05-03-2014 07:15 AM - edited 02-21-2020 07:37 PM
Hi Everyone,
I was testing few things at my home lab.
PC---running ssl vpn------------sw------router------------ISP--------------ASA(ssl anyconnect)
anyconnect ssl is working fine and i am also able to access internet.
I am using full tunnel
i have acl on outside interface of ASA
1 | True | any | any | ip | Deny | 0 | Default | [] |
i know that ACL is used for traffic passing via ASA.
I need to understand the traffic flow for access to internet via ssl vpn.?
Regards
MAhesh
Solved! Go to Solution.
05-03-2014 07:50 AM
As you say correctly, the interface-ACL is not important for that as the VPN-traffic is not inspected by that ACL. At least not by default.
You can control the traffic with a different ACL that gets applied to the group-policy with the "vpn-filter" command. And of course you need a NAT-rule that translates your traffic when flowing to the internet. That rule has to work on the interface-pair (outside,outside).
05-03-2014 08:29 AM
The encrypted traffic enters the ASA, gets decrypted and the ASA routes the traffic back to the internet, this time in cleartext. Because your packet has a private source address (from your VPN-pool) the source needs to be translated to a public address that is routable on the internet.
05-03-2014 07:50 AM
As you say correctly, the interface-ACL is not important for that as the VPN-traffic is not inspected by that ACL. At least not by default.
You can control the traffic with a different ACL that gets applied to the group-policy with the "vpn-filter" command. And of course you need a NAT-rule that translates your traffic when flowing to the internet. That rule has to work on the interface-pair (outside,outside).
05-03-2014 07:57 AM
Hi Karsten,
Thanks for great reply back so now i can say that internet is working as traffic hits the outside interface
of ASA and then goes to the internet?
I am just trying to understand where in ASA my traffic hits.
hope make sense
Regards
MAhesh
05-03-2014 08:29 AM
The encrypted traffic enters the ASA, gets decrypted and the ASA routes the traffic back to the internet, this time in cleartext. Because your packet has a private source address (from your VPN-pool) the source needs to be translated to a public address that is routable on the internet.
05-03-2014 08:32 AM
MAny thanks Sir.
Best Regards
MAhesh
05-03-2014 08:38 AM
You're welcome, keep on learning and come back to the support-communities.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide