Solved

ASA EasyVPN Hairpinning

Posted on 2008-10-07
1
395 Views
Last Modified: 2013-11-16
Hi!

I like to connect a number of asa5505 to a central asa5510 using easyvpn. There is no problem with vpn-tunnels since the local offices are connected and traffic is passing through the tunnels (internet browsing is ok).

My problem is that since the tunnels are terminated at the same interface, i can't figure out if there shall be same nat rules to permit traffic between the 2 sites.. and if it shall, how will they look?

For exempel:

firewall A has 192.168.15.0/24 as inside network and is attached to firewall C at interface 172.28.3.254
firewall B has 192.168.16.0/24 as inside network and is attached to firewall C at interface 172.28.3.254

I like to be able to ping 192.168.15.100 ( or any other adress at that net) from 192.168.16.0/24 and reverse
 
I have used the: "same-security-traffic permit intra-interface" command and local offices are in "network extension mode" but still no success..

Any ideas?
0
Comment
Question by:Swedish
1 Comment
 
LVL 8

Accepted Solution

by:
Jay_Gridley earned 500 total points
ID: 22667157
You should exempt the 'internal' traffic through the tunnel from NAT. You can do that using an access-list.

First create the access-list:
access-list inside_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 172.28.3.254 255.255.255.0

Then tell the ASA to use this access-list for NAT0 (i.e. don't NAT):
nat (inside) 0 access-list inside_nat0_outbound

You should create a similar access-list (but the other way around) on both sides of your tunnel. You can just add additional entries to the access-list for additional sites.

Good luck.

JG.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
You have products, that come in variants and want to set different prices for them? Watch this micro tutorial that describes how to configure prices for Magento super attributes. Assigning simple products to configurable: We assigned simple products…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now