Link to home
Start Free TrialLog in
Avatar of Phipps-IT
Phipps-ITFlag for United States of America

asked on

Netscaler Gateway VPX SNIP/VIP Single DMZ NAT rule Help.

I recently purchased a Netscaler Gateway VPX to replace Access Gateway and am having some issues getting it up and running.

I'm running the latest NSVPX Gateway in the DMZ. I have an NSIP that's connected to the internal network and a public routable ip address for the SNIP.

There is a public routable subnet that lives in the DMZ. There is an infrastructure network where all my CTX servers reside.

I've setup a NSIP to be in the same IP range as the infrastructure network
The SNIP is a public IP
I've created a VIP for my VS, which is a public IP

I'm having all sorts of issues with properly setting up NAT rules on a Cisco ASA to get this working. Authentication is being done on the NSVPX, then sent to WI, then the SNIP opens up connections directly to the STA servers (to my understanding)

My issue now is not passing through to the WI. Since WI lives on the inside network, Do I have to make sure that either the WI's private address is sent directly to the NSVPX or i create new NAT rules to change the IP? The WI is currently setup for Gateway Direct.

Once I get to the Netscaler Login page, The login just doesn't work, which means either the WI can't properly authenticate or return the traffic back successfully.

My confusion lies on what kind of traffic does the VIP need to accept or transmit BACK into the internal network. I believe the VIP listens only and the SNIP transmits. If so, then the WI needs to be able to access HTTPS into the VIP address to properly respond to an AUTH request.

Could use a hand on how to properly get this going.

Thanks
ASKER CERTIFIED SOLUTION
Avatar of Phipps-IT
Phipps-IT
Flag of United States of America image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial