04-12-2013 12:49 PM
Hello.
May be this question is very stupid, but can I use asa in this scenario?
I don't want to use inside interface. On border router there will be route to VPN-pool which points to ASA. On ASA there will be default route. Traffic from remote user comes to ASA -> border router -> Private network. Traffic to remote user goes to border router and then to ASA -> VPN tunnel -> Remote user. There will be no NAT on outside interface.
Any suggestions appreciated.
Thanks.
04-20-2013 01:50 PM
I want to be sure that I understand correctly what you want to accomplish. I think that you are saying that you want to use the ASA5510 only to terminate SSL client VPN sessions. There will not be any use of firewall rules or of address translation. And that traffic will use only one interface of the ASA. This is an unusual deployment of the ASA but I would think that this would work.
HTH
Rick
04-20-2013 11:36 PM
Thank you for reply
Yes, you understand correctly. It seems, that I have to terminate SSL sessions on outside inetrface (not inside). But traffic from tunnel will pass outside interface without NAT (at usual deployment it passes through inside interface). And this makes me wary.
I think I have to add some rules to outside interface that allow to pass traffic from tunnel to outside interface.
04-21-2013 06:00 AM
Yes you probably need commands like these
same-security-traffic permit intra-interface
same-security-traffic permit inter-interface
The first one would be especially important in your case. When I configure one I usually configure both of the commands. You can decide whether to use just one or to use both.
HTH
Rick
04-21-2013 07:40 PM
Thank you for reply, Rick
I'll try to modify my config at this week.
I'll let you know about results.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide