Solved

Cisco ASA VPN - Is there any way to get a remote remote site to pass ALL Traffic across an IPSec VPN so that a central content filter will apply?

Posted on 2014-04-06
3
372 Views
Last Modified: 2014-05-30
Hello,

I have a (2) Site IPSec setup, and I want to get the internet traffic from the remote site to pass to the HUB site so that the content filter at that site processes the traffic from the remote site as well.  

I have done this with IOS VPN's before (GRE over IPSec with the default route pointing to a TUNNEL interface) but I have never found a solution that will let me do this with Cisco ASA's.  Sonicwalls seem to have it covered with the checkbox "Force all traffic to remote site" in the VPN ... I can't imagine that this is not possible with a Cisco ASA, which is supposed to be a superior device and platform.  

Note:  Because of the appliance (Barracuda 410), we cannot use WCCP as an option since the Barracuda will ONLY allow one host to do WCCP.

Thanks!
0
Comment
Question by:jkeegan123
3 Comments
 
LVL 15

Expert Comment

by:max_the_king
ID: 39982662
Hi,
you haven't fully described your architecture so i'm assuming that you have branch sites connected via vpn with head quarter, and the site-to-site vpns are up and running.

What i usually implement to my customers is a rule on the branch offices which do not let them go out on the internet, by simply setting an access-list on internal interface.
Then i allow branch offices to surf on the internet by using proxy settings in their browsers, where the proxy IP is the Barracuda appliance which is ubicated in the head quarter LAN.

The only way to avoid the need of proxy settings for the branch offices would be to define vlans on the central ASA, and define the same vlans on the barracuda, using virtual ip address on each subnet the barracuda should serve, but it would become really complicated, especially when troubleshooting.
My customers are happy to use proxy for branch offices anyway.

hope this helps
max
0
 
LVL 17

Accepted Solution

by:
MAG03 earned 500 total points
ID: 39990968
You can define in the crypto ACL that the destination is "any".  So basically anything that matches the defined source address will be encrypted and sent over the VPN tunnel.

Just remember to adjust your nat exempt statements to also define a destination of any.
0
 
LVL 5

Author Comment

by:jkeegan123
ID: 40032813
@MAG03:  Have you used this to accomplish this task?  This sounds like it would actually work well!
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

Have you experienced traffic destined through a Cisco ASA firewall disappears and you do not know if the traffic stops in the firewall or somewhere else? The solution is the capture feature. This feature was released in 6.2(1) and works in all firew…
I recently updated from an old PIX platform to the new ASA platform.  While upgrading, I was tremendously confused about how the VPN and AnyConnect licensing works.  It turns out that the ASA has 3 different VPN licensing schemes. "site-to-site" …
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now