NAT and VPN site-2-Site

Hello world.

I have question about Site 2 Site VPN and NAT.

HQ is connected to the partner and the co-location through site to site VPN (with two different tunnels). Co-location is connected to the HQ with the site 2 site VPN.

HQ:
Co-location:
Partner:

Basically, what I want to achieve is to do the following:

All traffic from the combination with destination partner should switch from AC and source what IP must be changed. So it seems that the traffic originated in the DMZ HQ on the side of the partner.

How can I achieve that?

HW: Cisco ASA

Hello Roger,.

The configuration you need will be on the ASA HQ.

First configure the ASA so that it would allow the traffic to leave through the same interface it came through:

permit same-security-traffic intra-interface

Then, you create a nat that an IP address of this beach (it will work if the partner does not need to go to the apartment, just camp to the partner):

policy-based-nat1 permit ip access list

NAT () to access list policy-based-nat1

(Global)

That is asuming that you already have a rule of traffic interesting (crypto ACL map) allowed your DMZ for flatsharing.

For a more specific example, see below:

Colocation network: 192.168.1.0/24

Network DMZ HQ: 10.10.10.0/24

Network partner: 172.16.10.0/24

permit same-security-traffic intra-interface

access list policy-based-nat1 permit ip 192.168.1.0 255.255.255.0 172.16.10.0 255.255.255.0

NAT (outdoor) 100 access list policy-based-nat1

global (outside) 100 10.10.10.253

vpn10 10.10.10.0 ip access list allow 255.255.255.0 172.16.10.0 255.255.255.0

10 correspondence address vpn vpn crypto card

If the partner needs to access the apartment so (two-way access) you may not use the DMZ network as there must be a translation from one to the other and you have the same amount of addresses to be translated you have on the apartment.

However, it would be possible if your DMZ network is greater than the apartment (like DMZ being a 16 and colo in 24) and you can isolate a subnet just for NAT.

Hope this helps to solve the problem.

Tags: Cisco Security

Similar Questions

  • remote VPN and vpn site to site vpn remote users unable to access the local network

    As per below config remote vpn and vpn site to site vpn remote users unable to access the local network please suggest me a required config

    The local 192.168.215.4 not able ping server IP this server connectivity remote vpn works fine but not able to ping to the local network vpn users.

    ASA Version 8.2 (2)
    !
    host name
    domain kunchevrolet
    activate r8xwsBuKsSP7kABz encrypted password
    r8xwsBuKsSP7kABz encrypted passwd
    names of
    !
    interface Ethernet0/0
    nameif outside
    security-level 0
    PPPoE client vpdn group dataone
    IP address pppoe
    !
    interface Ethernet0/1
    nameif inside
    security-level 50
    IP 192.168.215.2 255.255.255.0
    !
    interface Ethernet0/2
    nameif Internet
    security-level 0
    IP address dhcp setroute
    !
    interface Ethernet0/3
    Shutdown
    No nameif
    no level of security
    no ip address
    !
    interface Management0/0
    Shutdown
    No nameif
    no level of security
    no ip address
    management only
    !
    passive FTP mode
    clock timezone IST 5 30
    DNS server-group DefaultDNS
    domain kunchevrolet
    permit same-security-traffic intra-interface
    object-group network GM-DC-VPN-Gateway
    object-group, net-LAN
    access extensive list ip 192.168.215.0 sptnl allow 255.255.255.0 192.168.2.0 255.255.255.0
    192.168.215.0 IP Access-list extended sheep 255.255.255.0 allow 192.168.2.0 255.255.255.0
    tunnel of splitting allowed access list standard 192.168.215.0 255.255.255.0
    pager lines 24
    Enable logging
    asdm of logging of information
    Outside 1500 MTU
    Within 1500 MTU
    MTU 1500 Internet
    IP local pool VPN_Users 192.168.2.1 - 192.168.2.250 mask 255.255.255.0
    ICMP unreachable rate-limit 1 burst-size 1
    enable ASDM history
    ARP timeout 14400
    NAT-control
    Global 1 interface (outside)
    NAT (inside) 1 0.0.0.0 0.0.0.0
    Route outside 0.0.0.0 0.0.0.0 59.90.214.1 1
    Timeout xlate 03:00
    Timeout conn 01:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
    Sunrpc timeout 0:10:00 h323 0:05:00 h225 mgcp from 01:00 0:05:00 mgcp-pat 0:05:00
    Sip timeout 0:30:00 sip_media 0:02:00 prompt Protocol sip-0: 03:00 sip - disconnect 0:02:00
    Timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
    timeout tcp-proxy-reassembly 0:01:00
    dynamic-access-policy-registration DfltAccessPolicy
    the ssh LOCAL console AAA authentication
    AAA authentication LOCAL telnet console
    AAA authentication http LOCAL console
    AAA authentication enable LOCAL console
    LOCAL AAA authentication serial console
    Enable http server
    x.x.x.x 255.255.255.252 out http
    http 192.168.215.0 255.255.255.252 inside
    http 192.168.215.0 255.255.255.0 inside
    No snmp server location
    No snmp Server contact
    Server enable SNMP traps snmp authentication linkup, linkdown cold start
    Crypto ipsec transform-set esp-3des esp-sha-hmac RIGHT
    life crypto ipsec security association seconds 28800
    Crypto ipsec kilobytes of life - safety 4608000 association
    Crypto-map dynamic dynmap 65500 transform-set RIGHT
    card crypto 10 VPN ipsec-isakmp dynamic dynmap
    card crypto VPN outside interface
    card crypto 10 ASA-01 set peer 221.135.138.130
    card crypto 10 ASA - 01 the transform-set RIGHT value
    crypto ISAKMP allow outside
    crypto ISAKMP policy 10
    preshared authentication
    3des encryption
    sha hash
    Group 2
    life 86400
    crypto ISAKMP policy 65535
    preshared authentication
    the Encryption
    sha hash
    Group 2
    lifetime 28800
    Telnet 192.168.215.0 255.255.255.0 inside
    Telnet timeout 5
    SSH 0.0.0.0 0.0.0.0 outdoors
    SSH timeout 5
    Console timeout 0
    management-access inside
    VPDN group dataone request dialout pppoe
    VPDN group dataone localname bb4027654187_scdrid
    VPDN group dataone ppp authentication chap
    VPDN username bb4027654187_scdrid password * local store
    interface for identifying DHCP-client Internet customer
    dhcpd dns 218.248.255.141 218.248.245.1
    !
    dhcpd address 192.168.215.11 - 192.168.215.254 inside
    dhcpd allow inside
    !
    a basic threat threat detection
    Statistics-list of access threat detection
    no statistical threat detection tcp-interception
    Des-sha1 encryption SSL
    WebVPN
    allow outside
    tunnel-group-list activate
    internal kun group policy
    kun group policy attributes
    VPN - connections 8
    Protocol-tunnel-VPN IPSec
    Split-tunnel-policy tunnelspecified
    Split-tunnel-network-list value split tunnel
    kunchevrolet value by default-field
    test P4ttSyrm33SV8TYp encrypted password username
    username kunauto password bSHrKTGl8PUbvus / encrypted privilege 15
    username kunauto attributes
    Strategy Group-VPN-kun
    Protocol-tunnel-VPN IPSec
    tunnel-group vpngroup type remote access
    tunnel-group vpngroup General attributes
    address pool VPN_Users
    Group Policy - by default-kun
    tunnel-group vpngroup webvpn-attributes
    the vpngroup group alias activation
    vpngroup group tunnel ipsec-attributes
    pre-shared key *.
    type tunnel-group test remote access
    tunnel-group x.x.x.x type ipsec-l2l
    tunnel-group ipsec-attributes x.x.x.x
    pre-shared key *.
    !
    class-map inspection_default
    match default-inspection-traffic
    !
    !
    type of policy-card inspect dns preset_dns_map
    parameters
    maximum message length automatic of customer
    message-length maximum 512
    Policy-map global_policy
    class inspection_default
    inspect the preset_dns_map dns
    inspect the ftp
    inspect h323 h225
    inspect the h323 ras
    Review the ip options
    inspect the netbios
    inspect the rsh
    inspect the rtsp
    inspect the skinny
    inspect esmtp
    inspect sqlnet
    inspect sunrpc
    inspect the tftp
    inspect the sip
    inspect xdmcp
    inspect the icmp
    !
    global service-policy global_policy
    context of prompt hostname
    call-home
    Profile of CiscoTAC-1
    no active account
    http https://tools.cisco.com/its/service/oddce/services/DDCEService destination address
    email address of destination [email protected] / * /
    destination-mode http transport
    Subscribe to alert-group diagnosis
    Subscribe to alert-group environment
    Subscribe to alert-group monthly periodic inventory
    monthly periodicals to subscribe to alert-group configuration
    daily periodic subscribe to alert-group telemetry
    Cryptochecksum:0d2497e1280e41ab3875e77c6b184cf8
    : end
    kunauto #.

    Hello

    Looking at the configuration, there is an access list this nat exemption: -.

    192.168.215.0 IP Access-list extended sheep 255.255.255.0 allow 192.168.2.0 255.255.255.0

    But it is not applied in the States of nat.

    Send the following command to the nat exemption to apply: -.

    NAT (inside) 0 access-list sheep

    Kind regards

    Dinesh Moudgil

    P.S. Please mark this message as 'Responded' If you find this information useful so that it brings goodness to other users of the community

  • Static NAT enable VPN site-to-site.

    Hello

    We plan to build VPN site to site, but, we have a single public routerable internet IP address to assign VPN on Site A, but Site B is ok.

    in this case, I think that we must use static NAT on the router, the simple diagram is as below.

    internal a subnet - router VPN - router for Internet of the Site - to - VPN - B B Site internal subnet.

    the final goal is to make the communication between internal a subnet and subnet B on IPSEC tunnel.

    OK, as I said, Site A having a public IP address, then it must use the static NAT and need to apply on the Site router.

    Router

    interface x/x

    Head of ESCR to the internet

    NAT outside IP

    !

    interface x/x

    Head of DESC to internal (VPN)

    IP nat inside

    !

    IP nat inside source static (like IP address x.x.x.x) public (as private VPN interface IP x.x.x.x)

    so, wouldn't be work without any problem? I think it will work, but I would find other one just in case.

    Hey,.

    Is that what you try to achieve:

    subnet A - A = vpn router = router B - Sub-B network

    and you need communicate between Subnet A and subnet via ipsec vpn b?

    Concerning

  • ASA 8.4 (1) source-nat over vpn site-to-site

    I'm setting up a tunnel vpn site-to-site and require nat for the local and remote side. The remote side will be nat to

    10.2.255.128/25 on their face before they reach our network, so I have to only source-nat our servers via the tunnel to them. Should I just do the static NAT, then let the whole subnet through the acl of valuable traffic as the config below? I don't think I should use twice a nat because I'm not trying to make the destination nat on the firewall. Servers with us will 10.2.255.128/25 and I would like to preserve it through the ASA.

    network of the ServerA object

    host 10.1.0.1

    NAT 10.2.255.1 static (inside, outside)

    network of the object server b

    host 10.1.0.2

    NAT 10.2.255.2 static (inside, outside)

    the object server c network

    host 10.1.0.3

    NAT 10.2.255.3 static (inside, outside)

    the LOCAL_SUBNET object-group network

    object-network 10.2.255.0 255.255.255.128

    the REMOTE_SUBNET object-group network

    object-network 10.2.255.128 255.255.255.128

    VPN_ACL list extended access permitted ip object-group LOCAL_SUBNET-group of objects REMOTE_SUBNET

    Thank you

    Your configuration is correct, but I have a few comments.  Remember that NAT occurs before the delivery of your servers will be translated into 10.2.255.2 and 10.2.255.3 and then sent through the tunnel, so your encryption field is correct.

    Is your internet firewall as well? What your servers out of the internet?  They will be translated to 10.2.255.2 and 10.2.255.3 and who will fail in internet routing is.  If these servers access the internet through the firewall, I would recommend a configuration like this for each of your servers:

    network of the ServerA_NAT object

    Home 10.2.255.1

    NAT static ServerA ServerA_NAT destination (indoor, outdoor) static source REMOTE_SUBNET REMOTE_SUBNET

    This will use destination basic NAT for traffic VPN and NAT everything to a public IP address for the internet traffic.  Of course, if this is not your internet connection firewall can do abstraction.

  • Disable the NAT for VPN site-to-site

    Hello world

    I work in a company, and we had to make a VPN site-to site.

    Everything works fine, except that the packages sent to my site are translated, in other words: the firewall on the other site (site_B) see only the IP address of my firewall (Site_A).

    I tried to solve the problem, but without success, I think that natives of VPN packets is the problem.

    Here is my current config running:

    ASA Version 8.3(2)

    !

    hostname ciscoasa

    enable password 9U./y4ITpJEJ8f.V encrypted

    passwd 2KFQnbNIdI.2KYOU encrypted

    names

    !

    interface Vlan1

    nameif inside

    security-level 100

    ip address 192.168.67.254 255.255.255.0

    !

    interface Vlan2

    nameif outside

    security-level 0

    ip address 41.220.X.Y 255.255.255.252 (External WAN public IP Address)

    !

    interface Ethernet0/0

    switchport access vlan 2

    !

    interface Ethernet0/1

    !

    interface Ethernet0/2

    !

    interface Ethernet0/3

    !

    interface Ethernet0/4

    !

    interface Ethernet0/5

    !

    interface Ethernet0/6

    !

    interface Ethernet0/7

    !

    ftp mode passive

    clock timezone CET 1

    object network obj_any

    subnet 0.0.0.0 0.0.0.0

    object network 41.220.X1.Y1

    host 41.220.X1.Y1

    object network NETWORK_OBJ_192.168.67.0_24

    subnet 192.168.67.0 255.255.255.0

    object network NETWORK_OBJ_172.19.32.0_19

    subnet 172.19.32.0 255.255.224.0

    object network 194.2.176.18

    host 194.2.XX.YY (External IP address public of the other site (Site_B))

    description 194.2.XX.YY

    access-list inside_access_in extended permit ip any any log warnings

    access-list inside_access_in extended permit ip object NETWORK_OBJ_172.19.32.0_19 object NETWORK_OBJ_192.168.67.0_24 log debugging

    access-list inside_access_in extended permit ip object 194.2.176.18 any log debugging

    access-list inside_access_in extended permit ip any object NETWORK_OBJ_172.19.32.0_19 log debugging

    access-list outside_1_cryptomap extended permit ip 192.168.67.0 255.255.255.0 172.19.32.0 255.255.224.0 log debugging

    access-list outside_1_cryptomap extended permit ip any object NETWORK_OBJ_172.19.32.0_19 log debugging

    access-list 1111 standard permit 172.19.32.0 255.255.224.0

    access-list 1111 standard permit 192.168.67.0 255.255.255.0

    access-list outside_1_cryptomap_1 extended permit ip 172.19.32.0 255.255.224.0 any log debugging

    access-list outside_1_cryptomap_1 extended permit ip any object NETWORK_OBJ_172.19.32.0_19 log debugging

    access-list outside_1_cryptomap_2 extended permit ip 192.168.67.0 255.255.255.0 172.19.32.0 255.255.224.0 log debugging

    access-list outside_1_cryptomap_2 extended permit ip any object NETWORK_OBJ_172.19.32.0_19 log debugging

    access-list outside_access_in extended permit ip any any log warnings

    access-list outside_access_in extended permit ip object 194.2.XX.YY any log debugging

    access-list outside_access_in extended permit ip any object NETWORK_OBJ_172.19.32.0_19 log debugging

    access-list nonat extended permit ip 192.168.67.0 255.255.255.0 176.19.32.0 255.255.224.0

    access-list nonat extended permit ip 192.168.67.0 255.255.255.0 172.19.32.0 255.255.224.0

    pager lines 24

    logging enable

    logging monitor informational

    logging asdm warnings

    mtu inside 1500

    mtu outside 1500

    icmp unreachable rate-limit 1 burst-size 1

    icmp permit any inside

    icmp permit any outside

    no asdm history enable

    arp timeout 14400

    nat (inside,outside) source dynamic any interface

    nat (inside,outside) source static NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_192.168.67.0_24 destination static NETWORK_OBJ_172.19.32.0_19 NETWORK_OBJ_172.19.32.0_19

    access-group inside_access_in in interface inside

    access-group outside_access_in in interface outside

    route outside 0.0.0.0 0.0.0.0 41.220.X.Y 1

    timeout xlate 3:00:00

    timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02

    timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00

    timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00

    timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute

    timeout tcp-proxy-reassembly 0:01:00

    dynamic-access-policy-record DfltAccessPolicy

    aaa authentication ssh console LOCAL

    aaa authentication telnet console LOCAL

    http server enable

    http 192.168.67.0 255.255.255.0 inside

    http 0.0.0.0 0.0.0.0 outside

    no snmp-server location

    no snmp-server contact

    snmp-server enable traps snmp authentication linkup linkdown coldstart

    crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac

    crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac

    crypto ipsec security-association lifetime seconds 28800

    crypto ipsec security-association lifetime kilobytes 4608000

    crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-DES-MD5

    crypto map outside_map 1 match address outside_1_cryptomap_2

    crypto map outside_map 1 set peer 194.2.XX.YY

    crypto map outside_map 1 set transform-set ESP-DES-MD5

    crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

    crypto map outside_map interface outside

    crypto map inside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP

    crypto map inside_map interface inside

    crypto isakmp enable inside

    crypto isakmp enable outside

    crypto isakmp policy 10

    authentication pre-share

    encryption des

    hash md5

    group 2

    lifetime 86400

    telnet 192.168.67.200 255.255.255.255 inside

    telnet timeout 5

    ssh 0.0.0.0 0.0.0.0 outside

    ssh timeout 30

    console timeout 0

    dhcpd auto_config outside

    !

    threat-detection basic-threat

    threat-detection statistics access-list

    no threat-detection statistics tcp-intercept

    webvpn

    username bel_md password HSiYQZRzgeT8u.ml encrypted privilege 15

    username nebia_said password qQ6OoFJ5IJa6sgLi encrypted privilege 15

    tunnel-group 194.2.XX.YY type ipsec-l2l

    tunnel-group 194.2.XX.YY ipsec-attributes

    pre-shared-key *****

    !

    class-map inspection_default

    match default-inspection-traffic

    !

    !

    policy-map type inspect dns preset_dns_map

    parameters

    message-length maximum client auto

    message-length maximum 512

    policy-map global_policy

    class inspection_default

    inspect dns preset_dns_map

    inspect ftp

    inspect h323 h225

    inspect h323 ras

    inspect rsh

    inspect rtsp

    inspect esmtp

    inspect sqlnet

    inspect skinny

    inspect sunrpc

    inspect xdmcp

    inspect sip

    inspect netbios

    inspect tftp

    inspect ip-options

    inspect icmp

    inspect ipsec-pass-thru

    !

    service-policy global_policy global

    prompt hostname context

    Cryptochecksum:0398876429c949a766f7de4fb3e2037e

    : end

    If you need any other information or explanation, just ask me.

    My firewall model: ASA 5505

    Thank you for the help.

    Hey Houari,.

    I suspect something with the order of your NATing statement which is:

    NAT (inside, outside) static static source NETWORK_OBJ_172.19.32.0_19 destination NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_172.19.32.0_19

    Can you please have this change applied to the ASA:

    No source (indoor, outdoor) nat static static NETWORK_OBJ_172.19.32.0_19 destination NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_172.19.32.0_19

    NAT (inside, outside) 1 static source NETWORK_OBJ_192.168.67.0_24 NETWORK_OBJ_192.168.67.0_24 static destination NETWORK_OBJ_172.19.32.0_19 NETWORK_OBJ_172.19.32.0_19

    Try and let me know how it goes.

    If she did not help, please put the output form a package tracer will shape your internal network to the remote VPN subnet with the release of «see the nat detail»

    HTH,

    Mo.

  • IP common in client IPSec VPN and VPN site to site

    Hello

    We have a scenario where the Cisco ASA 5505 will be one of the ends of a site to site VPN. The same ASA 5505 also allows the Client VPN connection. The issue is around the pooling of intellectual property.

    If I assign a pool of IP addresses (192.168.1.20 - 192.168.1.30) for connections VPN Client - do I need to be sure that these same IP are not used across the site to site VPN?

    There may be a PC / servers running 192.168.1.0/24 on the other side of the site to site VPN. This would lead to an address conflict?

    "

    I have attached a diagram of the scenario. I would like to know if the 'orange' PC would cause an IP conflict if they get the same IP that PC "blue color" - even if one of them is the VPN client and the other is VPN site-to-site

    Thank you.

    Altogether. The pool of the VPN Client must be single subnet which is not anywhere within your network.

  • NAT and vpn acl

    Hello

    I have asa 5512-x

    ASA 9.1 version 2

    ASDM version 7.2 (1)

    I'm not really good with a syntax of cisco, so I use asdm

    I created a split tunnel remote ipsec vpn with cisco vpn client

    the purpose is to allow vpn for LAN traffic

    and to allow the vpn to a public Web site traffic

    so I set the two objects and added to the exemption of split tunnel (the names of the objects: 'LAN', 'Rackspace')

    access to the local network is ok, access to a Web site does not work

    I guess I have some missing nat/ACL,

    can someone explain to me please in the most simple way to do this?

    Thank you very much

    Hello

    What is subnet

    network of the NETWORK_OBJ_172.18.0.0_26 object
    255.255.255.192 subnet 172.18.0.0

    This 'nat' configuration seems strange

    NAT (LAN, WAN1) source static Tunnel VPN VPN Tunnel static destination NETWORK_OBJ_172.18.0.0_26 NETWORK_OBJ_172.18.0.0_26 non-proxy-arp-search to itinerary

    When you see that the source for the "nat" interface is 'LAN' and source networks are those configured under "Tunnel VPN" it seems to suggest that this NAT configuration transmits traffic destined to 'LAN' and 'rackspace' to the 'LAN' interface. It is naturally very good for the subnet configured under 'LAN' , but the 'rackspace' to my knowledge is located behind an external interface of the ASA correct? But I guess I really need to know this as the subnet that I mentioned at the beginning of the post (which is used in this configuration NAT too)

    What is the interface to which the VPN users connect to? WAN1 or DSL? Although the following list what the map interface Crypto is attached

    See the crypto run map

    You can also list the output of the following command

    See the establishment of performance ip local pool

    -Jouni

  • Access to services: conflict NAT and VPN

    Hi people!

    I encountered a problem with external access to local services of:
    (a) remote clients (port open on the side WAN)
    (b) the remote sites (through IPsec tunnels)

    Here's a topology:

    EXPLANATIONS

    FW1 (actually from TMG 2010) overload NAT of preforms.

    The service in question (for example tcp 9999) is published on 192.168.100.0/24 via static NAT translation, which is accessible from the network.

    HQ1 is a border router (cisco 2921). It also performs NAT overload for public addresses. (Other than cisco) Branch1 also performs NAT overload.

    All traffic between the headquarters and the remote site is allowed. The service is accessible from the remote site.

    PROBLEM

    I want to allow access to the service for an external user (remote user). I do the following configuration:

    IP nat inside source static tcp 192.168.100.2 2.2.2.2 9999 9999 extensible

    After this command remote user is able to access the service by public IP, BUT the site's users remote losing it. If I roll back with

    No nat ip inside the source static tcp 192.168.100.2 2.2.2.2 9999 9999 extensible

    then access to the remote site is restored, and remote user lose again. Seems that it is connected with the static NAT translations.

    How can I make it work in both cases of simulteniously? Both for the remote site and the remote user.

    Thank you!

    You must use a map of the route with your static NAT configuration.

    Recently answered a question for the same thing, please visit this link and if you have any questions please come back.

    https://supportforums.Cisco.com/discussion/12544291/IPSec-IP-NAT-inside-source-static

    Jon

  • Help without NAT and VPN Config DMZ.

    Before VPN, we miss with 'nonatdmz '. Recently, we tried to implement the solution VPN using "VPNRA".

    ASA IOS would only you are using a "NAT 0" at a time, how do you get around that.

    TIA

    nonatdmz list of allowed ip extended access any 192.168.100.0 255.255.255.0

    NAT (inside) 0-list of access nonatdmz

    Access extensive list ip 172.0.0.0 VPNRA allow 255.0.0.0 10.17.70.0 255.255.255.0

    NAT (inside) 0-list of access VPNRA

    You can add several lines to you nonatdmz access-list: for example:

    nonatdmz list of allowed ip extended access any 192.168.100.0 255.255.255.0

    access extensive list ip 172.0.0.0 nonatdmz allow 255.0.0.0 10.17.70.0 255.255.255.0

    NAT (inside) 0-list of access nonatdmz

  • PAT/NAT and VPN through a PIX

    "PPTP through the PIX with Port address translation (PAT) does not work because there is no concept of ports in GRE"-this is an excerpt from a config PIX version 6.2 and below.

    1. how this problem has been fixed in 6.3? GRE is encapsulated in udp or tcp to use ports to follow the connection?

    2. is it "fixup protocol esp-ike" use the same technology - the source port created by the IKE protocol? -ISAKMP cannot be enabled when you use this command

    3. What is "isakmp nat-traversal? How is this different from fixup protocol esp-ike"

    Thank you

    RJ

    1. when the PIX sees outgoing PPTP (TCP 1723 port) packets it now opens holes for them to return, as well as opening a hole for the GRE packets, it has never done this before. The PPTP TCP packets can be PAT would be fine because they are TCP packets. GRE packets, I believe, are followed by the id field only tunnel in the package.

    2. we use the source port of the ISAKMP packet for ESP packets as well. The current limitation is that if you have this option, you cannot use the PIX to close the IPSec sessions, so you can not turn on ISAKMP any interface. You can also have only a single IPSec client internal to use this feature.

    3 NAT - T is a new standard for IPSec to work through a NAT device peers, because they detect changes of address during the negotiation of tunnel and automatically encapsulate packets in UDP 4500. This market allows the PIX and the other device (if it supports it) to automatically detect a NAT/PAT device between them. This differs from the "esp - ike correction '' that the PIX ends not in fact the IPSec tunnel with esp - ike, but it is the endpoint in nat - t.

  • problem with Ezvpn and VPN from Site to Site

    Hello

    I want to set Ezvpn and VPN Site to another but the problem is that the EasyVpn that would only work at the Site to the Site does not at all

    I have set up 1 card for two VPN with different tagged crypto

    I had execlude the traffice to NOT be natted to, and when I remove the Ezvpn site to another work well

    crypto ISAKMP policy 100
    BA aes
    md5 hash
    preshared authentication
    Group 2
    !
    crypto ISAKMP policy 10000
    BA aes 256
    preshared authentication
    Group 5
    key address 123456 crypto isakmp (deleted)

    ISAKMP crypto client configuration group easyvpn
    easyvpn key
    domain ezvpn
    pool easyvpn
    ACL easyvpn
    Save-password
    Split-dns cme
    MAX User 9
    netmask 255.255.255.0
    !

    Crypto ipsec transform-set esp - aes 256 esp-sha-hmac vpn

    Crypto-map dynamic easyvpn 10
    Set transform-set dmvpn
    market arriere-route
    !
    !
    address-card crypto easyvpn local Dialer1
    card crypto client easyvpn of authentication list easyvpn
    card crypto isakmp authorization list easyvpn easyvpn
    client configuration address card crypto easyvpn answer
    easyvpn 100 card crypto ipsec-isakmp dynamic easyvpn
    easyvpn 1000 ipsec-isakmp crypto map
    defined by the peers (deleted)
    Set transform-set vpn
    game site address

    interface Dialer1
    the negotiated IP address
    IP mtu 1492
    NAT outside IP
    IP virtual-reassembly
    encapsulation ppp
    Dialer pool 1
    PPP authentication chap callin pap
    PPP chap hostname
    PPP chap password
    PPP pap sent-name to user
    easyVPN card crypto

    DSL_ACCESSLIST extended IP access list
    deny ip 100.0.0.0 0.0.0.255 101.1.1.0 0.0.0.255
    deny ip 100.0.0.0 0.0.0.255 70.0.0.0 0.0.0.255
    IP 100.0.0.0 allow 0.0.0.255 any
    refuse an entire ip
    easyvpn extended IP access list
    IP 100.0.0.0 allow 0.0.0.255 70.0.0.0 0.0.0.255
    IP extended site access list
    IP 100.0.0.0 allow 0.0.0.255 101.1.1.0 0.0.0.255

    Best regards

    The sequence number of card crypto for the static mapping crypto (site to site vpn) should be higher (ie: sequence number must be lower) than the ezvpn (map dynamic crypto).

    In your case, you must configure as follows:

    map easyvpn 10 ipsec-isakmp crypto
    defined by the peers (deleted)
    Set transform-set vpn
    game site address

    map easyvpn 150 - ipsec-isakmp crypto dynamic easyvpn

    Hope that solves this problem.

  • Router vpn site to site PIX and vpn client

    I have two on one interface on the pix vpn connections that terminate VPN. client vpn and VPN site-to-site have passed phase one and two and decrypt and encrypt the packets. However as in another post I can not ping through the l2l vpn. I checked this isn't a nat problem a nd two NAT 0 on the pix and the NAT on the router access lists work correctly.

    ISAKMP crypto RTR #show its
    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    66.x.x.x 89.x.x.x QM_IDLE 2001 0 ACTIVE

    IPv6 Crypto ISAKMP Security Association

    local ident (addr, mask, prot, port): (192.168.2.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.10.0/255.255.255.0/0/0)
    current_peer 66.x.x.x port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 23583, #pkts encrypt: 23583 #pkts digest: 23583
    #pkts decaps: 18236, #pkts decrypt: 18236, #pkts check: 18236
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 40, #recv errors 0

    local crypto endpt. : 89.x.x.x, remote Start crypto. : 66.x.x.x
    Path mtu 1380, ip mtu 1380, ip mtu BID Dialer0
    current outbound SPI: 0xC4BAC5E (206285918)

    SAS of the esp on arrival:
    SPI: 0xD7848FB (225986811)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 3, flow_id: Motorola SEC 1.0:3, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4573083/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0xC4BAC5E (206285918)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 4, flow_id: Motorola SEC 1.0:4, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4572001/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:

    Expand the IP NAT access list
    10 deny ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255 (21396 matches)
    20 permit ip 192.168.2.0 0.0.0.255 everything (362 matches)
    Expand the IP VPN_ACCESS access list
    10 permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 (39724 matches)

    I looked on the internet and that it points to a routing error when packets are being encrypted and decrypted, but you can't do a ping on the binding. However when I test the connection I did not enter any of the static routes that networks are connected directly on each side of the pix and the router. any help would be a preciated as I think there's maybe something is blocking the ping to reach the internal network at the end of pix with a configured access list.

    is ping failure of the only thing between the site to site VPN? and assuming that all other traffic works fine since it decrypts and encrypts the packets.

    If it's just ping, then activate pls what follows on the PIX:

    If it is version 6.3 and below: fixup protocol icmp

    If it is version 7.0 and higher: select "inspect icmp" under your political map of the world.

    Config complete hand and on the other could help determine if it's a configuration problem or another problem.

  • VPN site to Site IDLE-UP and no traffic...

    Hello

    I have two Office (hand and brach) each with a router cisco 887 15.3 with s + ios k9

    I have configured the vpn client (works without any problem at all) and a site to site VPN.

    The tunnel between main and the site of the direction is up (according to sh cry session and sh crypto isakamp her) but I can't send traffic from one site to another and the condition of the tunnel is still 'IDLE-UP '.

    (address removed)

    MAIN SITE

    Interface: Dialer0
    The session state: IDLE-UP
    Peer: Port of 500 intellectual PROPERTY branch
    Session ID: 0
    IKEv1 SA: active local
    FLOW IPSEC: allowed ip 10.0.0.0/255.255.255.0 192.168.1.0/255.255.255.0
    Active sAs: 0, origin: card crypto

    IPv4 Crypto ISAKMP Security Association
    DST CBC conn-State id
    QM_IDLE 2009 ACTIVE

    Interface: Dialer0
    Tag crypto map: clientmap, local addr

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (10.0.0.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.1.0/255.255.255.0/0/0)
    current_peer port 500
    PERMITS, flags = {origin_is_acl, ipsec_sa_request_sent}
    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 458, #recv errors 0

    endpt local crypto. :, remote Start crypto. :
    clearly, mtu 1500, path mtu 1500, ip mtu 1500 ip mtu BID Dialer0
    current outbound SPI: 0x0 (0)
    PFS (Y/N): N, Diffie-Hellman group: no

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    GENERAL MANAGEMENT OF THE

    Interface: Dialer0
    The session state: IDLE-UP
    Peer: HAND IP port 500
    Session ID: 0
    IKEv1 SA: active local
    FLOW IPSEC: allowed ip 10.0.0.0/255.255.255.0 192.168.1.0/255.255.255.0
    Active sAs: 0, origin: card crypto

    Crypto isakmp HS her
    IPv4 Crypto ISAKMP Security Association
    DST CBC conn-State id
    QM_IDLE 2012 ASSETS

    SH crypto ipsec his

    Interface: Dialer0
    Tag crypto map: clientmap, local addr

    protégé of the vrf: (none)
    local ident (addr, mask, prot, port): (192.168.1.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (10.0.0.0/255.255.255.0/0/0)
    current_peer 79.0.238.28 port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: encrypt 0, #pkts: 0, #pkts digest: 0
    #pkts decaps: 0, #pkts decrypt: 0, #pkts check: 0
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 30, #recv errors 0

    endpt local crypto. :, remote Start crypto. :
    clearly, mtu 1500, path mtu 1500, ip mtu 1500 ip mtu BID Dialer0
    current outbound SPI: 0x0 (0)
    PFS (Y/N): N, Diffie-Hellman group: no

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    Set both the sh run CONF.
    I see no problem with peer and ACL configuration for nat and traffic

    Thanks for any help.

    I'm not for some without seeing a cry of debugging IPsec, but I think you can be matching your dynamic map first with a seq of 10.  I would try delete and assigning to 100 or something on both sides.  Disable sessions and try again.

    No map clientmap 10-isakmp ipsec crypto dynamic dynmap

    100 ipsec-isakmp crypto map clientmap Dynamics dynmap

    Claire crying its

    Disable the IPsec Security Association cry

    HTH

  • Cisco ASA VPN Site to Site WITH NAT inside

    Hello!

    I have 2 ASA 5505 related to IPSEC Tunnel VPN Site to Site.

    A 192.168.1.0/24 'remotely' inside the network and a local "192.168.200.0/24' inside the network (you can see the diagram)

    The local host have 192.168.200.254 as default gateway.

    I can't add static route to all army and I can't add static route to 192.168.200.254.

    NAT the VPN entering as 192.168.200.1 or a 192.168.200.x free to connect my host correcly?

    If my host sends packet to exit to the default gateway.

    Thank you for your support

    Best regards

    Marco

    The configuration must be applied on the SAA with the 192.168.200.0 subnet it is inside, there must be something like this:

    permit 192.168.1.0 ip access list VPN_NAT 255.255.255.0 192.168.200.0 255.255.255.0

    NAT (outside) X VPN_NAT outside access list

    Global (inside) X Y.Y.Y.Y (where the Y.Y.Y.Y) is the ip address

    If you have other traffic on the vpn through the tunnel that requires no nat, then you must add external nat exemption rules since these lines above obliges all traffic through the asa to have a nat statement.

    See if it works for you, else post your config nat here.

  • Tunnel VPN remote Internet and VPN remote VPN from Site to Site traffic?

    Hello

    We try to remote traffic from our users VPN tunnel through our ASA 5510 as well as to allow the only access for remote user VPN traffic to the other end of the all our VPN site-to-site connected to the same ASA. Basically, we who want to VPN in the network in order to access all of our networks business. We try to get away with this without using split Tunneling.

    I can currently get internal traffic from the remote user VPN to reach all other vpn site-to-site tunnels without the internet in tunnel. The problem is when I add the following statement to the NAT:

    NAT (outside) 1 10.10.19.0 255.255.255.0 * 10.10.19.0 is the address of the remote VPN Client

    Internet traffic to the remote VPN starts to get in the tunnel, but I lose the opportunity to reach one of the other tunnels from site to site by the remote VPN tunnel.

    I also begin to receive the following errors in the journal of the ASA

    3 July 1, 2009 12:34:18 305005 10.10.19.255 137 no group of translation not found for udp src outside:10.10.19.3/137 dst outside:10.10.19.255/137

    Any help with how NAT statements must be defined for this work would be appreciated.

    Thank you

    Will be

    Will,

    the link of this post for your scenario of vpn hub & speak reference, you problem may be on exempt nat rules.

    Have a second look at your sheep rules.

    Be sure to eliminate tunnel rules related to rheumatoid arthritis, as appropriate, to not let him get in the way of splitting.

    http://forums.Cisco.com/eForum/servlet/NetProf?page=NetProf&Forum=security&topic=firewalling&TopicId=.ee6e1fa&fromOutline=true&CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc2e0f6/4

    If always emits discribe topology for l2ls and info logic RA and sanatized hub config asa... but I think if you look at the thread above, you should be able to solve.

    Concerning

Maybe you are looking for

  • The MacBook Pro (MD101SO/A model) will get macOS Sierra?

    I plan to get a MacBook Pro or Mac Mini - before I spend more money on a MacBook Pro, I first need to know if it will be upgraded to macOS Sierra? The model number is MD101SO/A (if that will help you at all...)

  • LOCAL M40X-230 WIRELESS NETWORK PROBLEM

    I have a problem with the Wi - Fi connection. After initial startup of wireless lan, speed goes from 54 to 1 MB/s and then continues to jump around making me lose my internet connection. Thought it was the router at first but after 3 new routers, thi

  • bus FireWire disappeared

    I'm sitting here like a fool with a mental block full, unable to even begin to think where start to fix a FW that I had never heard about, much less known myself.  Mac user since the original MacPlus was released in 1980 thec. None of my FW drives ar

  • Stored procedure

    I can't using stored procedures and need advice. If I try to run the stored procedure code, I get an error saying that I not provided a required entry, but the LabVIEW looks I'm him. But I get this error message. The database table is as follows: @ID

  • How can I fix windows vista error, pshed.dll 0xc0000221 lack?

    I get this error for more than 2 weeks now.  I did not change anything or install/download anything. It says it is missing or damaged PSHED.dll error0xc0000221. I tried to use the vista disc to repair but it never works, it is said that he cannot fix