• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 537
  • Last Modified:

Build new VPN group or can I NAT existing

I have a scenario and need help on direction:

I have a 5510 8.2(2) with 6 L2L (Hub and Spoke) VPNs working.
Road warriors connect to Hub (5510) with IPsec (SplitTunnel) and are working great. They are able to access all internal networks.

New reqirement is to connect 2 warriors to an RDP session on a server Via the internet. (new vendor will only allow RDP sessions from our IP)

1. I am thinking I can NAT VPN traffic to this RDP session but how?

2. Do I build new IPsec policy just for these two warriors, and not make it a split tunnel? Then I have to set up all new ACLs and NAT exempt rules, uugghhhh

Thanks in Advance

 
0
ldutchman
Asked:
ldutchman
1 Solution
 
lrmooreCommented:
You can do it as "internet on a stick" for the vpn users.
http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00805734ae.shtml
You can create a new policy just for these two warriors so the changes won't affect eveyone.
 You can also take the example config a step further and create policy nat rule that only works with that RDP session.
0

Featured Post

Big Data Means Big Business

In data-dependent industries like IT, finance, and healthcare, there’s a growing demand for qualified analysts to fill leadership roles. WGU’s MS in Data Analytics has IT certifications from Oracle and SAS built into its curriculum at a flat fee that could save you money.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now