We do have a Site to Site VPN from an external Supporter to an ASA5516 with 9.8(4). Traffic from inside to the external Supporter should be allowed (Traffic to external Monitoring system), but we like to authenticate every connection from the external Supporter to inside Systems with OTP authentication (RADIUS).
We tested cut-through-proxy with listener Port without a VPN successful:
https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113363-asa-cut-through-config-00.html
We weren’t able to configure cut-through-proxy with a Site to Site VPN: We couldn’t reach/configure the listener Port thru the VPN-Tunnel and we weren’t able to authenticate sessions.
Is it possible to combine Site2Site VPN with cut-through-proxy Authentication?
Is there another way to control (authenticate) traffic with a Site2Site VPN ?
Thanks in advance.