29-2
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 29 Setting General IPSec VPN Parameters
Permitting Intra-Interface Traffic
hostname(config)#
sysopt connection permit-ipsec
Permitting Intra-Interface Traffic
The security appliance includes a feature that lets a VPN client send IPSec-protected traffic to another
VPN user by allowing such traffic in and out of the same interface. Also called “hairpinning”, this feature
can be thought of as VPN spokes (clients) connecting through a VPN hub (security appliance).
In another application, this feature can redirect incoming VPN traffic back out through the same
interface as unencrypted traffic. This would be useful, for example, to a VPN client that does not have
split tunneling but needs to both access a VPN and browse the Web.
Figure 29-1
shows VPN Client 1 sending secure IPSec traffic to VPN Client 2 while also sending
unencrypted traffic to a public Web server.
Figure 29-1
VPN Client Using Intra-Interface Feature for Hairpinning
To configure this feature, use the
same-security-traffic
command in global configuration mode with its
intra-interface
argument.
The command syntax is
same-security-traffic permit
{
inter-interface |
intra-interface
}.
The following example shows how to enable intra-interface traffic:
hostname(config)#
same-security-traffic permit intra-interface
hostname(config)#
Note
You use the
same-security-traffic
command, but with the
inter-interface
argument, to permit
communication between interfaces that have the same security level. This feature is not specific to IPSec
connections. For more information, see the “Configuring Interface Parameters” chapter of this guide.
To use hairpinning, you must apply the proper NAT rules to the security appliance interface, as discussed
in the following section.
Client VPN
laptop 2
Client VPN
laptop 1
192.168.0.11
192.168.0.10
Unencrypted traffic
IPSec encrypted traffic
192.168.0.0
Security
appliance
Public web
server
143170
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......