cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
521
Views
0
Helpful
2
Replies

force split tunneling when go to selected website

uhls rc
Level 1
Level 1

i have a remote branch that connects to HQ (one subnet only) via site to site vpn with split tunneling enable. the tunnel is set up and is working. my vendor support website allows only known ip to connect. my branch office does not have static ip but the HQ has. my goal is force branch office to go thru the tunnel when it goes to support website.

the branch has 871 router and HQ has ASA5510

here is a section of the router config

! 192.168.22.0 is branch
! 192.168.230.0 is HQ subnet it can connect
! a.b.c.d is support vendor website

ip nat inside source route-map NoNAT interface FastEthernet4 overload
!
ip access-list extended S2Svpn
 permit ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255
 permit ip 192.168.22.0 0.0.0.255 host a.b.c.d


access-list 100 remark set up for S2S vpn tunnel
access-list 100 deny   ip 192.168.22.0 0.0.0.255 192.168.230.0 0.0.0.255
access-list 100 deny   ip 192.168.22.0 0.0.0.255 host 1.2.3.4
access-list 100 permit ip 192.168.22.0 0.0.0.255 any
access-list 100 deny   ip any 192.168.230.0 0.0.0.255
access-list 100 deny   ip any host a.b.c.d

route-map NoNAT permit 10

the problem is branch cannot access the support website. i did a trace route from branch. it seems it is going thru the tunnle but show xlate on asa does not show a translation. i have a NAT for the branch on the asa.

what do i miss

2 Replies 2

Something goes wrong with your ACL 100. what are the last two deny-lines for and is that the ACL that you reference in the NoNAT route-map?

Have you enabled same-security-traffic permit intra-interface on the ASA?

 

uhls rc
Level 1
Level 1

Solve the problem!

the NAT was incorrect set on the ASA. should have set it to the outside interface.