Remote VPN access over Site to Site IPSEC tunnel on same device

Posted on 2011-05-10
Last Modified: 2012-05-11
We are replacing our PIX and VPN Concentrator with an ASA5520.
Currently our PIX firewall has IPSEC VPN tunnels to remote offices and the VPN concentrator is used for remote client access.
The way the traffic is routed, if a remote user VPN's into the concentrator, they can access the remote offices over the Site to Site VPN tunnels through the PIX.
The solution I'm looking to do is to create the same scenario, but only using the single ASA 5520.
I know that as a remote user, you cannot VPN into the outside interface of the ASA and then go back out the same interface to the remote offices over the site to site tunnels.
Is there a way to do this with just the once device?
I thought that maybe I could assign a second outside interface on the ASA and have the remote users VPN to that interface, then the site the site tunnels would be built on a second outside interface.  Then the remote users could go into one outside interface and get routed out the 2nd interface with the Site to Site tunnels to reach the remote offices.  
Problem is when I attempted to assign a second outside interface an IP address from the /28 block given to us by our ISP, it didn't work because the IP's overlapped.
Any ideas?
Question by:ingersoe
    LVL 8

    Accepted Solution

    On an ASA it is possible to allow traffic to enter and exit the same interface, allowing the scenario you are looking for.  The command to enable that is:

    same-security-traffic permit intra-interface

    Have a look at this Cisco document,

    Author Comment

    Thanks for the quick response.  That looks like it'll work.  Guess I need to ready up on the new features of the 7 and 8 code.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    Join & Write a Comment

    This article is focussed on erradicating the confusion with slash notations. This article will help you identify and understand the purpose and use of slash notations. A deep understanding of this will help you identify networks quicker especially w…
    Security is one of the biggest concerns when moving and migrating your data from your on-premise location to the Public Cloud.  Where is your data? Who can access it? Will it be safe from accidental deletion?  All of these questions and more are imp…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now