09-15-2011 08:27 AM
I have a PIX 515 and am working with a Site-to-Site VPN. When I do not specify a filter on the Group Policy I can successfully access the remote network and the remote network can access my local network. However this by itself poses a securty risk for my local servers. I need to be able to access the remote network fully, however only one or two workstations on the remote network need to access mine.
If I add access-list vpn-remote-site extended permit ip host remote-wkstn1 any then only the remote workstation can access my remote network. This gets me a step closer as now only the remote workstation can access my network effectively denying everything else. However, from my local network I can now only access the remote workstation and not all of the other devices.
Is there is anyway around this? I do not have any control over the remote firewall and would like to make sure it is secured on my end.
09-15-2011 02:21 PM
Hi,
I was thinking you can accomplish this by using vpn filters some example in this link
However, on a second thought you could policy NAT the outgoing traffic and use for example 1 IP address in your (global) interface to use it sort of as a PAT address if you will and have ALL your internal networks PAted with 1 pre-defined IP to talk to any destination network at the far end of the tunnel, this will be a one direction traffic only initiated by your end, in turn the far end network will not be able to initiate any traffic to the global PAT address. If I have time I will give you example later.
As for them connecting to specific hosts on your network over the same tunnel then add one of more acl with nonat excempt rules on the same encryption domain acl for them to access the only hosts you want them to connect to .
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide