Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

ASA 5505 hairpinning

Posted on 2009-04-09
2
Medium Priority
?
485 Views
Last Modified: 2012-05-06
Hi,

I previously had the following network arrangement (IP addresses changed to RFC 1918 for privacy purposes).

An outside network of 192.168.1.0/24 (This is actually public-space in the actual rea-life scenario)
An inside network of  10.0.0.0/24 (This is RFC 1918 space in the real life-scenario)
An Asa 5505 sitting between the two.


A monitoring device with ip 192.168.1.10 monitoring an inside device with IP 10.0.0.10 with SNMP via a static one to one NAT and appropriate ACLs on the ASA.


The configuration has recently changed in that there is now a site to site VPN from the ASA to a remote site (supplied via a DSL line) with an IP range of 10.0.1.0/24. The site to site VPN matches 10.0.0.0/24 to 10.0.1.0/24 and vice versa.
The device with the original IP of 10.0.0.10 has moved to the remote site and now has a IP of 10.0.1.10.
This device is reachable from the 10.0.0.0/24 network directly over the VPN.

What i need to get working is the monitoring. Monitoring traffic will still be sourced at 192.168.1.10 but cannot be allowed to access the target device (10.0.1.0) via the DSL's WAN connection and as  a result the traffic needs to go over the exisitng site to site.
A static one to one NAT is still requried as the 192.168.1.10 machine is actually public IP in real life.
IS this possible?

Cheers,
Phil.
0
Comment
Question by:PhilMacavity
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Accepted Solution

by:
Nothing_Changed earned 750 total points
ID: 24115382
Yes, this should work on your ASA by adding this command:

same-security-traffic permit intra-interface
0
 
LVL 1

Author Closing Comment

by:PhilMacavity
ID: 31568460
Additional NAT commands were requried n order to get the correct functionality.
0

Featured Post

Veeam Disaster Recovery in Microsoft Azure

Veeam PN for Microsoft Azure is a FREE solution designed to simplify and automate the setup of a DR site in Microsoft Azure using lightweight software-defined networking. It reduces the complexity of VPN deployments and is designed for businesses of ALL sizes.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
Make the most of your online learning experience.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question