private IP ((non-routable) IP on the outside Interface that goes into a Router with the public (routable) IP Address) <-> ASA <-> IP DMZ (internal Interface with routable IP)
What i want to achieve is to be able to establish vpn tunnels (road warrior, not site-to-site) to the inside Interface (routable IP) and not the outside interface (non-routable IP).
Is this even possible ?
let me elaborate a bit:
the idea is that the outside interface of the ASA has a private IP Address. This means that this address is not routable, so i cannot use it to connect the vpn clients to it. What i want to achieve is to be able to use the IP Address of the same ASA that resides on the DMZ Interface (which is a public/routable IP Address).
The problem is that even if i enable management-access on that interface, i have no idea if i would be able to connect to it. And since this is part of a larger ASA Production Setup, i cannot really play around with the IP Addresses (the simple way would be to subnet my dmz further and assign a small subnet on the outside interface of the asa to the border routers).
Anyway, anybody, please let me know if i can terminate vpn tunnels on the inside interface of an ASA.
You will still have to connect to a public routeable IP address. You can do what you want to do - you just enable the ISAKMP/IPSEC termination on the DMZ interface. You will have to have a static NAT entry to allow this to happen - as I do not think you can perform PAT for IPSEC.
Sorry I am confused - your "outside" ip address is one of the:-
And the Inside has an Internet IP address?? Errrrmmmm I would personaly reverse it, have the internet address on the outside and the internal on the inside = the normal firewall setup and configuration.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...