03-24-2015 12:49 PM
I have a customer that wants to put their VPN/ASA behind the main ASA connected to the Internet. Both appliances have an inside leg to the internal network, but the VPN ASA connects directly to the Internet ASA.
Topology:
Outisde FW: Internet handoff >> ASA/FW >>DMZ leg to ASA/VPN
VPN ASA: Outside Interface L3 link to DMZ interface of ASA/FW
On the outside FW I NAT'd the outside address of the VPN/ASA outside address to an available public IP and I have a rule allowing all IP from the outisde to the VPN outside private IP address. Inside = 192.168.254.1 Outside = public IP address.
On the VPN/ASA, I setup standard ASA SSL Remote Access.
When I hit the NAT'd public IP address, nothing happens. I have ran packet-tracer on the outside FW and everything looks good.
Does anyone have a sample design / config for a similar topology? Internet >>> ASA/FW >>>>dmz-leg>>>>ASA/VPN
Thanks in advance,
Bob
Solved! Go to Solution.
03-25-2015 12:47 PM
Can you share your NAT and routing config? Of both ASAs
03-25-2015 12:47 PM
Can you share your NAT and routing config? Of both ASAs
03-26-2015 07:46 PM
Andre, it did turn out to be a NAT issue after all, although I thought I checked that already.
The correct NAT on the outside ASA, where the object vpn-fw-outside is the IP address of the outside interface of the VPN ASA.
object network vpn-fw-outside
no nat (vpn-dmz,outside) static 209.x.x.x
Thanks,
Bob
07-23-2015 05:26 AM
Hi.
We have the same problem at our place. When anyconnect hits the outer firewall it nats fine to the inner firewall that runs the VPN and the inner replies through nat to the client. But then Anyconnect see's the new inner address and tries to send traffic directly to that address which obviously doesn't work as its a rfc1918 address.
Can you explain how you solved our problem. Thanks
07-23-2015 05:50 AM
Ok, so I have VPN/ASA appliance that has an outside subnet 192.168.1.0/30. The VPN appliance is .1 and the FW is .2. On the FW, this is an interface called vpn-inside.
I take the 192.168.1.1 and NAT it on the FW to a public address, and a rule that allows VPN traffic from the FW outside to the vpn-inside interface.
The Anyconnect client uses the public address on the outisde FW and traffic is sent to the inside VPN via the firewall rule.
I just logged in and my Anyconnect shows the SERVER address as the public address, not the RFC1918 address.
Configs:
On the FW here is my interface facing the VPN appliance:
interface GigabitEthernet0/3
description *** Conneciton to VPN Appliance G0/0 ***
nameif vpn-dmz
security-level 30
ip address 192.168.254.3 255.255.255.248 standby 192.168.254.4
object network vpn-fw-outside
host 192.168.254.1
description *** VPN appliance outisde interface ***
object network vpn-fw-outside
nat (vpn-dmz,outside) static 209.x.x.x
access-list outside_access_in extended permit ip any object vpn-fw-outside
On the VPN appliance, nothing special is needed once you setup the standard Anyconnect Ipsec or SSL server.
interface GigabitEthernet0/0
nameif outside
security-level 0
ip address 192.168.254.1 255.255.255.248 standby 192.168.254.2
These NAT statement are important:
nat (outside,outside) source static obj-AnyconnectPool obj-AnyconnectPool destination static obj-AnyconnectPool obj-AnyconnectPool
nat (inside,outside) source static any any destination static obj-AnyconnectPool obj-AnyconnectPool no-proxy-arp route-lookup
object network obj-AnyconnectPool
subnet 192.168.253.0 255.255.255.0
description VPN users pool
I have my firewalls connected to switch so I created a port in the vlan they use and gave my PC a 192.168.254.x address (to bypass outside Firewall) and made sure VPN was working fine and routing correctly. Then I moved to the outside of the firewall and changed my IP to a public IP address and tested from the Internet. This way I knew if the problem was with my VPN appliance or my FW.
Good luck,
Bob
07-24-2015 02:32 AM
Thanks for your reply. After playing with it yesterday and this morning I found out that the natting worked just fine when you did it directly to an ASA. But when you do it to the nattet vpn lb address then it doesn't work strangely enough.
So we have running now well enough for us to continue testing.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide