HP VPN Server Appliance sa3110/sa3150/sa3400/sa3450 Network Layout Reference Guide

LAN-to-LAN Scenarios
Hewlett-Packard VPN Server Appliance SA3110/SA3150/SA3400/SA3450 Network Layout Reference Guide
21
Table:
Table:Table:
Table: In Parallel With a Firewall (With NAT) Configuration
In Parallel With a Firewall (With NAT) Configuration In Parallel With a Firewall (With NAT) Configuration
In Parallel With a Firewall (With NAT) Configuration
Parameters
ParametersParameters
Parameters
Behind a
Behind a Behind a
Behind a
Firewall (One-
Firewall (One-Firewall (One-
Firewall (One-
Armed) With or
Armed) With or Armed) With or
Armed) With or
Without NAT
Without NAT Without NAT
Without NAT
This scenario shows the following:
A LAN-to-LAN connection between two VPN devices.
VPN device A is attached to Router A. Router B is attached
to the local network. The routers connect through the
Internet.
Traffic travels from one local network, through the LAN-to-
LAN connection, to the other local network.
Router B passes the traffic first to the third-party firewall,
which resides in parallel to the VPN device.
The third-party firewall may or may not perform network
address translation.
The third-party firewall performs firewall functionality on
the traffic, then passes the traffic to the VPN device.
The VPN device decrypts the encrypted VPN traffic and
passes it to the local network.
Note:
Note: Note:
Note: You must add a route to the firewall for the network that
VPN Device A (NAT by
VPN Device A (NAT by VPN Device A (NAT by
VPN Device A (NAT by
Router)
Router)Router)
Router)
VPN Device B (NAT by Router)
VPN Device B (NAT by Router)VPN Device B (NAT by Router)
VPN Device B (NAT by Router)
Interface E0:
IP: 10.250.128.2 255.255.255.0
Mode: Red
Interface E0:
IP: 10.250.130.2 255.255.255.0
Mode: Red
Interface E1:
IP: 192.168.10.2 255.255.255.0
Default device: 192.168.10.4
Mode: Red
Interface E1:
IP: 192.168.12.2 255.255.255.0
Default device: 192.168.12.4
Mode: Red
Configuration file entries/
routing info:
security-profile site-to-site
tunnel Boston
route 209.29.128.50
255.255.255.0
Configuration file entries/routing
info:
security-profile site-to-site
tunnel SanFrancisco
route 209.29.128.50 255.255.255.0