NAT over VPN Tunnel
I have a question about how the traffic is game and in what order to a tunnel L2L. See the attached diagram. Side ASA5520 I configured the 192.168.12.0/24 NAT 10.252.43.0/24 subnet addresses as follows:
Global (outside) 1 10.252.43.0 netmask 255.255.255.0
NAT (inside) 1 192.168.12.0 255.255.255.0
Now, I want to send traffic to the 192.168.12.0/24 subnet for the subnet 10.10.26.0/24 above the tunnel. Which addresses correspond to side ASA5520 of the tunnel?
I don't know if it should be:
to_pix525 to access extended list ip 192.168.12.0 allow 255.255.255.0 10.10.26.0 255.255.255.0
or
access extensive list ip 10.252.43.0 to_pix525 allow 255.255.255.0 10.10.26.0 255.255.255.0
Thank you
-mike
Please change the acl on nat0inside as follows:
nat0inside to access extended list ip 192.168.12.0 allow 255.255.255.0 10.10.26.0 255.255.255.0
Everything else is fine.
--
Robet
-Please rate the solutions.
Tags: Cisco Security
Similar Questions
-
We have VPN tunnel in our firewall with the other partner peer. We use ASA 5520 with IOS "asa825-k8" and ASDM version 6.4.
our partner has several services running in this tunnel VPN, including the SIP.
other services work very well only SIP connections cannot come.
the question is we allowed any IP service on the inside and outside interfaces, but this topic could not come to the top.
is - there any SIP over VPN option must be configured on ASA?
Hello
As you can see in the newspapers, it is denied to the inside interface.
If you just need to allow this by opening an ACL for this traffic on port 5060.
I would like to know if it works.
Kind regards
Aditya
Please evaluate the useful messages and mark the correct answers.
-
ASA 8.4 (1) source-nat over vpn site-to-site
I'm setting up a tunnel vpn site-to-site and require nat for the local and remote side. The remote side will be nat to
10.2.255.128/25 on their face before they reach our network, so I have to only source-nat our servers via the tunnel to them. Should I just do the static NAT, then let the whole subnet through the acl of valuable traffic as the config below? I don't think I should use twice a nat because I'm not trying to make the destination nat on the firewall. Servers with us will 10.2.255.128/25 and I would like to preserve it through the ASA.
network of the ServerA object
host 10.1.0.1
NAT 10.2.255.1 static (inside, outside)
network of the object server b
host 10.1.0.2
NAT 10.2.255.2 static (inside, outside)
the object server c network
host 10.1.0.3
NAT 10.2.255.3 static (inside, outside)
the LOCAL_SUBNET object-group network
object-network 10.2.255.0 255.255.255.128
the REMOTE_SUBNET object-group network
object-network 10.2.255.128 255.255.255.128
VPN_ACL list extended access permitted ip object-group LOCAL_SUBNET-group of objects REMOTE_SUBNET
Thank you
Your configuration is correct, but I have a few comments. Remember that NAT occurs before the delivery of your servers will be translated into 10.2.255.2 and 10.2.255.3 and then sent through the tunnel, so your encryption field is correct.
Is your internet firewall as well? What your servers out of the internet? They will be translated to 10.2.255.2 and 10.2.255.3 and who will fail in internet routing is. If these servers access the internet through the firewall, I would recommend a configuration like this for each of your servers:
network of the ServerA_NAT object
Home 10.2.255.1
NAT static ServerA ServerA_NAT destination (indoor, outdoor) static source REMOTE_SUBNET REMOTE_SUBNET
This will use destination basic NAT for traffic VPN and NAT everything to a public IP address for the internet traffic. Of course, if this is not your internet connection firewall can do abstraction.
-
Hello
I just want to ask if it is possible to NAT pool users to remote access ip VPN to the router is outside the IP address? The router is a Cisco1841.
Thank you!
Patricia,
Are you referring to Polo your RA IP pool using your external interface just like you with your LAN subnets in ip nat overload?, if so this link illustrates similar example using the road map, PLS let know us if this isn't what you're looking for and if you could perhaps develop as that is what you try to accomplish.
