cancel
Showing results for 
Search instead for 
Did you mean: 

discontiguous subnets configuring on the VPN

after1_
Contributor

discontiguous subnets configuring on the VPN

Hi everyone,

 

I have 10 discontiguous public IP subnets (/24) and 2 groups of users, staff and students.

I was told that I have to create 10 vlans (one for each subnet) and create 10 roles and asign it to 2 realms.

 

Is this the best way of doing it? I dont want to use private Ip as we need to keep track of the users activities.

 

What is the best way to setup so that when the  staff user sign in, the vpn will allocate an ip address for the user on the staff subnet/vlan and check that the subnet is not runing out of IP address, same goes for student user, sign in and get a stduent ip adress on student subnet/vlan

 

11 REPLIES 11
zanyterp_
Respected Contributor

Re: discontiguous subnets configuring on the VPN

The private IP space does not _have_ to be on the same subnet, but it is easier. You can have disparate spaces as long as the external routes are in place to put those IPs back on the IVE interface you are using.
after1_
Contributor

Re: discontiguous subnets configuring on the VPN

Are there any freeware to monitor traffic/log before it get natted?

Question: to use private dhcp pool ip space, does it need to be on the same subnet as the internal interface ?

Is it necessary to create a vlan for each role?
-red-_
Frequent Contributor

Re: discontiguous subnets configuring on the VPN

Maybe I am missing something, but I am a little confused by the need to use public address space.  With logging enabled on your perimeter devices, I would imagine you'd be able to monitor activity regardless of whether the IP address is public or not. Juniper logs will have the information regarding which IP address is assigned to which user.

 

Also, do you have 10 different groups of users, or are the roles just being created to accommodate the 10 subnets? Based on your use case, assuming you just need two roles (Students, and Staff), I would create a role one for each group, then I'd create a corresponding NC connection profile for each of the roles. Depending upon your desired IP space distribution, you can place 5 subnets into each connection profile, or just distribute them as you see fit.

zanyterp_
Respected Contributor

Re: discontiguous subnets configuring on the VPN

You will need to have 10 roles so you can assign each VLAN to a role. You will then have two realms & 5 roles on each realm. You will need to decide how you want to associate users to each role so you don't overload one
ruc_
Regular Contributor

Re: discontiguous subnets configuring on the VPN

It will depend on the access mechanism you choose.

 

If you use pure L3 VPN style access mechanism then 1 realm, 2 roles and 2 'VPN Tunneling Connection profiles' will suffice as for L3 VPN the SA preserves the source IP that was assigned to the tunnel interface

(Note: 1 realm will suffice assuming your authentication server can return an attribute that allows the SSL VPN gateway to map staff/student to the appropriate role)

 

However if you use any other access method like web(rewrite), File browsing, Secure Application Manager (SAM ), etc then this will get very tricky as by default the SSL VPN gateway sources traffic for all these access methods using its internal interface IP. You could over-ride the default behaviour by using the role level option called Source IP. However that was designed to be used on a per role basis rather than per user basis. Which is why in your use case it will be tricky (i.e. will need one role per user)

spuluka
Super Contributor

Re: discontiguous subnets configuring on the VPN

I have 10 discontiguous public IP subnets (/24) and 2 groups of users, staff and students.  I was told that I have to create 10 vlans (one for each subnet) and create 10 roles and asign it to 2 realms.   Is this the best way of doing it? I dont want to use private Ip as we need to keep track of the users activities.   What is the best way to setup so that when the  staff user sign in, the vpn will allocate an ip address for the user on the staff subnet/vlan and check that the subnet is not runing out of IP address, same goes for student user, sign in and get a stduent ip adress on student subnet/vlan

It is hard to tell from the brief description what would be best.  But I believe you are describing a need for just two roles.  Roles are just what a user will get access to once connected and the above implies you have just two roles.
Networking is separate from access control.  So in this case I would consider creating a private ip space for each of the two roles that is not in use on the network.  Place the SA into this space and then route the space to have access to the 10 subnet.


Divide the space in half and use the top have for staff and the bottom half for students.  These then are your network connect ip pools.  Now when a user connections and is assigned an address they have access to all the subnets from a routing perspective.  This would allow you to apply different routing or firewall poliies inside your network based on which space the connection is coming from.


Now when you create the role you can apply access control lists based on the staff and student role as to where they can go once connected. Inside the SA you have very granular ACL controls by role.

Steve Puluka BSEET - IP Architect - DQE Communications Pittsburgh, PA (Metro-Ethernet & ISP) - http://puluka.com/home
after1_
Contributor

Re: discontiguous subnets configuring on the VPN

Hi Steve and everyone for your feedback.

I work for an education institution, currently we dot have the tool to monitor what user's download. Using public IP address is the only way at this stage.

Are there any tools out there to monitor NAT traffic?
zanyterp_
Respected Contributor

Re: discontiguous subnets configuring on the VPN

Are you trying to do VPN-based access, web-based access, RDP-based, or some other form?

after1_
Contributor

Re: discontiguous subnets configuring on the VPN

NC access