08-30-2024 02:55 AM
I've set up a S2S VPN on our perimeter ASA 5525x that tunnels traffic from certain source IPs going to any public IP, so far a pretty simply setup once all the public IP subnets had been defined in objects and then assigned to an object group, the VPN is up and working no problems.
The issue is that this sends all traffic from the source IPs going external over the VPN but I only want to tunnel http & https traffic, all other ports should traverse the ASA un-encrypted.
I did try to do this by modifying the crypto map ACL so it only included ports 80 & 443, then create a No NAT statement that only included ports 80 & 443, config below (80 & 443 in the nat statement are objects for the respective ports);
access-list outside_cryptomap extended permit tcp object-group INTERNAL_IPs object-group EXTERNAL_IPs eq 80
access-list outside_cryptomap extended permit tcp object-group INTERNAL_IPs object-group EXTERNAL_IPs eq 443
nat (inside,outside) source static INTERNAL_IPs INTERNAL_IPs destination static EXTERNAL_IPs EXTERNAL_IPs service 80 80 no-proxy-arp
nat (inside,outside) source static INTERNAL_IPs INTERNAL_IPs destination static EXTERNAL_IPs EXTERNAL_IPs service 443 443 no-proxy-arp
Doing this seemed to cause the firewalls CPU to go through the roof and after a few SSH sessions hanging I eventually couldn't SSH back on to the device, I had to force a failover from the standby device (seems like the config above hadn't been sync'd to the standby unit) and then power cycle the original active device before it started responding again.
Thankfully there was no loss of end user services but as this is our production firewall a bit reluctant to try it again.
Just wondering if anyone has done what I'm trying to do and did you doing differently to how I tried it?
ASA's are on version 9.12(4)67
Thanks
Solved! Go to Solution.
08-30-2024 03:02 AM
I have idea but I dont know if it work or not
Use vti instead of policy based VPN and then use pbr to direct traffic to vti
This way you can only direct http traffic via vti not all traffic
MHM
08-30-2024 03:02 AM
I have idea but I dont know if it work or not
Use vti instead of policy based VPN and then use pbr to direct traffic to vti
This way you can only direct http traffic via vti not all traffic
MHM
08-30-2024 04:59 AM
Thanks MHM, must admit I thought the ASAs didn't support PBR, I will see if the peer side supports VTI tunnels.
08-30-2024 08:59 AM
what is the other side of the tunnel ? VTI is generally referred as route based VPN (vs policy based vpn for crypto map) so you may want to check if other side supports route based vpn.
09-09-2024 02:45 AM
I haven't had chance to try this out yet but looking at BPR then this will defo do what I need, thanks again for your help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide