Solved

Site-to-Site TO Site-to-Site VPN Communication

Posted on 2011-03-12
2
463 Views
Last Modified: 2012-05-11
Have the following configuration where site-to-site VPNs work fine. Cannot communicate from one end to the other directly.

Site A <---- VPN ----> Site B <----> VPN <----> Site C

Communications between Site A to Site B and Site B and Site C work fine. Site B is central facility. However, I cannot communicate directly from Site A to Site C and would prefer not to setup a Site A to Site C VPN. Are there special policies that must be set to accomplish this? All VPN tunnels terminate on the outside interface of the participating devices.
0
Comment
Question by:pasouza
2 Comments
 
LVL 5

Expert Comment

by:ewkelly
ID: 35116284
Perhaps you need to add a route from site A to site C and back on the interface at site B, and also at sites A and C.
Do you get an error? if yes, what is the error?
0
 
LVL 34

Accepted Solution

by:
Istvan Kalmar earned 500 total points
ID: 35116291
Hi,

you need to configure hair-pinning:

http://www.petenetlive.com/KB/Article/0000040.htm

Best regards,
Istvan
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PCI standards 5 51
Azure network security group 2 65
nipper studio 2 47
Setting up new vpn 15 67
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question