cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2145
Views
0
Helpful
2
Replies

How to backhauled internet traffic over IPSec

branko
Level 1
Level 1

Hi,

We have one central site and six branch offices.

I can easily configure site-to-site VPN tunnel between HQ and all branches, using split-tunneling, so only LAN-to-LAN connection goes over VPN tunnel.

Now we want to centralized all traffic, including Internet-destined, so all branches will go to internet over our HQ internet links.

At HQ site we have ASA 5510 (which is terminating point for VPN connections), and want to monitor all traffic, using either Websense or CSC module for ASA.

The question is: How to configure this? :)

Best Regards

Branko

1 Accepted Solution

Accepted Solutions

srue
Level 7
Level 7

disable split tunneling and in your crypto acl's use a permit ip x.x.x.x x.x.x.x any statement on the remote.

at hq, the crypto acl will be permit ip any x.x.x.x x.x.x.x.

at HQ, enable the same security permit intra interface feature.

View solution in original post

2 Replies 2

srue
Level 7
Level 7

disable split tunneling and in your crypto acl's use a permit ip x.x.x.x x.x.x.x any statement on the remote.

at hq, the crypto acl will be permit ip any x.x.x.x x.x.x.x.

at HQ, enable the same security permit intra interface feature.

Finally, I tried your sugestion, and with a little configuration changes on ASA (I had already enabled same security feature) it's working now.

Thanks.