Hello!
I will try and explain the problem, facts simplified, and looking for a hint [[:)]]
"Centre" has 2 protected networks on different interfaces LAN 192.168.1.0/24 & DMZ 192.168.2.0/24. LAN has no access to DMZ and vice versa. DMZ has single server accessible via HTTP via NAT with public address 1.2.3.4
The "centre" is the only Astaro appliance
All works well.
Remote site (A) has private network 192.168.3.0/24. With site to site VPN, Remote site A can see LAN, and can access server in DMZ via public address (via internet and NAT).
Perfect all works well [[:)]]
Remote site (B) has a private network with PUBLIC addresses with 1-2-1 NAT. So they are using (for example) 212.134.10.0/24 as actual IPs for their clients. Their firewall presents each client as its "actual" address publically.
All work well, until....
Site-to-site VPN established between "centre" and "Remote site B". In this case, all traffic between "centre LAN" and "Remote site B" is fine.
But accessing the DMZ server fails.
We think its because the packet goes: siteB client (public 212.134.10.x) over internet to DMZ public (1.2.3.4) NAT'd to internal DMZ server (192.168.2.x) which is fine. But the return route is seen to go over the VPN tunnel (as Astaro knows 212.134.10.x is down the VPN tunnel) - and hence packets never get back.
How do we overcome this? Its as if the DMZ area on the Astaro uses the routing table of the entire device and sees the return path down the tunnel - whereas we want the routing of the DMZ to send the packets back to the Internet and not know/care about the tunnel.
Suggestions welcome.
This thread was automatically locked due to age.