- CheckMates
- :
- Products
- :
- General Topics
- :
- Re: Remote Access to Server in Other Office
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Remote Access to Server in Other Office
Hi all. We have a monitoring server I need to give my colleagues in the US access to. I thought it would be a simple thing to allow but it seems not (or I'm completely missing something).
My colleagues are connecting from home to the VPN of our US office, so of course they're getting an IP from the US VPN pool.
The server is in our UK office.
My firewall rule for the US gateway:
US VPN Pool > UK Monitoring server > Office VPNs > HTTP/HTTPS > Accept > Log
My firewall rule for the UK gateway:
US VPN Pool > UK Monitoring server > Office VPNs > HTTP/HTTPS > Accept > Log
Traffic is getting dropped however. I must be missing something I just don't know what. Looking at the logs it says 'Encryption Failure: According to the policy the packet should not have been decrypted'
Any help would be hugely appreciated,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
With regular S2S VPNs you can accomplish this by using a Star VPN community and allowing the satellite GWs to route through the center GW to the other satellites. I'm struggling to see how we could achieve something similar with the Remote Access VPN.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Many years ago I accomplished this by configuring the VPN domain for the Europe site so it was working and installed the policy to the Europe gateway, then modified the VPN domain for the US site and installed the policy there.
Whenever I wanted to install a security policy to the other VPN site I had to change the VPN domain before installing it. This wasn't much work to do before each policy installation but most importantly the final result was that it worked. This was back in the R65.x days. Now in the R80.x days I would prepare this within two scripts (one of the Europe and one for the US site), put them into the script repository of SmartConsole and run these when I want to install a policy. The script would then modify the VPN domain to my required configuration and initiate the policy installation.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You do need to make sure that on each gateway you setup the Remote Access VPN Domain topology, this should only contain those networks/hosts that should be accessible for that site.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Well you could also access through the SMTP and the other's 3rd party accessible software. It depends on your need that what you have to do by the accessing server in other office. You have to decide and give the permission to access it well.
Hope it would be helpful you too.
Regrads
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I labbed this up and did some additional research. Turns out, the key here is in the Gateway Cluster Properties under Network Management > VPN Domain > Set domain for Remote Access Community. You can then click on the Remote Access community, click set and specify the VPN domain. What I did was create a new network group with the networks in the US and the networks in the UK that remote users needed to access as this setting dictates what routes are installed in the remote users routing table. From here, you need to ensure the remote users IP pool is included in the local encryption domain on the US gateway and if the UK firewall is a third party device, you'll need to ensure the remote users IP pool is included in their remote encryption domain.
Then you'll need to rules, one allowing remote access and one allowing access over the S2S VPN to the UK. The first rule is installed on the US GW and the second rule is installed on on both GWs. You may be able to get away with one rules but this setup worked for me.
In my screenshots, "LAN-LAN-172.30.59.0-24" is the US LAN, "LAB-LAN2-172.30.60.0-24" is the UK LAN. "VPN_Management_Users" is an access role with the remote VPN users.
