cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 
cancel
958
Views
2
Helpful
14
Replies

IPSEC VPN

fmugambi
Spotlight
Spotlight

Hello Team,

I have below topology : -

fmugambi_0-1714037714524.png

I have ipsec vpn from on-prem to aws cloud. the two endpoints  [192.168.40.10/32, 192.168.30.10/32] work fine as they are allowed on the encryption domain.

I have users using remote vpn to connect to on-prem dc to access on-prem resources - they can reach 192.168.40.10/32. There is a need for them to reach a portal on aws cloud [192.168.30.10/32]. 

How can I achieve this?

Your support will be appreciated.

 

2 Accepted Solutions

Accepted Solutions

Two simple point

One add RA VPN pool to ACL of ipsec VPN

Second use no-NAT that includes the RA VPN and subnet .30

That it.

By the way you have other post about ikev2 did you try ikev1? Was that issue solved?

MHM

View solution in original post

I think you are referring to the security ACLs in this case, not the encryption domains ACLs? anyway, if you want to allow the remote users traffic to hit AWS portal you would need to treat the remote users subnet as if it is a local subnet to the on-prem firewall, which means it has to be added to the on-prem local encryption domains to AWS VPN tunnel, a NAT exemption rule with (nat (outside,outside) ...) must be created (I assumed your on-prem firewall external interface is called outside), and on AWS side the remote users VPN subnet must be configured to be routed back to the on-prem firewall over the VPN tunnel.

View solution in original post

14 Replies 14

Two simple point

One add RA VPN pool to ACL of ipsec VPN

Second use no-NAT that includes the RA VPN and subnet .30

That it.

By the way you have other post about ikev2 did you try ikev1? Was that issue solved?

MHM

not yet, its on prod, approval process is yet to conclude, then i can test. i put it on hold till done with approval.

Thanks.

what about allowed networks/encryption domain?

assume i have multiple ipsec vpns, the acl am touching is just specific to this ipsec vpn? cause i kinda have bundled all my ipsec acls together.

Sorry it mandatory to add RA VPN pool to ACL.

And using one ACL is work but not optimal.

MHM

do i need to add it to the encryption domain? or under access control on policies? am using cisco ftd

What do you mean by bundled all my IPsec ACLs together?

if i have 40 ipsec tunnels, i dont have corresponding 40 acls, i have 2 acls, one for incoming , one for outgoing, but in each all protected networks are in each acl respectively ie. if its incoming, one acl, has entries for all remote networks as destination and all local subnets for local network.

Hope i make sense.

I think you are referring to the security ACLs in this case, not the encryption domains ACLs? anyway, if you want to allow the remote users traffic to hit AWS portal you would need to treat the remote users subnet as if it is a local subnet to the on-prem firewall, which means it has to be added to the on-prem local encryption domains to AWS VPN tunnel, a NAT exemption rule with (nat (outside,outside) ...) must be created (I assumed your on-prem firewall external interface is called outside), and on AWS side the remote users VPN subnet must be configured to be routed back to the on-prem firewall over the VPN tunnel.

understood,

so ideally if like an addition local on-prem subnet.

Got it thanks.

fmugambi
Spotlight
Spotlight

fmugambi_1-1714041246397.png

 

the protected networks is what am referring to as encryption domain, so am adding the ra pool here, or under policies, or both?

Protect network' add RA VPN in this part of vpn topolgy.

Also I forget you need route in other Peer for RA VPN.

And for policy' if you meaning ACP you also need to add it there.

MHM

AWS Peer? or on-prem peer.

 

AWS friend 

Prem peer RA VPN is direct connect so no need route

MHM

Other point sure you will ask it later 

No-NAT

If the RA VPN is connect to same IPsec interface then no-NAT will be 

Nat(out'out)

If the RA VPN have different interface than IPsec then 

Nat(RA VPN interface, IPsec interface)

Goodluck in your task 

MHM