02-16-2022 12:32 PM
I'm struggling with an issue on our ASA and I'm not sure how to correct it. We have two SFTP sites that our users need to be able to access when connected to the VPN. They are able to access these sites when located physically on site as both SFTP sites allow traffic from our IP. However currently we are set up so that once our users are connected to the VPN, their internet traffic is routed through their home router (home/personal ISP) which is not allowed by the SFTP sites.
Essentially we need to do the following (all fake IP's for post),
Take any traffic in the 192.168.0.0 network (internal network space our VPN users are in) that is destined for either 20.1.1.1(public SFTP 1) AND/OR 30.1.1.1(public SFTP 2) and route it so that it is coming from our internal IP 40.1.1.1.
Is that something that can be done?
02-16-2022 12:58 PM - edited 02-16-2022 01:00 PM
@rjkaragrm sounds like you've got split tunnel configured. You will need to add the 2 public ip addresses of the site servers to the split acl, therefore those ip addresses will be routed back to the ASA. You will then need a nat rule to nat the ravpn traffic to the internet.
Configure the command "same-security-traffic permit intra-interface" to allow the traffic to hairpin back out the outside interface.
02-17-2022 08:51 AM
Yeah, we do have a split tunnel set up. I did check and we have the command "same-security-traffic permit intra-interface" enabled. It also looks like we have the site servers added to the split ACL. Where I think we are running into the problem is with the nat side of things, not entirely sure how we would want to set up the nat.
02-17-2022 08:53 AM
@rjkaragrm example NAT rule, the source and destination interface is the name of your outside interface.
object network RAVPN_USERS
subnet 10.4.4.0 255.255.255.0
nat (outside,outside) dynamic interface
02-22-2022 11:42 AM
So with the nat rule, would we be sourcing it from the split tunnel internal VPN addresses? Then sending it out our ISP? Sorry not very good with NAT stuff yet.
02-22-2022 11:51 AM
@rjkaragrm no the source of the traffic would be from the VPN IP address pool range of the connected VPN clients.
02-22-2022 12:12 PM
So source it from the VPN address pool range, this is what I have so far,
Source interface: any
Source Addr: VPN Addr Pool
Dest Interface: Any
Dest Addr: FTP/SFTP public IP?
Translated
Type: Dynamic
Source Addr:
Dest Addr:
02-22-2022 12:19 PM
@rjkaragrm use the example provided, just change the subnet to reflect your vpn ip pool network and the nameif of the outside interface. Don't use "any" as the interface in the nat rule
02-22-2022 12:27 PM
Gotcha, so something like
object network OUR_VPN_POOL
subnet VPN_POOL_SUBNET 255.255.251.0
nat (outside,outside) dynamic interface
02-22-2022 12:29 PM
@rjkaragrm yes, except your subnet mask is not valid.
02-22-2022 12:31 PM
02-23-2022 06:07 AM
Tried adding the nat rule this morning,
nat (outside,outside) dynamic interface
But it didn't work, was still not able to access the FTP site.
02-23-2022 06:14 AM
Wait, I think it did work, sorry, that looks to have done it! Thank you!
02-23-2022 07:34 AM
So while that command allowed us to ping the servers, we were not able to access the SFTP/FTP site still. Additionally I had to revert it back as it broke VPN traffic that was trying to access internal servers.
02-23-2022 07:54 AM
Provide full configuration including the NAT rule you added.
Provide the output of "show nat detail".
Ideally run packet-tracer from the CLI with the NAT rule in place and provide the output.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide