Solved

ASA SSL VPN

Posted on 2014-11-15
3
212 Views
Last Modified: 2014-11-16
I am trying to understand the traffic flow for the SSL VPN  configured on the ASA 5510. Basically, my Internet connection terminates at a Juniper FW. The Juniper FW is connected to the core switch. The ASA is connected to the core but not connected to the Internet or the Juniper FW. I am at a remote location and am accessing my internal network with anyConnect. How does the traffic flow work? Thanks
0
Comment
Question by:leblanc
3 Comments
 
LVL 22

Assisted Solution

by:Matt V
Matt V earned 400 total points
ID: 40445632
Without knowing anything else, I would assume that the Juniper has forwarding and NAT rules to the ASA.

SSL VPN Connection hits the Juniper, gets forwarded to the ASA for processing.

Not much different than hosting a website internally.
0
 
LVL 69

Accepted Solution

by:
Qlemo earned 100 total points
ID: 40445638
Agree. I cannot imagine any other way of getting this work. But it seems a bit overcomplicated to use two firewalls here, though probably nothing uncommon.
0
 
LVL 1

Author Comment

by:leblanc
ID: 40445761
I found out there is a rule in the Juniper that is doing the NAT for traffic coming in for the ASA. Thanks
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Port forwarding 14 153
HP Procurve and AAA authentication 2 29
Cisco 3560 Switch with Multiple Gateways 10 68
Windows NLB support on Cisco Nexus 9000 1 23
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question