Concerning
-
I have a site (my ASA) vpn to the site (provider) with a nat on the external interface device and work well. Rear (my ASA) VPN I have other site vpn (service A) for the site (my ASA) and work as well.
My problem is the traffic of my branch A provider is clearly have no nat.
My ASA
object-group network attached
object-network 192.168.1.0 255.255.255.0
object-group network provider
network-object 172.22.0.0 255.255.0.0
the allmyBranch object-group network
object-network 192.168.0.0 255.255.0.0extended inside permit access list ip object-group reteInside-group of objects plugged
access list inside extended permit ip object-group allmyBranch-provider objects
allowed to access extensive ip list nat0_acl object-group reteInside-group of objects plugged
list of access VPN-Hots extended permitted ip object-group reteInside-group of objects plugged
list of access VPN-provider allowed extended ip outside of the provider object-group interface
list of access VPN-provider allowed extended ip object-group allmyBranch-provider objects
permit ToSupplier to access extended ip object-group allmyBranch-group of objects provider listGlobal 1 interface (outside)
NAT (inside) 0-list of access nat0_acl
NAT (inside) 1 access-list ToSupplierdo you have any idea how solve it? is this possible?
Thank you
I'm glad to hear that.
If the problem is resolved and that you find it useful, if Please assess the threat and mark it as answered :-)
Thank you.
Federico.
-
NAT, ASA, 2 neworks and a VPN tunnel
Hello. I have a following question. I am trying to establish a VPN tunnel to a remote network used to be connected to our via a VPN tunnel. The problem is that the previous tunnel their share has been created for the x.x.x.x our coast network which will serve no more time a month, but is currently still active and used. As I'm trying to get this VPN tunnel as soon as possible without going through all the paperwork on the other side (political, don't ask) is it possible to make NAT of the new network in the network x.x.x.x for traffic through the VPN tunnel.
Something like this:
new network-> policy NAT in old x.x.x.x fork on ASA-> VPN tunnel to the remote network using x.x.x.x addresses
It is possible to add the new policy, but sometimes it can conflict with the former.
-
I have read on several posts on the topic and still think I'm missing something, I'm looking for help.
Basically, I'm now implementing multiple VPN tunnels for external connections. We strive to keep the external "private addresses" our basic using NAT network.
I can get the Tunnel to work without problems using the ACL SHEEP; However, this technique requires that our internal network is aware of their external addresses "private." Our goal is to enter an address on the inside that is NAT to the external address 'private' and then shipped via the VPN tunnel. Basically to hide the external address 'private' of our internal systems that they would appear as thought the connection was one of our own networks.
The reverse is true coming from their external 'private' network. Any information of "their" private network external origin would result in our 'private' on arrival address space.
Is this possible? I am attaching a schema, which could help.
Hello
Yes, this should be possible. Lets say you allocate 10.112.2.250 as the address that you use to present the external server 192.168.10.10.
On your ASA device
public static 10.112.2.250 (exterior, Interior) 192.168.10.10 netmask 255.255.255.255
You will need to make sure that when the system tries to connect to 10.112.2.250 it is routed to the device of the SAA.
HTH
Jon
-
Making the NAT for VPN through L2L tunnel clients
Hi.I has the following situation in my network. We need for users who log on our site with the VPN clients to connect to another site via a tunnel L2L. The problem is that I need NAT addresses from the pool of VPN client in another beach before going on the L2L tunnel because on the other side, we have duplication of networks.
I tried to do NAT with little success as follows:
ACL for pool NAT of VPN:
Extended list ip 192.168.253.0 access TEST allow 255.255.255.0 192.168.0.0 255.255.255.0
Extended list ip 192.168.253.0 access TEST allow 255.255.255.0 192.168.5.0 255.255.255.0
NAT:
Global 172.20.105.1 - 172.20.105.254 15 (outdoor)
NAT (inside) 15 TEST access-list
CRYPTO ACL:
allowed ro access list extended LAN ip 255.255.0.0 192.168.0.0 255.255.255.0
allowed ro access list extended LAN ip 255.255.0.0 192.168.5.0 255.255.255.0
IP 172.20.105.0 RO allow extended access list 255.255.255.0 192.168.0.0 255.255.255.0
IP 172.20.105.0 RO allow extended access list 255.255.255.0 192.168.5.0 255.255.255.0
permit same-security-traffic intra-interface
Am I missing something here? Something like this is possible at all?
Thanks in advance for any help.
We use the ASA 5510 with software version 8.0 (3) 6.
You need nat to the outside, not the inside.
NAT (outside) 15 TEST access-list
-
NAT VPN tunnel and still access Internet traffic
Hello
Thank you in advance for any help you can provide.
I have a server with the IP 192.168.1.9 that needs to access a subnet remote from 192.168.50.0/24, through the Internet. However, before the server can access the remote subnet, the server IP must be NAT'ed to 10.1.0.1 because the VPN gateway remote (which is not under my control) allows access to other customers who have the same subnet address that we do on our local network.
We have a 2801 Cisco (running c2801-advsecurityk9 - mz.124 - 15.T9.bin) set up to make the NAT. It is the only gateway on our network.
I have configured the Cisco 2801 with the following statements of NAT and the relevant access lists:
access-list 106 allow host ip 192.168.1.9 192.168.50.0 0.0.0.255
NAT extended IP access list
refuse the host ip 192.168.1.9 192.168.50.0 0.0.0.255
deny ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
ip permit 192.168.1.0 0.0.0.255 anyroute allowed ISP 10 map
corresponds to the IP NATIP nat EMDVPN 10.1.0.1 pool 10.1.0.1 netmask 255.255.255.0
IP nat inside source list 106 pool EMDVPN
IP nat inside source map route ISP interface FastEthernet0/1 overloadWhen the server (192.168.1.9) attempts to ping on the subnet of 192.168.50.0/24 devices, the VPN tunnel is established successfully. However, after that, the server is no longer able to access the Internet because the NAT translation for 192.168.1.9 has changed since the external IP address of the router (FastEthernet0/1) at 10.1.0.1.
The documentation I've seen on the site of Cisco says that this type of Setup allows only host subnet communication. Internet access is not possible. However, maybe I missed something, or one of you experts can help me. Is it possible to configure the NAT router traffic destined to the VPN tunnel and still access the Internet by using the dynamic NAT on FastEthernet0/1?
Once again, thank you for any help you can give.
Alex
Hello
Rather than use a pool for NAT
192.168.1.9 - 10.1.0.1 > 192.168.50.x
ACL 102 permit ip 192.168.1.9 host 192.168.50.0 0.0.0.255
RM-STATIC-NAT route map permit 10
corresponds to the IP 102IP nat inside source static 192.168.1.9 10.1.0.1 card expandable RM-STATIC-NAT route
ACL 101 deny host ip 192.168.1.9 192.168.50.0 0.0.0.255
ACL 101 by ip 192.168.1.0 0.0.0.255 any
overload of IP nat inside source list 101 interface FastEthernet0/1VPN access list will use the source as 10.1.0.1... *.
Let me know if it works.
Concerning
M
-
NAT before going on a VPN Tunnel Cisco ASA or SA520
I have a friend who asked me to try to help. We are established VPN site to site with a customer. Our camp is a Cisco sa520 and side there is a control point. The tunnel is up, we checked the phase 1 and 2 are good. The question is through the tunnel to traffic, our LAN ip address are private addresses 10.10.1.0/24 but the client says must have a public IP address for our local network in order to access that server on local network there. So, in all forums, I see that you cannot NAT before crossing the VPN tunnel, but our problem is that our site has only 6 assigned IP addresses and the comcast router, on the side of the firewall SA520 WAN. So we were wondering was there a way we can use the WAN on the SA520 interface or use another available 6 who were assigned to the NAT traffic and passes through the tunnel. That sounds confusing to you? Sorry, but it's rarely have I a customer say that I must have a public IP address on my side of the LAN. Now, I say this is a SA520 firewall, but if it is not possible to do with who he is a way were able with an ASA5505?
Help or direction would be very useful.
Hello
I guess I could quickly write a basic configuration. Can't be sure I remember all correctly. But should be the biggest part of it.
Some of the course settings may be different depending on the type of VPN L2L connection settings, you have chosen.
Naturally, there are also a lot of the basic configuration which is not mentioned below.
For example
- Configurations management and AAA
- DHCP for LAN
- Logging
- Interface "nonstop."
- etc.
Information for parameters below
- x.x.x.x = ASA 'outside' of the public IP interface
- y.y.y.y = ASA "outside" network mask
- z.z.z.z = ASA "outside" IP address of the default gateway
- a.a.a.a = the address of the remote site VPN L2L network
- b.b.b.b = mask of network to the remote site VPN L2L
- c.c.c.c = IP address of the public peer device VPN VPN L2L remote site
- PSK = The Pre Shared Key to connect VPN L2L
Interfaces - Default - Access-list Route
interface Vlan2
WAN description
nameif outside
security-level 0
Add IP x.x.x.x y.y.y.y
Route outside 0.0.0.0 0.0.0.0 z.z.z.z
interface Ethernet0
Description WAN access
switchport access vlan 2
- All interfaces are on default Vlan1 so their ' switchport access vlan x "will not need to be configured
interface Vlan1
LAN description
nameif inside
security-level 100
10.10.1.0 add IP 255.255.255.0
Note to access the INSIDE-IN list allow all local network traffic
access to the INTERIOR-IN ip 10.10.1.0 list allow 255.255.255.0 any
group-access INTERIOR-IN in the interface inside
Configuring NAT and VPN L2L - ASA 8.2 software and versions prior
Global 1 interface (outside)
NAT (inside) 1 10.10.1.0 255.255.255.0
Crypto ipsec transform-set AES-256 aes-256-esp esp-sha-hmac
crypto ISAKMP policy 10
preshared authentication
aes-256 encryption
sha hash
Group 2
lifetime 28800
L2L-VPN-CRYPTOMAP of the access list allow ip x.x.x.x a.a.a.a b.b.b.b host
card crypto WAN-CRYPTOMAP 10 matches L2L-VPN-CRYPTOMAP address
card crypto WAN-CRYPTOMAP 10 set peer c.c.c.c
card crypto WAN-CRYPTOMAP 10 the value transform-set AES-256
card crypto WAN-CRYPTOMAP 10 set security-association second life 3600
CRYPTOMAP WAN interface card crypto outside
crypto isakmp identity address
crypto ISAKMP allow outside
tunnel-group c.c.c.c type ipsec-l2l
tunnel-group c.c.c.c ipsec-attributes
pre-shared key, PSK
NAT and VPN L2L - ASA 8.3 software configuration and after
NAT source auto after (indoor, outdoor) dynamic one interface
Crypto ipsec transform-set ikev1 AES-256 aes-256-esp esp-sha-hmac
IKEv1 crypto policy 10
preshared authentication
aes-256 encryption
sha hash
Group 2
lifetime 28800
L2L-VPN-CRYPTOMAP of the access list allow ip x.x.x.x a.a.a.a b.b.b.b host
card crypto WAN-CRYPTOMAP 10 matches L2L-VPN-CRYPTOMAP address
card crypto WAN-CRYPTOMAP 10 set peer c.c.c.c
card crypto WAN-CRYPTOMAP 10 set transform-set AES-256 ikev1
card crypto WAN-CRYPTOMAP 10 set security-association second life 3600
CRYPTOMAP WAN interface card crypto outside
crypto isakmp identity address
Crypto ikev1 allow outside
tunnel-group c.c.c.c type ipsec-l2l
tunnel-group c.c.c.c ipsec-attributes
IKEv1 pre-shared key, PSK
I hope that the above information was useful please note if you found it useful
If it boils down to the configuration of the connection with the ASA5505 and does not cut the above configuration, feel free to ask for more
-Jouni
-
Impossible to achieve secondary with VPN tunnel
Hello
I configured a Cisco Pix Firewall to my VPN tunnels and which works fine when I connect to the local network where the Pix is connected.
When I want to communicate with a server on a secondary location over the vpn tunnel I get no response.
The pix can ping the server, but I can't ping the server via the vpn tunnel rooms
PIX from IP 10.1.0.254
Router 10.1.10.254 IP address
Secondary router IP address 10.2.10.254
Secondary server IP address 10.2.0.1
The default gateway on the local network is 10.1.10.254
This router is a gre tunnel 3 of to 10.2.10.254
On this router, there is a default route for the pix (for internet).
Hello...
Make sure that you send the IP pool configured on the PIX of the secondary router/server. just try to ping the IP address that the VPN client is obtained from the server...
You must also make sure that you add this subnet secondary access sheep... otherwise list your ip pool will see the natted IP server...
on sheep access list, allow all traffic from the pool of secondary for the IP pool...
I hope this helps... all the best...
-
Try to send all traffic over VPN
Hello
I have a Cisco 871 router on my home cable modem connection. I am trying to set up a VPN, and I want to send all traffic over the VPN from connected clients (no split tunnel).
I can connect to the VPN and I can ping/access resources on my home LAN when I'm remote but access to the internet channels.
If its possible I would have 2 Configuration of profiles according to connection 1 connection sends all traffic to the vpn and the connection on the other split tunneling but for now, I'd be happy with everything just all traffic go via the VPN.
Here is my config.
10.10.10.xxx is my home network inside LAN
10.10.20.xxx is the IP range assigned when connecting to the VPN
FastEthernet4 is my WAN interface.
Kernel #show run
Building configuration...Current configuration: 4981 bytes
!
version 12.4
service configuration
no service button
tcp KeepAlive-component snap-in service
a tcp-KeepAlive-quick service
horodateurs service debug datetime localtime show-timezone msec
Log service timestamps datetime localtime show-timezone msec
encryption password service
sequence numbers service
!
hostname-Core
!
boot-start-marker
boot-end-marker
!
Security of authentication failure rate 3 log
Passwords security min-length 6
forest-meter operation of syslog messages
no set record in buffered memory
enable secret 5 XXXXX
!
AAA new-model
!
!
AAA authentication login default local
AAA authentication login ciscocp_vpn_xauth_ml_1 local
AAA authorization exec default local
AAA authorization ciscocp_vpn_group_ml_1 LAN
!
!
AAA - the id of the joint session
!
Crypto pki trustpoint Core_Certificate
enrollment selfsigned
Serial number no
IP address no
crl revocation checking
rsakeypair 512 Core_Certificate_RSAKey
!
!
string Core_Certificate crypto pki certificates
certificate self-signed 01
XXXXXXXXXXXXXXXXXXXXXXXXXXXXX
quit smoking
dot11 syslog
no ip source route
!
!
!
!
IP cef
no ip bootp Server
name of the IP-server 75.75.75.75
name of the IP-server 75.75.76.76
No ipv6 cef
!
Authenticated MultiLink bundle-name Panel
!
!
!
password username privilege 15 7 XXXXXXXXXXXXX XXXXXXXX
username secret privilege 15 XXXXXXXX XXXXXXXXXXXXX 5
!
!
crypto ISAKMP policy 1
BA 3des
preshared authentication
Group 2
!
crypto ISAKMP client configuration main group
key to XXXXXXX
DNS 75.75.75.75 75.75.76.76
pool SDM_POOL_3
Max-users 5
netmask 255.255.255.0
ISAKMP crypto ciscocp-ike-profile-1 profile
main group identity match
client authentication list ciscocp_vpn_xauth_ml_1
ISAKMP authorization list ciscocp_vpn_group_ml_1
client configuration address respond
virtual-model 1
!
!
Crypto ipsec transform-set esp-SHA-ESP-3DES-3des esp-sha-hmac
!
Profile of crypto ipsec CiscoCP_Profile1
game of transformation-ESP-3DES-SHA
set of isakmp - profile ciscocp-ike-profile-1
!
!
Crypto ctcp port 64444
Archives
The config log
hidekeys
!
!
synwait-time of tcp IP 10
property intellectual ssh time 60
property intellectual ssh authentication-2 retries
property intellectual ssh version 1
!
!
!
Null0 interface
no ip unreachable
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
Description $ETH - WAN$ $FW_OUTSIDE$
address IP dhcp client id FastEthernet4
no ip redirection
no ip unreachable
no ip proxy-arp
penetration of the IP stream
NAT outside IP
IP virtual-reassembly
automatic duplex
automatic speed
!
type of interface virtual-Template1 tunnel
Description $FW_INSIDE$
IP unnumbered FastEthernet4
no ip redirection
no ip unreachable
no ip proxy-arp
penetration of the IP stream
ipv4 ipsec tunnel mode
Tunnel CiscoCP_Profile1 ipsec protection profile
!
interface Vlan1
Description $FW_INSIDE$
IP 10.10.10.1 255.255.255.0
no ip redirection
no ip unreachable
no ip proxy-arp
penetration of the IP stream
IP nat inside
IP virtual-reassembly
!
local IP SDM_POOL_1 10.10.30.10 pool 10.10.30.15
local IP SDM_POOL_2 10.10.10.80 pool 10.10.10.85
local IP SDM_POOL_3 10.10.20.10 pool 10.10.20.15
IP forward-Protocol ND
IP route 0.0.0.0 0.0.0.0 permanent FastEthernet4
IP http server
access-class 2 IP http
local IP http authentication
no ip http secure server
!
!
the IP nat inside source 1 list the interface FastEthernet4 overload
!
Note category of access list 1 = 2 CCP_ACL
access-list 1 permit 10.10.5.0 0.0.0.255
access-list 1 permit 10.10.10.0 0.0.0.255
access-list 2 Note HTTP access class
Note access-list category 2 CCP_ACL = 1
access-list 2 allow 10.10.10.0 0.0.0.255
access-list 2 refuse any
not run cdp!
!
!
!
!
control plan
!
connection of the banner ^ CThis is a private router and all access is controlled and connected. ^ C
!
Line con 0
no activation of the modem
telnet output transport
line to 0
telnet output transport
line vty 0 4
access-class 2
entry ssh transport
!
max-task-time 5000 Planner
Scheduler allocate 4000 1000
Scheduler interval 500
endKernel #.
Thanks for your help!
Hi Joseph,.
You need a configuration like this:
customer pool: 10.10.20.0
local networkbehind router: 10.10.10.0
R (config) #ip - list extended access 101
R (config-ext-nacl) 10.10.20.0 ip #deny 0.0.0.255 10.10.10.0 0.0.0.255
R (config-ext-nacl) 10.10.20.0 ip #permit 0.0.0.255 anytype of interface virtual-Template1 tunnel
Description $FW_INSIDE$
political IP VPN route mapR (config) #ip - list extended access 103
R (config-ext-nacl) #permit ip all 10.10.20.0 0.0.0.255R (config) #route - map allowed VPN 10
Ip address of R #match (config-route-map) 101
R (config-route-map) #set interface loopback1
R (config) #route - map allowed VPN 20
Ip address of R #match (config-route-map) 103
R (config-route-map) #set interface loopback1You must now exonerated NAT for VPN traffic:
===================================
R (config) #ip - 102 extended access list
R #deny (config-ext-nacl) ip 10.10.10.0 0.0.0.255 10.10.20.0 0.0.0.255
R (config-ext-nacl) 10.10.10.0 ip #permit 0.0.0.255 any
R (config-ext-nacl) 10.10.20.0 ip #deny 0.0.0.255 10.10.10.0 0.0.0.255
R (config-ext-nacl) 10.10.20.0 ip #permit 0.0.0.255 anyoverload of IP nat inside source list 102 interface FastEthernet4
Let me know if this can help,
See you soon,.
Christian V
-
I need to establish a vpn connection between my office and a computer over the internet, allowing access to the internal of the outside lan. I have a problem with my router and I am looking for a new.
Can I use x 3500 to establish a pptp vpn tunnel or it can work only as vpn passthrough?
This modem/router supports VPN passthrough for IPSec, PPTP and L2TP only. Try VPN Linksys Gigabit routers like the series of the LRT.
-
VPN connected, stream out of VPN tunnel
I mean that we have in place of the VPN Sites manage to sites with 2 RV042 router but it seams not as I wanted. Are you sure that each transfer of data through Router 2 will go into the VPN tunnel or it shuts down the VPN tunnel. I checked the routing table and saw that:
Sources mask Gateway Interface
2 1 or wan wan IP 255.255.255.0 ipsec0 private
By default 0.0.0.0 (ip wan 1 or 2) wan1 or wan2
.........
So what you think what sense data will pass through the line, it will go through the ipsec section or through wan1 or wan2. Ofcouse each data will pass through wan1 or wan2, but it can go inside the ipsec tunnel or ipsec outside tunnel. If she goes inside the ipsec tunnel, everything is ok, but if this isn't the case, transfer of unsecured data. I'm trying to access some website is not in private ip and it was outside ipsec tunnel go, I can capture and now that you have access.
Why with linksys have 2 work as draytek product even photos follow:
Can someone help me to answer this question, thank you for your attention
1. it depends on what the tunnels of your business allows. As I've written before, there are other protocols that allows you to route traffic through the VPN tunnel. Only IPSec cannot do this. For example, if your company uses GRE over IPSec then they can route traffic through their tunnels. Your RV does not support this.
2. If it's really plain IPSec then you cannot configure several subnets. You can try to implement the security group remote as a subnet more grand, such as 10.0.0.0/8. Of course the groups must match on both sides.
3. If you want to route all traffic through the tunnel, and then try to set the local/remote security to 0.0.0.0/0.0.0.0 group. Maybe it works.
The configuration of IPSec in the RV042 does not allow extremely complex configurations. It's mainly to connect two subnets between them.
-
Hi all
I have a little problem concerning ASA and syslogs. I have a tunnel from site to site between a local ASA and ASA distance. Behind the ASA local, I have a central syslog server (which has no ASA as default gateway) which collects messages from all network devices and I want to get messages from the ASA remote as well.
The tunnel protects traffic between local networks behind each ASA, which includes ASA inside remote interface as well. The problem is that if I specify on the SAA distance my syslog server it does not pass through the VPN tunnel. The ASA remote sees my server syslog as being 'outside' so he's using the external IP address as the source-interface for the syslog message. Which of course does not pass through the tunnel. As much as I know there is no way to configure the interface source for logging under the SAA, that you can do on a normal IOS router.
I've found a few documents explaining this Setup on CCO, but they all imply I have extend the list for interesting traffic to access allow remote UDP/514 of the PIX traffic outside my local syslog server interface. This isn't something I want to do what I would get in routing complication in my LAN with a public IP address of the ASA remote.
Any suggestions? I thought I could use some sort of NAT on the ASA remote so that all traffic for my local network a source the remote PIX is translated on the inside interface, which in theory should pass the package via the tunnel. I did not go so far.
Any help is appreciated.
Best regards
Stefan
You can define the interface that the ASA will use to send the newspapers "syslog_ip host record.
Make sure you also do "access management".
Then the SAA should source the syslogs from inside the interface, which is probably encrypted with the crypto ACL.
I hope it helps.
PK
Maybe you are looking for
-
How to print the list of bookmarks
I want to print my list of bookmarks.
-
Not able to print with a printer all-in-one inkjet Brother MFC - 3360C
I use a Brother MFC 3360 C. My printer print is no longer. He said he receives data, but does nothing
-
Original title: what's wrong with the windows Task ManagerWindows Task Manager is weired. One day I open Windows task manager and theres one tab theres no cpu tab, tab proseses all or any other tabs and theres no output minimize or full screen top-r
-
Used my Halo 2 PC key 5 times, is there anything I can do to use it again?
I would like to get some good old fashioned halo game goes, but I can't use my key more! I'd love to be able to play again. Also there is no category that I could find after that, because this is my first post, I would appreciate someone pointing me
-
External sound card does not work correctly
I have a Nimbus PC music that I used for a few years. I have 2 its external cards: my main unit, which is a Focusrite Scarlett 18i8 and the backup device Steinberg CI2. The two devices have been works fine with my PC for a long time, but this weekend