I am terminating a vpn client ( pool 10.10.10.0 /24 ) onto router A and allowing access to 192.168.100.0 /24 , this is router A's local lan. Router A also has a site to site VPN to router B. This is from net 192.168.100.0 /24 to 192.168.200.0 /24 This is as follows.....
I am terminating a vpn client ( pool 10.10.10.0 /24 ) onto router A and allowing access to 192.168.100.0 /24 , this is router A's local lan. Router A also has a site to site VPN to router B. This is from net 192.168.100.0 /24 to 192.168.200.0 /24 This is as follows.....
It sounds like the RAVPN and site-to-site VPN are terminated on the same interface of Router A.
Since traffic between the RAVPN Client and Router B's internal network is not transiting from an "ip nat inside" to an " ip nat outside" interface on Router A, I don't see NAT as a concern on Router A.
However, traffic returning from Router B's internal network to the RAVPN Client would need to be exempted from NAT on Router B.
This traffic would also have to be included in the crypto ACLs of both routers.
That is a great point, pushing the traffic down the tunnel may not be a problem, it is the returning traffic back to site A that would be a concern... Great catch....
Not sure they are necessary (in your scenario), given that you wouldn't have default routes pointing further into your LAN at either end. Some admins configure RAVPN Clients without split-tunneling, and successfully route client traffic to/from the Internet via the tunnel-termination interface.
I would expect the traffic to match the crypto ACL as it is forwarded back out the external interface (due to your default route), and be forwarded to the crypto peer.
However, I have not verified this.
I've not looked.
You'd need to be sure that:
- The external interface ACLs on the routers permits the correct encapsulated IP addresses (i.e.: include RAVPN pool addresses).
e.g.:
RAVPN pool addresses --> LAN B address space, on Router B RAVPN pool addresses
On Router B there must be a route to 10.10.10.0/24 via the tunnel to
192.168.100.1 (or better use the ip of the tunnel interface of Router A facing to Router B), so traffic from LAN B back to the VPN client is finding it's way.
Perhaps you may consider the tunnel between Router A and Router B a GRE over IPsec tunnel instead of pure IPsec which cannot use a routing protocol. With the old crypto map syntax and static routes it is also possible but config will soon become quite ugly. Beware the execution order of NAT, Firewall and IPsec encryption.
Cabling-Design.com Forums website is not affiliated with any of the manufacturers or service providers discussed here.
All logos and trade names are the property of their respective owners.