Can I use private as Source IPs from a remote network IP addresses while building the IPSec tunnel?

Can I use private as Source IPs from a remote network IP addresses while building the IPSec tunnel? If not why? If so, how?

Your explanation is much appreciated.

Hi Deepak,

In such a situation, you usually NAT traffic that goes to the internet, but exempt traffic that goes through the VPN, because it will be wrapped in packages with public IP (tunnel) addresses. You can use the same IP address on your interface in the face of internet for the NAT/PAT and source of IPSEC Tunnel.

Tags: Cisco Security

Similar Questions

  • Can I use Airdrop to transfer images from my old to my new iphone6 iphone5?

    Can I use Airdrop to transfer images from my old to my new iphone6 iphone5?

    Yes,

    How to use AirDrop with your iPhone, iPad or iPod touch - Apple Support

    Why not just backup the iPhone 5 and the iPhone 6 to restore this backup. In this way, everything is transferred only once.

  • I can't use my external hard drive from toshiba on computer in the window, but I can use it on apple.

    I can't use my external hard drive from toshiba on computer in the window, but I can use it on apple. Is there someone who can help me solve it I will be grateful for it :)

    When it is connected to the PC, it is visible in disk management?

    Was this a drive that has been formatted using your Mac with the mac file system? If so it will not turn on the PC, without the use of third party software

  • What are the parameters? How are Variables differenet? Why we can not use variables to pass data to one sequnece to another? What is the advantage to use parameters instead of Variables?

    Hi all

    I am new to TestStand. Still in the learning process.

    What are the parameters? How are Variables differenet? Why we can not use variables to pass data to one sequnece to another? What is the advantage to use parameters instead of Variables?

    Thanks in advance,

    LaVIEWan

    I'm sorry... I discovered that... its not at all possible to pass data to another sequence using variables... it must be through settings... once again I apologize for the display of such a stupid question

  • Can I use microsoft web apps for my company if I have not yet bought the desktop version of microsoft office

    Can I use microsoft web apps for my company if I have not yet bought the desktop version of microsoft office

    Yes, but don't expect to see the complex Assembly with web apps, however, since it has limited functionality.

  • the things that I create within the trial period can be used for commercial purposes, otherwise if I buy CC who will give me the right to use the things I create for commercial purposes

    the things that I create within the trial period can be used for commercial purposes, otherwise if I buy CC who will give me the right to use the things I create for commercial purposes

    While there is really no way to stop you using the trial for commercial purposes (and to be honest, it's probably the best way to know if it works for you, in any case) you need to keep in mind that, after the 30 day trial period you will not is no longer able to work the same day or any other project unless you register it.

  • Create the Ipsec tunnel using digital certificates

    Hello

    I try to open the IPSEC tunnel between 2 3800 of Cisco routers using additional 3800 router as a CA server.

    Before that I added the CA server all go smoothly.

    Attached is my configuration, attached debug commands from the configuration of server and router CA

    It seems that the routers does not receive the certificate of the CA (R3) router because I see the certificate is awaiting status:

    #
    R3 #.
    R3 #show cryptographic pki certificate cisco talkative
    CA
    Status: available
    Version: 3
    Certificate serial number (hex): 01
    Use of certificates: Signature
    Issuer:
    CN = cisco1. Cisco.com L\ = RTP it\ = US
    Object:
    CN = cisco1. Cisco.com L\ = RTP it\ = US
    Validity date:
    start date: 10:12:13 UTC Sep 8 2013
    end date: 10:12:13 UTC Sep 7 2016
    Subject key information:
    Public key algorithm: rsaEncryption
    RSA Public Key: (512 bits)
    Signature algorithm: MD5 with RSA encryption
    Fingerprint MD5: FAB9FFF7 87B580F3 7A65627E 56A378C9
    Fingerprint SHA1: F26CD817 91F8129D A9E46671 07E26F1E 55422DCD
    X509v3 extensions:
    X509v3 Key use: 86000000
    Digital signature
    Key Cert sign
    Signature of the CRL
    X509v3 subject Key ID: 56F091F7 7016A63F B 89, 46900 B13E6719 8B0D548E
    X509v3 Basic Constraints:
    CA: TRUE
    X509v3 Authority Key ID: 56F091F7 7016A63F B 89, 46900 B13E6719 8B0D548E
    Access to information the authority:
    Related Trustpoints: cisco
    Storage: nvram:cisco1ciscoc #4CA.cer

    R3 #.

    Appreciate your support and I will send additional if necessary evidence

    TX

    Roee

    I didn't look at your configuration, but accroding to your description, it seems that you have not approved the certificate requests pending on your router CA. Here are the commands that you need:

    To view the pending requests:

    information cryptographic pki server router 'CA '.

    To grant requests pending:

    Info Server 'CA' router cryptographic pki grant all

  • When you send an e-mail using Outlook Express, I immediately get this message; "Some errors occurred while processing the requested tasks. Please see the list of errors below for more details"

    When you send an e-mail using Outlook Express, I immediately get this message; "Some errors occurred while processing the requested tasks. Please see the list of errors below for more details". Unfortunately, there are no errors listed below and the green bar is frozen on the screen. The message remains in my Outbox and repeated again and again sending. There is absolutely no record and file sent in my sent box. TIA - Ernie

    You have apparent dbx file corruption. A common problem.
     
    Spend most of your messages out of the Inbox and then create new folders to send and sent items box after having moved the messages you want to save to a local folder that you create.
     
    Tools | Options | Maintenance | Store folder will reveal the location of your Outlook Express files. Note the location and navigate on it in Explorer Windows or, copy and paste in start | Run.
     
    In Windows XP, Win2K & Win2K3 the OE user files (DBX and WAB) are by default marked as hidden. To view these files in Windows Explorer, you must enable Show hidden files and folders under start | Control Panel | Folder Options icon | Opinion, or in Windows Explorer. Tools | Folder options | View.
     
    With OE closed, find the DBX files for the items in the Outbox and sent and delete them.  New ones will be created automatically when you open OE.
     
    After you're done, followed by compacting your folders manually while working * off * and do it often.
     
    Click Outlook Express at the top of the the folder tree so no folders are open. Then: File | Work offline (or double-click on work online in the status bar). File | Folder | Compact all folders. Don't touch anything until the compacting is completed.
     
    General precautions for Outlook Express:
     
    Do not archive mail in the receipt or sent items box. Create your own user-defined folders and move messages you want to put in them. Empty the deleted items folder daily. Although the dbx files have a theoretical capacity of 2 GB, I recommend all a 300 MB max for less risk of corruption.
     
    Information on the maximum size of the .dbx files that are used by Outlook Express:
    http://support.Microsoft.com/?kbid=903095
     
    Disable analysis in your e-mail anti-virus program. It is a redundant layer of protection that devours the CPUs, slows down sending and receiving and causes a multitude of problems such as time-outs, account setting changes and has even been responsible for the loss of messages. Your up-to-date A / V program will continue to protect you sufficiently. For more information, see:
    http://www.oehelp.com/OETips.aspx#3 
     
    Why you don't need your anti-virus to scan your email
    http://thundercloud.NET/infoave/tutorials/email-scanning/index.htm
     
    Note that for some AV programs, it may be necessary to uninstall the program and reinstall in custom Mode and uncheck analysis when the option is the result of e-mail messages.
     
    Compact often as specified above.
     
    And backup often.
     
    Outlook Express Quick Backup (OEQB Freeware)
    http://www.oehelp.com/OEBackup/default.aspx 
  • How can I use my drive hard thunderbolt from 8 TB to backup all my wireless devices?

    How can I configure my drive hard thunderbolt from 8 TB to back up all my devices using a Wi - Fi connection?

    What you might hope better would be to use a Thunderbolt-to-Ethernet adapter to connect to the router, but even if it works, it would be like a fire (Thunderbolt) connection to a water hose (Ethernet) is launching... and expect to get more water on the hose... more, the best that can be done without wire will be about half the speed of the Ethernet network.

    Sorry, this is no sense... a Thunderbolt drive is designed to connect directly to a Thunderbolt port on a computer, or in a Garland with other devices Thunderbolt.

    In other words, as soon as you break the chain of connection Thunderbolt, the speed drops to Ethernet or even low speed wireless.

  • Can I use any AVCHD (*.) MTS) from a video camera from Panasonic with LR4?

    Hello

    For the moment, I use LR3.6 to manage and develop my photos to a digital SLR. I read a lot about the LR4 and video files. Can I use LR4 to manage (AVCHD 1080 p 50) video files from my Panasonic HDC - SD909 Videocam?

    Concerning

    Axel

    Yes: http://helpx.adobe.com/lightroom/kb/video-support-lightroom-4-3.html

  • Can I use a copy of Windows XP Edition family on a new computer if the old computer, it's on has crashed?

    I had a home edition of windows XP installed on a pc that crashed can I use the same cd for the windows xp activation and installation on the new pc I bought

    original title: Windows XP Home Edition SP2

    If the Windows XP license is an OEM license, the answer would be no.  If the Windows XP license is a "Full Retail", the answer would be Yes.

  • How can I use my TV screen as my disply for my lap top I plugged the cable now what do I do?

    Can you help me?

    Hello

    1. what operating system is installed on the computer?

    2. What is the brand and model of the TV/computer?

    See the following article:

    Setting up dual monitor: two screens are better than one:

    http://www.Microsoft.com/athome/organization/twomonitors.aspx#fBid=SCX2YgJIgxK

    You can also check:

    Move windows between multiple monitors:

    http://Windows.Microsoft.com/is-is/Windows7/move-Windows-between-multiple-monitors

  • Using the loopback address to identify the IPsec peer

    I have two IOS routers and you want to use the loopback address on the remote router as address such peer recommended in documents such as "Configuration with EIGRP and IPX using GRE Tunneling IPSec."

    On the local router, I identify the remote router via its address and loopback on the remote router, I configure crypto MYMAP map interface S0/0 and BRI1/0 (with nothing configured on the other than the IP address loopback interface)

    When I establish an IPsec tunnel from the remote router, it uses the interface S0/0 as its source address.

    I tried to configure card crypto MYMAP on loopback0 instead of BRI1/0 and S0/0, but it did not work.

    How can I get the remote router to use as source address loopback address?

    Thanks in advance for any help offered.

    Try to use the "crypto-loopback address 0.

    -Dembélé

  • I can weight of the IPSec Tunnels between ASAs

    Hello

    Remote site: link internet NYC 150 MB/s

    Local site: link internet Baltimore 400 MB/s

    Backup site: link internet Washington 200 Mb/s

    My main site and my backup site are connected via a gigabit Ethernet circuit between the respective base site switches.  Each site has its own internet connection and my OSPF allows to switch their traffic to the backup site if the main website is down.  We are opening an office in New York with one ASA unique connected to 150 Mbps FIOS internet circuit.  We want to set up an IPSec tunnel on the main site and the backup on the remote site, but want the remote site to prefer the tunnel in Baltimore, except if it is down.

    Interesting traffic would be the same for the two tunnels

    I know that ASA cannot be a GRE endpoint.  How can I force the New York traffic through the tunnel in Baltimore as long as it works?  An IPSec tunnel can be weighted?

    Thank you

    It is not in itself weighting, but you can create up to 10 backup over LAN to LAN VPN IPsec peers.

    For each tunnel, the security apparatus tried to negotiate with the first peer in the list. If this peer does not respond, the security apparatus made his way to the bottom of the list until a peer responds, or there is no peer more in the list.

    Reference.

  • How can I use notifications to send data from different sources for the same chart?

    Hello

    I use the model of 'Continuous measurement and logging' project comes with LV 2013.

    It is extremenly helpful in understanding the messaging between the acquisition, graphic and loops of newspaper. (Thank you NEITHER!)

    I ran into a snag though.

    I want to change so that my graphic loop receives notifications of data from two sources of acquisition by the declarant.

    I have trouble getting the data from the two sources to display on one graph.

    I've isolated the problem in the attached vi.

    Here's what happens:

    1. I create 2 parallel loops data and send the data to a third parallel loop with the notifiers.

    2. the third loop receives data from one of the loops because one of the authors of just receiving notifications is to expire instead of receive data.

    Can anyone suggest how can I fix?

    Thank you.

    -Matt

    Here's my modification of your VI. I put notes on the block diagram to explain the changes. He uses a queue for data transfer to avoid data loss. It uses a notifier to stop loops. All local variables and value property nodes have been eliminated.

    The way loops are arrested probably let some data in the queue. No more of one or two iterations of each of the loops of data acquisition. If you need ensure that all data has been displayed (or recorded in a real application), then you must stop acquiring loop first and read the queue until you know it's empty and both other loops stopped. Then stop the render loop and release the queue and the notifier.

    Lynn

Maybe you are looking for

  • go upstairs in front of Panel

    Hello, I have a front face with scroll bar. front panel is too big, I have a valve on top and the control over the lower part of the façade, I want to go at the top of the front panel when I press a Boolean value in the bottom of the front panel to s

  • My Acer Aspite M3 fan is on all the time. Is it OK?

    Hello! I bought a new Acer Aspite M3. The fan is all the time and made a noise of annoying. What is a fault on my computer or a drawing or model 'feature' of Acer? Thank you!

  • Invalid file names

    Hello Is anyone able to explain just what is happening with the file names?  I have a directory that has the name of files and subfolders in a meaningful way. However, various manipulative operations copies or other causes mistakes which suggests tha

  • How to create applications that can remove other applications

    Please someone help me I want to request that the ability is to remove the other application, can someone give me some examples of code to do I thank the of front

  • A router of RV will manage this?

    I am looking to verify that a RV180 or another router RV will manage the scenario below.  Also, I need internet connection part 1 and should be able to reach the router remotely, remote IP cameras.  I'm really trying to get information with VLAN by w