04-24-2012 01:01 AM - edited 02-21-2020 06:01 PM
HI Guys,
I have the following requirement to achieve and just need to ensure that it is possible. Please see attached the relevant diagram.
Why are we doing this ?? Company 2 needs to see the source of the ipsec traffic to be an Indian ip addr.
same-security-traffic permit intra-interface
the networks at both ends included in the encryption domain.
a no nat statement on the middle firewall for the both networks,
Thanks in advance
04-25-2012 01:34 AM
Hi Guys any ideas
Thanks
Kevin.
04-25-2012 04:51 AM
Hello,
You just need an Active/Standby Failover SCenario between your Firewalls. A simple approach would be to place a switch infron of both firewalls and have a Failover as Active/Standby. this will allow you to have a redundancy incase the Primar FW goes down.
Thanks,
Mohamed
04-25-2012 05:51 AM
Cheers Mohamed.
And the hairpinning is that possible to achieve as described.
Kevin.
04-25-2012 06:02 AM
Yes Kevin.
Your described config is all what you need..
Regards,
Mohamed
04-26-2012 01:46 AM
Hi Mohamed,
thanks for clearing that up.
I presume that I dont need Cisco devices at the remote ends to achieve this I only need a Cisco ASA in the Central Site to achieve this Hairpin action. In our network we have Fortinets at the remote end of the tunnel.
Kevin.
07-28-2013 06:33 AM
HI Kevin,
i have the same scenario. can you please help me..
i have at HUB site ASA 5520 & two spoke site have fortinet.
what configuration should be done on ASA for HAIRPINNING
ASA---------fortinet(lan subnet 10.10.10.0/24)
\--------fortinet (lan subnet 20.20.20.0/24)
i nee both fortinet subnet should talk each other with help of hairpinning.
Suhas
07-28-2013 10:22 PM
Hi,
Any updates...
suhas
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide