Solved

ASA EasyVPN Hairpinning

Posted on 2008-10-07
1
405 Views
Last Modified: 2013-11-16
Hi!

I like to connect a number of asa5505 to a central asa5510 using easyvpn. There is no problem with vpn-tunnels since the local offices are connected and traffic is passing through the tunnels (internet browsing is ok).

My problem is that since the tunnels are terminated at the same interface, i can't figure out if there shall be same nat rules to permit traffic between the 2 sites.. and if it shall, how will they look?

For exempel:

firewall A has 192.168.15.0/24 as inside network and is attached to firewall C at interface 172.28.3.254
firewall B has 192.168.16.0/24 as inside network and is attached to firewall C at interface 172.28.3.254

I like to be able to ping 192.168.15.100 ( or any other adress at that net) from 192.168.16.0/24 and reverse
 
I have used the: "same-security-traffic permit intra-interface" command and local offices are in "network extension mode" but still no success..

Any ideas?
0
Comment
Question by:Swedish
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 8

Accepted Solution

by:
Jay_Gridley earned 500 total points
ID: 22667157
You should exempt the 'internal' traffic through the tunnel from NAT. You can do that using an access-list.

First create the access-list:
access-list inside_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 172.28.3.254 255.255.255.0

Then tell the ASA to use this access-list for NAT0 (i.e. don't NAT):
nat (inside) 0 access-list inside_nat0_outbound

You should create a similar access-list (but the other way around) on both sides of your tunnel. You can just add additional entries to the access-list for additional sites.

Good luck.

JG.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question