Is there a way to turn off the IP Spoofing protection in a Cisco ASA 5505?
I have already turned off "ip verify reverse-path" as that was blocking the traffic initially. I was getting this in the Syslogs - "Deny TCP reverse path check from 10.245.6.1 to 192.168.6.25 on interface inside"
Now with that off I get this in my Syslogs - "Deny IP spoof from (10.245.6.1) to 192.168.6.25 on interface inside"
For clarification the inside interface has the 10.245.6.1 IP. I know if I do turn this off I run the risk of creating a routing loop, but I'm hoping that it will get snagged by the VPN tunnel before hitting the "normal" routing table (for lack of a better term).
The short version of why the hell I would want to do such a thing is to enable Remote Access VPN on a branch office, where the AD server is located back over a VPN link. But unfortunately when I try to specify the AD server via the inside our outside interface they both fail to be routed properly. So I'm attempting to hairpin the traffic around with a switch(doing routing) that we have at the office to make the traffic be routed over the VPN.
Or if anyone else has an idea on how to do this, I'm all ears.
Hopefully this all makes sense
I have already turned off "ip verify reverse-path" as that was blocking the traffic initially. I was getting this in the Syslogs - "Deny TCP reverse path check from 10.245.6.1 to 192.168.6.25 on interface inside"
Now with that off I get this in my Syslogs - "Deny IP spoof from (10.245.6.1) to 192.168.6.25 on interface inside"
For clarification the inside interface has the 10.245.6.1 IP. I know if I do turn this off I run the risk of creating a routing loop, but I'm hoping that it will get snagged by the VPN tunnel before hitting the "normal" routing table (for lack of a better term).
The short version of why the hell I would want to do such a thing is to enable Remote Access VPN on a branch office, where the AD server is located back over a VPN link. But unfortunately when I try to specify the AD server via the inside our outside interface they both fail to be routed properly. So I'm attempting to hairpin the traffic around with a switch(doing routing) that we have at the office to make the traffic be routed over the VPN.
Or if anyone else has an idea on how to do this, I'm all ears.
Hopefully this all makes sense