Improve company productivity with a Business Account.Sign Up

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 413
  • Last Modified:

ASA EasyVPN Hairpinning

Hi!

I like to connect a number of asa5505 to a central asa5510 using easyvpn. There is no problem with vpn-tunnels since the local offices are connected and traffic is passing through the tunnels (internet browsing is ok).

My problem is that since the tunnels are terminated at the same interface, i can't figure out if there shall be same nat rules to permit traffic between the 2 sites.. and if it shall, how will they look?

For exempel:

firewall A has 192.168.15.0/24 as inside network and is attached to firewall C at interface 172.28.3.254
firewall B has 192.168.16.0/24 as inside network and is attached to firewall C at interface 172.28.3.254

I like to be able to ping 192.168.15.100 ( or any other adress at that net) from 192.168.16.0/24 and reverse
 
I have used the: "same-security-traffic permit intra-interface" command and local offices are in "network extension mode" but still no success..

Any ideas?
0
Swedish
Asked:
Swedish
1 Solution
 
Jay_GridleyCommented:
You should exempt the 'internal' traffic through the tunnel from NAT. You can do that using an access-list.

First create the access-list:
access-list inside_nat0_outbound extended permit ip 192.168.15.0 255.255.255.0 172.28.3.254 255.255.255.0

Then tell the ASA to use this access-list for NAT0 (i.e. don't NAT):
nat (inside) 0 access-list inside_nat0_outbound

You should create a similar access-list (but the other way around) on both sides of your tunnel. You can just add additional entries to the access-list for additional sites.

Good luck.

JG.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now