RE: FW: Split Routing?

  • From: "Jim Harrison" <Jim@xxxxxxxxxxxx>
  • To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
  • Date: Thu, 10 Feb 2005 11:35:48 -0800

We just covered this in another thread.
If the internal hosts don't have a local route to the remote WAN subnet,
they can't get there.
All internal hosts MUST be SecureNET in order to cross into the WAN.

-----Original Message-----
From: Wayne Berry [mailto:wayne@xxxxxxxxxx] 
Sent: Thursday, February 10, 2005 10:56 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] FW: Split Routing?

http://www.ISAserver.org


ISAList:

 

In my office I would like to put up a ISA Server 2004 as a firewall for
outside access, and as a Site-To-Site VPN.  Traffic that is going for
the outside work (isaserver.org) would just go out my External network.
Traffic going for our RACK in co-location would be tunneled out the VPN
(over the External network) and decrypted by the PIX that we have at
collocation.

 

1)       I have the Internal To External Working

2)       I believe the VPN tunnel is up (we had a SOHO To PIX working
previously so I know the PIX is set up right), however how do you check
the VPN tunnel on the ISA Server 2004 is up?  Is the only way to know to
send traffic over it?  i.e. ping, tracert, etc...

3)       I have the a Network Rule that Routes Traffic Between Internal
and Co-location (FiberCloud)

 

http://www.xcache.com/images/xpisa/NetworkRulesScreenShot.bmp

 

4)       I have two Firewall Polices for All Traffic between my office
(Crown Plaza) To Co-Location  (Fibercloud) and Back:

 

Http://www.xcache.com/images/xpisa/FirewallPolicyScreenShot.bmp

 

5)       But From the Internal network I can't ping, trace route, or
connect to IPs that I have defined as being part of the VPN network.  So
either the VPN is not established, which I don't know how to test, or my
routing rule isn't working or my policies are preventing my from getting
there.  Does anyone have a couple of quick tests that I can use to
figure out what the issue is.

 

BTW I read:

 

Creating IPSec Tunnel Mode Site to Site VPNs with ISA Server 2004
Firewalls

http://www.isaserver.org/tutorials/2004ipsectunnelmode.html

 

To get this far, however none of them deal with split traffic, where
some traffic is headed external and some is headed to the VPN.

 

-Wayne

The ISAPI Dev pretending to be an ISA Admin for the day

 

 

------------------------------------------------------
List Archives: http://www.webelists.com/cgi/lyris.pl?enter=isalist
ISA Server Newsletter: http://www.isaserver.org/pages/newsletter.asp
ISA Server FAQ: http://www.isaserver.org/pages/larticle.asp?type=FAQ
------------------------------------------------------
Other Internet Software Marketing Sites:
World of Windows Networking: http://www.windowsnetworking.com Leading
Network Software Directory: http://www.serverfiles.com
No.1 Exchange Server Resource Site: http://www.msexchange.org Windows
Security Resource Site: http://www.windowsecurity.com/ Network Security
Library: http://www.secinf.net/ Windows 2000/NT Fax Solutions:
http://www.ntfaxfaq.com
------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jim@xxxxxxxxxxxx To unsubscribe visit
http://www.webelists.com/cgi/lyris.pl?enter=isalist
Report abuse to listadmin@xxxxxxxxxxxxx 

All mail to and from this domain is GFI-scanned.



Other related posts: