned to provide a clue as to what is happening.
06-06-2023 01:07 PM
check if the Remote LAN subnet is conflict with Proxy IP
06-07-2023 07:54 AM
Good Morning guys,
Thanks for the information. We have found the problem and it required some cleanup on our part. The vendor URL's that users were hitting was the same IP range that we had in the VPN Tunnel. Once we removed that range the sites stopped going through the tunnel. Thanks for the clarification that nothing really needs to be done to separate the traffic, except make sure you don't have IP ranges that you don't need in there. lol
06-07-2023 07:56 AM
You are so welcome
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide