09-23-2020 11:36 PM
Hi legends,
I have just completed setting up RAVPN with MFA, one with Yubikey and one with Microsoft Azure NPS. The MS option is for general staff and the yubikey is for IT support staff. This is what the customer requested.
Now, they would like VPN on the campus network, though only for IT staff. This is only to reach DC networks. We have multiple VRFs and each has a few IT staff that is required to reach the DC networks and this has to be over AnyConnect VPN.
Our current solution is Palo Alto and setting that up was a piece of cake as you use the same loopback public facing IPs with DNS.
Has anyone else had to set something up like this and if so, how do you get multiple VRFs VPN on the internal network?
Any ideas, will be greatly appreciated!
Thank you
Heino
09-23-2020 11:53 PM
Hi @Heino Human
Use sub-interfaces on the ASA/FTD, the sub-interface on the switch would be defined in the correct VRF. You'd have to assign a different IP address pool to the IT Staff to reach the DC networks.
You aren't using ISE for aaa, so you cannot authorise access based on username.
HTH
09-24-2020 12:11 AM
As per my understanding as below :
you IT staff connect to VPN to your office - then that staff needs to access DC using the same VPN. ( Hope you already have VPN between Corporate and DC network? do you ?
You have had different VPN profile can get a different IP address for the IT Staff required to access to DC,.
make access rule on your VPN to have that IP address can reach DC, is that works?
09-24-2020 03:40 AM
hi guys,
Firstly, we have internet firewalls, FTDs, and DC firewalls Palo Altos. The DC firewall also has internet access, though for DC services only. The campus network, use the internet firewalls for internet. Think east west, or north south to separate DC and internet.
So we have all our users connecting from home to the campus network via anyconnect VPN, which is great and working.
Now, they want IT staff, who are onsite on campus, to also use the VPN to access data center services, like databases etc that has sensitive information on it. For the the rest of general staff, they will access normal services on premises without VPN.
When you setup AnyConnect, you connect to the outside interface and have an egress interface like inside. Now, we have to setup VPN via the inside interface. I should have mentioned, our internet firewall is like a router on a stick for all the VRFs. So from the inside Staff network, you traverse the internet firewall to get to the data center, or general services like CCTV or research network etc.
So my end result would be connecting from onsite campus staff VRF network (for database admin staff) and say, IT Admin VRF network to the DC VRF via VPN.
I hope this make a bit more sense.
On a side note, yes, we use sub interfaces and have 9 VRFs to a switch with VLAN interfaces. We use BGP for routing between the firewall and switch to have the separate VRFs.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide