Solved

Redirect VPN traffic on ASA to inside interface

Posted on 2010-09-15
5
2,889 Views
Last Modified: 2012-06-27
I have WCCP redirect setup on the inside interface of my ASA and a Cisco Ironport setup on my lan (behind the inside interface). I would like for VPN users to have to go through the ironport and from what I can tell, I would need to redirect the VPN traffic to the inside interface some how? Is there a way to perform route mapping on the ASA or if you have any other ideas I am open.
0
Comment
Question by:justin0104
  • 2
  • 2
5 Comments
 

Author Comment

by:justin0104
ID: 33688735
Added VPN to zone.
0
 
LVL 77

Accepted Solution

by:
arnold earned 500 total points
ID: 33688889
you need to add
same-security-traffic permit {inter-interface | intra-interface}
http://www.cisco.com/en/US/docs/security/asa/asa70/configuration/guide/vpnsysop.html

To allow inter/intra interface.

Hopefully, your remote VPN setup is configured using splittunnel to only route LAN traffic through the vpn tunnel while internet traffic goes through the user's internet connection.

If your vpn policy is secureall, when port 80 requests hit the outside interface you would need to configure wccp on the outside interface similar to the way you have it on the inside interface to redirect to the wccp proxy.
0
 

Expert Comment

by:jpletcher1
ID: 35323865
I am trying to accomplish this same exact thing.  All of our traffic it routed back (local or internet) through the main ASA and I'd like to use WCCP to filter the VPN traffic.  

Justin, did you configure WCCP on the outside interface or how did you accomplish this?
0
 

Author Comment

by:justin0104
ID: 35324274
Yes I was able to figure it out, you need to tunnel your VPN traffic through to the inside interface. To do this you need to create a static route. So in the ASDM you can go to Device Setup=>Static Routes=>click "Add"=> and add select your Outside interface. Then for the gateway enter the IP address of your inside interface IP. Now under options choose "Tunneled".

CLI is "route outside 0.0.0.0 0.0.0.0 <inside interface IP> tunneled"

Once this is created all VPN traffic will be tunneled to the inside interface. Now you will also need to create an ACL for outbound VPN. Before setting this up you didn't have to have an ACL because your VPN traffic was on the outside interface so an ACL wouldn't accomplish anything.

You will also need to create NAT statements for the VPN traffic coming from the inside headed towards the outside
Once you setup that tunneled route, you really have to set everything up just like it was coming from the inside interface of your ASA. So you will also need to setup the clients ACL for the traffic that needs to be redirected via WCCP.
0
 

Expert Comment

by:jpletcher1
ID: 35324459
Thanks for the response.  I had tried something like this in the past and have one question.

When you do the tunneled route to force all vpn traffic inside before it goes out to the internet, when the vpn traffic bound for the internet comes back from the internet side (going to the original vpn site) does that traffic tunnel back inside before it goes back to the remote site or does it go directly back to the vpn site once the internet request is returned?  I hope that makes sense.

I ask this because I tried the tunneled method with an in-line web filtering appliance that was on the inside between our core switch and asa, but the tunneled route didn't work because the return path from the internet to the remote site wasn't tunneling inside like the initial route was from the remote site to the internet.  This didn't work because our in-line web filter filtered on the return request which as you can see never passed through the inside network.

I have since got the next higher model of web filter that has WCCP, so I hope this will work like it has for you.  Thanks again for posting.
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
capture pcap with filtered traffic 1 65
parental control on huwei HG658b 1 20
ASA and ICMP 4 20
Issue with Cisco 4402 and 1142 LAPs 1 7
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
This past year has been one of great growth and performance for OnPage. We have added many features and integrations to the product, making 2016 an awesome year. We see these steps forward as the basis for future growth.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question