Hello all. I’m in a bit of a jam, any help would be greatly appreciated.
Need to establish access to a server behind a firewall only accessible through VPN.
Structure
Networks
Origin: 192.168.1.0/24
VPN: 10.100.200.200/32
DMZ: 10.10.0.0/23
Destination: 10.20.0.0/24
Devices
Origin workstation with Fortinet VPN
Cisco ASA FW
8 ports
1#: 10.10.0.60
8# 10.20.0.60
Server: 10.20.0.200
I can connect to the FW on 10.10.0.60 from the workstation with the FortiNet VPN.
On the Cisco ASA I can ping the server on 10.20.0.200.
I need to be able to SSH directly to the server from the workstation with the VPN.
My idea was to define a NAT to translate 10.10.0.60 to the server 10.20.0.200. But unfortunately the Cisco only has 1 port available for the 10.10.0.0/23 network. Which is assigned for SSH access from the workstation with VPN.
Any idea how I can maintain the VPN access to the Cisco and also NAT my way to the server?
It’s just about the best VPN concentrator you can get. If you think it’s garbage you don’t know how to work with it because I can’t think of a single reason why it’s bad.
What metric are you using to say its the best VPN concentrator? Many other platforms will have better performance per dollar than an ASA and are way less complicated to troubleshoot. Also God help you if you are running FMC and have to troubleshoot IPSEC VPN issues.
Dmz is theirs? So there’s no overlap,the /23 includes 10.10.0.0 and 10.20.0.0.
All that should be needed then is firewall rules (assuming routing is good and the encryption domain includes the whole /23)
So is this a site to site tunnel with a fortigate and Asa, or are you running the clients VPN software on the workstation to get into their network? (Some.places use non Cisco remote access VPNs with ASAs on the edge).
Whoops my brain failed at subnetting but still doesn’t look like nating should be needed if yours and their subs dont overlap.
I don’t think I understand how you’re going about this, the tunnel should be able to handle any traffic allowed as long as it’s all configured correctly.
Tbh I’m not sure I understand either. Had another task today so I couldn’t get to it but from I gathered we are basically using 2 FWs back to back, one of them is transparent I think.
So my idea is to just hammer it with a static route on the 2nd FW, the Cisco ASA.