cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
483
Views
0
Helpful
5
Replies

Assymmetric routing

kthned
Level 3
Level 3

Hi

I am designing a SSL-VPN solution, hope you will help me in solving out this puzzle •J.

Network diagram below.

Description

Router1 is connected to a switch with trunk port vlan 10 and 20. Vlan 10 is for inside traffic whereas vlan 20 is for outside traffic.

ASA port gig 0/0 is untagged to vlan 10 (inside)

ASA port gig 0/1 is untagged to vlan 20 (outside)

VPN clients are terminating on ASA port 0/1 (outside) interface.

Configuration:

Static Route on ASA:

Default route: next hop to outside interface

Internal network: next hop to inside interface

Static Routes on Router01

                             VPN IP pool towards inside.

Problem :

The problem I am facing here is with TCP return traffic destined to VPN clients. When TCP syn comes from VPN Client for an outside address, ASA box forwards the traffic towards outside interface using default route. While for the return TCP traffic (SYN ACK) from an outside address,  Router forwards TCP return traffic towards inside interface of ASA. Which ASA ignores in the end as it never expect syn ack from inside interface. Seems like ASA box don’t like transmit and receive traffic on different interface.

Should I go with to seperate Routers i.e. inside / outside router. Could someone help me sort out this problem ?

ASA-Router.jpg

5 Replies 5

rais
Level 7
Level 7

Apparnetly, the Internet is terminated on the router. Correct? Does router have default route on itself?

Thanks.

kthned
Level 3
Level 3

Actually behind the router is a big ospf cloud that is not show n here. So the inside and outside traffic goes via this router.

Thanks
Umair
Sent from Cisco Technical Support Android App

With a separate router for inside/outside you'll still have same problem.

Apparnelty, you're not NATTing all the VPN client traffic to an internal space. NATing all VPN client traffic to internal addresses would make all Internet bound traffic to go through normal Internal route. Alternately, your clients should send only the traffic for internal machines to the tunnel.

This firewall should be positioned in-line to where ever Internet traffic/link is.

HTH.

Hi Rais,

yes there is no NATting. just consider as the IP pools having public IP address.

Could you please expand on where you said inline to internet traffic ?

Regards,

Umair

Usually firewalls are placed right where the internet connection is. Something like:

Internet----firewall or router-------internal network

Thanks




Review Cisco Networking for a $25 gift card