03-20-2020 02:36 PM
I have two outside interfaces on my firewall - Lets call them outside1 and outside2. Outside1 is the default route for internet-bound traffic, outside2 has a couple static routes to the internet configured for various reasons. They are both part of the outside-zone. The outside-zone is enabled for SSL RA VPN. This enables both interfaces for SSL RA VPN access.
Here is my issue: If I try to establish a VPN session to outside2, I would expect the SYN to come in on outside2, and the SYNACK to leave on outside1; but I never see it leave. I'm assuming the FTD might not like trying to reply on a different interface than the SYN? Is there anything we can do to allow the return traffic to leave out of outside1, or even to force the entire SSL handshake to take place over the one outside2 interface?
We can't do a static route to outside2, due to the random IPs of RA VPN users. And we can't change the default route to outside2 due to needing the PAT IP configured for outside1.
03-20-2020 08:09 PM
03-21-2020 03:17 AM
Hi,
@Francesco Molino Technically speaking, TCP state bypass is for data-plane/transit traffic, not for to/from the box traffic, as in the end is the AnyConnect TLS session. Never tested it for AnyConnect sessions, but i would assume it's not gonna work.
Regards,
Cristian Matei.
03-21-2020 09:58 AM
03-25-2020 06:52 AM
Hi,
@Francesco Molino Even if he wanted to have active VPN sessions over both outside interfaces, PBR would have still been valid solution:
- you have a different VPN pool for VPN clients connecting to different outside interfaces, like 10.10.10.0/24 for those attached to outside1 and 10.10.20.0/24 for those attached to outside2
- you configure PBR and based on the destination (which VPN clients are accesed), you set the proper net-hop and interface, because you know on which interface the client is actually attached based on the assigned address
Hope it makes sense. Heard about 6.6 VRF, but not sure on the overall implementation and limitations it brings alongside with some fixes.
PS: Funny, we're discussing options, in the end the customer opted out for the simplest solution; use another **bleep** firewall :) Easy and functional.
Regards,
Cristian Matei.
03-25-2020 07:02 PM
03-21-2020 03:13 AM
Hi,
I see couple of options, depends which one fits you better:
1. You could run FTD multi-instance, but you need a 4100/9300 hardware
2. If you have another layer 3 device in between FTD and ISP, you could do PBR on that intermediate layer3 device
3. You could configure the default route towards your new ISP (where VPN is terminated) and use PBR to route internal user's traffic to the Internet via the existing primary ISP; you can do this via FlexConfig, not sure if it's supported via SmartCLI
4. You could keep the default route as it is via the primary ISP, and configure PBR to route all traffic from your internal resources towards the VPN protected subnets towards your secondary/new ISP, where VPN is terminated; if you run full-tunnelling for VPN users, and you allow Internet access through the VPN headend, another PBR would be needed to route traffic sourced from VPN client pool to the Internet via the secondary/new ISP (this is not required, only if you want Internet traffic for VPN users to use the same second provider)
Regards,
Cristian Matei.
03-25-2020 04:53 AM
I appreciate everyone's time and responses.
We ended up bringing the second circuit into a 'new' firewall, adding an interface in the primary firewalls outside subnet, and then NAT-ing that traffic over to the primary firewall. This way the traffic could still follow the default route back to the outside interface, but follow the path back to the 'new' firewall.
I think we will figure out a more permanent solution in the future, but temporarily this does the job we need it to.
04-30-2021 02:42 AM
Hi Chad
You said: They are both part of the outside-zone. The outside-zone is enabled for SSL RA VPN. This enables both interfaces for SSL RA VPN access.
I'm trying to enable 2 internet interfaces in a SSL RA VPN configuration and I got only one field where is possible to choose or outside-1 or outside-2.
How do you do that?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide