Hi,
we have set up a RAS server in our DMZ network (192.168.76.0/24). Behind this RAS server is the RAS VPN network with its own IP range 192.168.73.0/24. A route to this network was set up on the firewall. In the logs, however, I always see address spoofing messages that traffic from the internal network 10.90.90.0/24 is said to come from the DMZ Network nic2, but this is not true. I also excluded the IP from address spoofing in the DMZ network.
The address spoofing message only comes when the internal Network (for example DC Server) accesses to the RAS Client IPs 192.168.73.x. A Firewall rule permit the Access!
The access still works for a while, although the messages for address spoofing is coming. After a time it blocks every access. If I restart the RAS Server it works again!?!? I don't understand?
Do I have to exclude the VPN network anywhere else?
regards,
Dende
Bookmarks