Solved

VPN Client Traffic to DMZ Interface

Posted on 2014-02-15
5
716 Views
Last Modified: 2014-02-16
Need to Plan for the following:

VPN Client Traffic Currently can reach the Inside Networks of an ASA. Inside Users are also able to access Resources on a DMZ Interface. For VPN Users there is NAT Exemption to reach inside resources. For Internal users, there is PAT on the DMZ interface to reach the DMZ subnets. Need to configure the VPN Client Users to be able to reach the DMZ Subnets. NAT configuration is below. ASA is 5505 version 8.2:

nat (inside) 0 access-list inside_nat0_outbound (just specifies Inside to VPN)
nat (inside) 1 0.0.0.0 0.0.0.0
global (outside) 1 interface
global (DMZ) 1 interface

Inside Subnet - 10.70.1.0/24
VPN Subnet - 10.70.10.0/24
DMZ Interface - 192.168.244.1/30
DMZ Remote subnet to Reach - 10.60.1.0/24

Topology is - ASA  (inside) - Internal Switch via one VLAN (301) - Users
         ASA (DMZ) - DMZ Switch via 192.168.244.0/30 (VLAN192) subnet - DMZ Remote subnet

Is there a way to terminate VPN client traffic on the ASA outside and then to somehow reroute and PAT it the same way as the inside users traffic?
0
Comment
Question by:Strinalena
  • 3
  • 2
5 Comments
 
LVL 15

Expert Comment

by:max_the_king
Comment Utility
hi,
you Just need to exempt nat between dmz and vpn subnet:

access-list nonatdmz permit ip <dmzsubnet> <vpnsubnet>
nat (dmz) 0 access-list nonatdmz

hope this helps
max
0
 

Author Comment

by:Strinalena
Comment Utility
Hi,
The problem is that traffic can only reach the DMZ Subnet 10.60.1.0/24 if the VPN Traffic is Translated to the DMZ interface (192.168.244.1) so if we just exempt the traffic from Translation it will not be able to reach the destination or?
0
 
LVL 15

Accepted Solution

by:
max_the_king earned 500 total points
Comment Utility
Hi,
that depends on your architecture: if your VLAN is defined as an ASA subinterface, you can exempt NAT accordingly as the example in my previous post; if your VLAN is accessed through a router, you need to add a route on the ASA as well. In that case you need to add a route back from the router to VPN subnet, and that is to be configured on the router.

max
0
 

Author Comment

by:Strinalena
Comment Utility
Thanks! Will try the following:
ASA - Route to 10.60.1.0/24 via 192.168.244.2 (The Router's Interface)
ASA - NAT Exempt for VPN to DMZ Subnet
Router - Route to VPN Subnet via 192.168.244.1 (ASA DMZ Interface)
0
 

Author Comment

by:Strinalena
Comment Utility
Done that and it is working. Also had to filter traffic and applied VPN-Filter. It is working as expected. Thanks for your help.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Join & Write a Comment

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now