Build new VPN group or can I NAT existing

I have a scenario and need help on direction:

I have a 5510 8.2(2) with 6 L2L (Hub and Spoke) VPNs working.
Road warriors connect to Hub (5510) with IPsec (SplitTunnel) and are working great. They are able to access all internal networks.

New reqirement is to connect 2 warriors to an RDP session on a server Via the internet. (new vendor will only allow RDP sessions from our IP)

1. I am thinking I can NAT VPN traffic to this RDP session but how?

2. Do I build new IPsec policy just for these two warriors, and not make it a split tunnel? Then I have to set up all new ACLs and NAT exempt rules, uugghhhh

Thanks in Advance

 
ldutchmanAsked:
Who is Participating?
 
lrmooreCommented:
You can do it as "internet on a stick" for the vpn users.
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml
You can create a new policy just for these two warriors so the changes won't affect eveyone.
 You can also take the example config a step further and create policy nat rule that only works with that RDP session.
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.