02-22-2016 10:16 AM - edited 03-05-2019 03:24 AM
I have been assigned the task of combining two separate networks into one or at least particularly. Currently one of our offsite locations are moving their servers to our location. A partial advantage is that both locations uses ASA. The servers that are moving in-house will have their own subnet range and domain controllers. We are only using our ASA.
My first concern is that of the subnet. Currently everything on our ASA is setup to the 192.168.0.x with the subnet mask of 255.255.255.248. Their range is 192.168.100.x with the subnet mask of 255.255.255.0. Will I need to make changes to our ASA subnet mask to include their range?
Second, both locations are using LDAP authentication. Will I need to create a separate VPN policy in order for them to continue to use their LDAP? I am assuming yes.
Is there any surprises or gotchas I need to be aware of? Thanks
Solved! Go to Solution.
02-29-2016 03:12 PM
Lets start by fixing the NAT. Add:
access-list inside-ls_nat0_outbound extended permit ip any 192.168.100.0 255.255.255.0
nat (inside-ls) 0 access-list inside-ls_nat0_outbound
02-22-2016 11:23 AM
There are so many options.
When they move there servers are they also moving their switches they plug into? If so, you can just create another interface on the ASA using the 192.168.100.0/24 subnet, and there servers wont see anything change. This would make the the easiest initial migration.
You can create a separate VPN policy, or you can create a trust relationship between the two AD's. If you plan to migrate one AD into the other then you have to create a trust relationship anyway.
02-22-2016 11:48 AM
Hmm.. I did not think about another interface. Would that be a best choice? Seems like more work but then again, I could get away with this direction without changing any other interface (and the potential of network connectivity issues)
02-22-2016 12:00 PM
I think it is a nice and simple method of handling the situation, and is likely to cause the least disruption.
02-22-2016 12:02 PM
Ok. Thanks. I am still a bit weak when it comes to all of the Cisco commands. Can you provide me with a link into how I go about setting up a new interface without disrupting my active network? That would be great if possible.
02-22-2016 12:05 PM
Well, just choose a free interface and assign a static IP address equal to whatever their current default gateway is.
interface Gigabit x/y
nameif <company-inside>
security-level 100
ip address 192.168.100.x 255.255.255.0
no shutdown
You may need some extra NAT rules as well.
02-22-2016 12:17 PM
I have interface Ethernet0/2 that is not used (it is currently named DMZ).
So if I drop the following into a putty (SSH), would that create the necessary interface?
interface Ethernet0/2
nameif inside-LS
security-level 100
ip address 192.168.100.1 255.255.255.0
ospf cost 10
As far as NAT rules, looking at my current ones, the rules would just need to mention the correct interface, so something like this
nat (inside-ls,outside) static x.x.x.x service tcp 3389 3395
And the access-list being as.
access-list outside_access_in extended permit tcp any4 host 192.168.100.2 eq https
02-22-2016 12:18 PM
Yes that interface config is fine.
You would only need that NAT rule if you wanted to allow something inbound, but yes, you haver the idea.
The separate interface makes things easy.
02-22-2016 12:21 PM
Awesome. Thanks for all of your help
02-23-2016 07:06 AM
An additional question. Once I have the second interface up and running, how do I setup VPN to use both LDAPs? Since both networks clients are using Windows native VPN, I cannot rely on different group policies. I added another server to the AAA Server Group, but that does not seem to be working for authentication. I need to have both Active Directories available for authentication as well as DHCP/DNS configurations both available to Windows native clients.
02-23-2016 10:54 AM
Yucky. Windows native VPN. By this I assume you mean L2TP over IPSec, and it is terminating on the ASA.
You can't. You can only use one VPN and give users access to both networks. You would need to create a trust relationship between the two AD's, and try and do it that way.
What you really need to do is get some Cisco AnyConnect licences and change over.
02-23-2016 01:24 PM
Yeah. I just like using the native solution as it does not require the installation of software. But I expected this was going to be a limitation. To get around this for this particular need, those machines will use Shrew, which I later found out they use anyways. So win-win. :)
02-26-2016 07:02 AM
Philip,
I configured the spare Ethernet Port and opened a few ports. I know that part is up and running correctly. The servers (virtualized) are able to get outbound connectivity and are all running on the 192.168.100.x IP range. Servers within that range is able to ping each other. However, once I establish a VPN connection, I can not ping any of these servers. I am guessing there is a Access Rule that might need to be added, since VPN is coming across the same outside interface as our normal 192.168.0.x? I have a VPN profile that specifies the DNS suffix, uses AD authenication and points to the DNS servers on that network. I created the address pool for the 192.168.100.x IP range. When connected, the VPN client is receiving the correct IP range, DNS, DNS suffix and receiving the correct Address Pool IP address (in this case a 192.168.100.200 IP address)
Assuming I am even in the right place, the Outside incoming rule has 192.168.0.0/16 as the first rule. Do I need to change this to support the 192.168.100.x or just add a second rule for that range? Or am I even on the right page? :)
02-29-2016 06:26 AM
Could you post your config?
It is most likely to be NAT or access rules.
02-29-2016 06:26 AM
Can I PM you the file instead?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide