?
Solved

Site-to-Site TO Site-to-Site VPN Communication

Posted on 2011-03-12
2
Medium Priority
?
482 Views
Last Modified: 2012-05-11
Have the following configuration where site-to-site VPNs work fine. Cannot communicate from one end to the other directly.

Site A <---- VPN ----> Site B <----> VPN <----> Site C

Communications between Site A to Site B and Site B and Site C work fine. Site B is central facility. However, I cannot communicate directly from Site A to Site C and would prefer not to setup a Site A to Site C VPN. Are there special policies that must be set to accomplish this? All VPN tunnels terminate on the outside interface of the participating devices.
0
Comment
Question by:pasouza
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Expert Comment

by:ewkelly
ID: 35116284
Perhaps you need to add a route from site A to site C and back on the interface at site B, and also at sites A and C.
Do you get an error? if yes, what is the error?
0
 
LVL 34

Accepted Solution

by:
Istvan Kalmar earned 2000 total points
ID: 35116291
Hi,

you need to configure hair-pinning:

http://www.petenetlive.com/KB/Article/0000040.htm

Best regards,
Istvan
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
Suggested Courses

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question