Solved

Remotes are not behind our PAT and can't get to customers.

Posted on 2010-09-13
5
334 Views
Last Modified: 2013-11-16
We have a need to have a few of our customers allow our PAT fw address in on a specific port to access their env and do some maint to a proprietary product.

Our remote users, aren't represented by that same IP PAT address when they are trying to hit those customers.  We have a WG firebox e550 and using sslvpn with the remotes.  Right now I have them vpn in and rdping to a desktop in-house to then hit the customer's site.

I'm looking for another way to get them gain access to the customers without having to hit/use a mahcine in-house first.  I cannot think of any correct, if there is such a thing, IP spoofing or mimicking way to do this.

Please do not recommend/ask about webex or login type products.  I'm asking about a specific route/approuch and wondering if it's even doable.

Thanks
0
Comment
Question by:dee30
  • 2
  • 2
5 Comments
 
LVL 3

Assisted Solution

by:gremwell
gremwell earned 200 total points
ID: 33666740
IP spoofing  does not work with connection-oriented protocols such as TCP which used by RDP, so your users have to pass through your PAT firewall one way or another.

You can try to find a way to route traffic from SSL VPN clients to your PAT firewall and apply NAT to it, so it will appear as if it originated from the PAT firewall. There is a way to do if your firewalls runs Cisco IOS, I believe the technique is called "NAT on the stick". Don't know about other types of firewalls.
0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 33668582
Can you please elaborate on the setup with some dummy IPs so we know how the packet should be NAT'ed at FW before it goes out.

You can set virtual IP for SSL clients anything as you wish; but am not sure how you want to PAT them to other customers specific environment so need details.

Thank you.
0
 

Author Comment

by:dee30
ID: 33682580
Gremwell, thanks and i'll research "NAT on a stick" concept and implementation in conjunction with our WG.   Dpk_wal, it's basically what gremwell confirmed, I need to, "... route traffic from SSL VPN clients ...., so it will appear as if it originated from the PAT firewall" .  I will give some dummy IP descriptions in order to hear what else you can offer up on the subject.

1.simple WG e550 setup with our org is repped as a PAT address of 78.90.90.100.
2.cuist has an allowance  for comm from that address for use of say port 6932.
3.all our in-house persons that need it can gain access using that rule from over the net to the customers internal resource.
4.Our remotes connect to use via sslvpn(WG) and ISP addresses are whatever they are as per their local ISP/provider. e.g.
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 300 total points
ID: 33688340
You can create a zero route tunnel for SSL VPN users and give them virtual IP address in the same range as the internal subnet.
Now the users would first come to firebox get out to internet through firebox only [as this is a global change it cannot be done for selctive users when using SSL or PPTP with IPSec selective selection is possible].

As the users would appear to be behind firebox no additional setting would be required.

Thank you.
0
 

Author Closing Comment

by:dee30
ID: 33693899
Thank you both for replying.  Gremwell, NAT on a stick is specific to Cisco as you know, while I was specific to my type of firewall... WG. Dpk_wall, I don't want vpn users to go through the fw to go out to Internet and made that decision during initial setup a year or so ago.  I logged a call on WG site and will be using Dynamic NAT route instead.  Thx  
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Macbook Sierra OS OpenVPN issue 13 79
2 Gateways (bandwidth) - One domain 7 73
Port group in esxi 6 72
Why does my public IP keep changing? 6 62
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
An article on effective troubleshooting
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

815 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now