Access internal DMZ virtual server in SSL VPN
Hello,
I have setup an LAB for learning prupose and i was wondering if its possible to access an internal Virtual Server in the DMZ (Load balance for internal users), i could not achieved this directly via VPN, its is possible via Webtop reverse proxy and adding the VPN vlan to the DMZ Virtual server. Here is my topology:
1) Connected to the VPN Virtual server at 10.128.10.14
2) I dont have any ACL so i can connect to all off the DMZ servers in Pool LTM (10.128.20.151, 10.128.20.152,10.128.20.153)
3) When i try to connect to the internal virtual server in DMZ its not possible.
I have both Virtual servers configured with Auto Map, as i said before i can connect to this virtual server adding the ssl vpn vlan to the dmz virtual server, but doing this its an L2 i guess and i cant control the access via ACL in my APM policy.
Here is the topology from my LAB.
Hi,
If the internal Virtual Server is HTTP or HTTPs, you may assign an SSO Access profile that allow you to get the username and password of the main Network Access policy.
Then, you can define an LDAP query to filter who can access the VS or not.
Or you can use an irule to control who can access the Virtual Server.
Alternatively, you can define several Lease pool based on different user populatiion and attach an irule to the DNZ Virtual Server allowing access to some lease IP addresses and reject or drop access for some others.
Hope it helps
Yann