• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 678
  • Last Modified:

OSPF - Router/ASA - VPNs

Hello All,

I have a challenge here for me with OSPF.

1 Router (MPLS), 2 ASAs (Client & Site To Site VPNs), 1 Layer 3 catalyst switch. Attached a drawing&

The MPLS router is controlled by the provider  we exchange routes via OSPF from the router to the catalyst.

One of the ASA is connected to a VLAN on the catalyst and the other ASA is offsite. The 2 ASAs have a site to site tunnel and all traffic from the remote site comes thru it, no split tunneling.

So here is the deal I am have a problem sorting out. The catalyst learns about other remotes offices from the MPLS router via OSPF, planning on having the ASA learn about router to other offices via OSPF from the catalyst. Currntly the catalyst has a statict router that points all traffic for the 10.1.2.x network to the ASA (10.1.1.253).

If the ASA picks up the route via OSPF from the catalyst, it wants to send the traffic back to the catalyst. This makes sense as the catalyst says via OSFP I know how to get to 10.1.2.x network.

What is the best way to stop the ASA from picking up some routes or should I have the ASA advertise the far end tunnel route?

Regards,
0
dehmerl
Asked:
dehmerl
1 Solution
 
BBRazzCommented:
The best way to configure that will surely be for the ASA to announce the 10.1.2.x Network as it is the Next Hop gateway for that destination.

That way the static route can be dropped at the catalyse.

-BBRazz
0
 
dehmerlAuthor Commented:
Also was thinking if I should have OSPF going over the VPN to publish the route, would that be better then a static on the ASA?
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

Worried about phishing attacks?

90% of attacks start with a phish. It’s critical that IT admins and MSSPs have the right security in place to protect their end users from these phishing attacks. Check out our latest feature brief for tips and tricks to keep your employees off a hackers line!

Tackle projects and never again get stuck behind a technical roadblock.
Join Now