Tunnel VPN L2L with NATTing will not allow traffic which will be initiated by spoke to the hub.

Traffic from internal hosts will NAT address works ok, but what speaks tests it traffic never connects.

get the 10.1.12.232 NAT host would be 172.27.63.133 and past through the VPN tunnel to 10.24.4.65 without problem. However when 10.24.4.65 tries to ping or connect to 172.27.63.133 traffic does not make inside host 10.1.12.232

ASA-1 #.
!
network object obj - 172.27.73.0
172.27.73.0 subnet 255.255.255.0
network object obj - 172.27.63.0
172.27.63.0 subnet 255.255.255.0
network object obj - 10.1.0.0
10.1.0.0 subnet 255.255.0.0
network object obj - 10.24.4.64
subnet 10.24.4.64 255.255.255.224
network object obj - 172.27.73.0 - 172.27.73.255
range 172.27.73.0 172.27.73.255
the object of the 10.0.0.0 network
subnet 10.0.0.0 255.0.0.0
network object obj - 24.173.237.212
Home 24.173.237.212
network object obj - 10.1.12.232
Home 10.1.12.232
network object obj - 172.27.63.133
Home 172.27.63.133
the DM_INLINE_NETWORK_9 object-group network
object-network 10.0.0.0 255.255.255.0
object-network 10.0.11.0 255.255.255.0
object-network 10.0.100.0 255.255.255.0
object-network 10.0.101.0 255.255.255.0
object-network 10.0.102.0 255.255.255.0
object-network 10.0.103.0 255.255.255.0
the DM_INLINE_NETWORK_16 object-group network
object-network 10.1.11.0 255.255.255.0
object-network 10.1.12.0 255.255.255.0
object-network 10.1.13.0 255.255.255.0
object-network 10.1.3.0 255.255.255.0
!
outside_1_cryptomap list extended access permitted ip object-group DM_INLINE_NETWORK_16-group of objects DM_INLINE_NETWORK_9
access extensive list ip 172.27.73.0 outside_8_cryptomap allow 255.255.255.0 10.24.4.64 255.255.255.224
access extensive list ip 172.27.63.0 outside_8_cryptomap allow 255.255.255.0 10.24.4.64 255.255.255.224
!
list of allowed outside access extended ip 10.24.4.64 255.255.255.224 172.27.63.0 255.255.255.0
list of allowed outside access extended ip 10.24.4.64 255.255.255.224 10.1.0.0 255.255.0.0
list of allowed outside access extended ip 172.27.63.0 255.255.255.0 10.1.0.0 255.255.0.0
!
NAT (inside, all) source static obj - 172.27.73.0 obj - 172.27.73.0 destination static obj - 10.24.4.64 obj - 10.24.4.64 no-proxy-arp-search to itinerary
NAT (inside, all) source static obj - 172.27.63.0 obj - 172.27.63.0 destination static obj - 10.24.4.64 obj - 10.24.4.64 no-proxy-arp-search to itinerary
NAT (inside, outside) source dynamic obj - 10.66.0.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.70.0.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.96.228.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.96.229.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 192.168.5.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.75.0.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.11.0.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source static obj - 10.1.3.37 obj - 10.71.0.37 destination static obj - 50.84.209.140 obj - 50.84.209.140
NAT (inside, outside) source static obj - 10.1.3.38 obj - 10.71.0.38 destination static obj - 50.84.209.140 obj - 50.84.209.140
NAT (inside, outside) source static obj - 10.1.12.232 obj - 172.27.63.133 destination static obj - 10.24.4.64 obj - 10.24.4.64
NAT (inside, outside) source dynamic obj - 10.1.0.0 obj - 172.27.73.0 - 172.27.73.255 destination static obj - 10.24.4.64 obj - 10.24.4.64
!
NAT (exterior, Interior) source static obj - 10.24.4.64 obj - 10.24.4.64 destination static obj - 172.27.63.133 obj - 10.1.12.232
NAT (outside, outside) source static obj - 10.24.4.64 obj - 10.24.4.64 destination static obj - 172.27.63.133 obj - 10.1.12.232

the object of the 10.0.0.0 network
NAT (inside, outside) dynamic obj - 24.173.237.212
!
NAT (VendorDMZ, outside) the after-service automatic source dynamic obj - 192.168.13.0 obj - 24.173.237.212
outside access-group in external interface
Route outside 0.0.0.0 0.0.0.0 24.173.237.209 1
Route inside 10.1.0.0 255.255.0.0 10.1.10.1 1
Route inside 10.2.1.0 255.255.255.248 10.1.10.1 1
!
Crypto ipsec transform-set ikev1 SHA-ESP-3DES esp-3des esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
Crypto ipsec transform-set ikev1 ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac
Crypto ipsec transform-set ikev1 ESP-3DES-SHA-DH2-esp-3des esp-sha-hmac
Crypto ipsec pmtu aging infinite - the security association
!
card crypto GEMed 8 corresponds to the address outside_8_cryptomap
card crypto GEMed 8 set peer 64.245.57.4
card crypto GEMed 8 set ikev1 transform-set ESP-AES-256-SHA ESP-AES-256-MD5
GEMed outside crypto map interface
!
: end
ASA-1 #.

Hello

First of all, I would like to remove these two lines because they do nothing productive

nat (outside,inside) source static obj-10.24.4.64 obj-10.24.4.64 destination static obj-172.27.63.133 obj-10.1.12.232nat (outside,outside) source static obj-10.24.4.64 obj-10.24.4.64 destination static obj-172.27.63.133 obj-10.1.12.232
Then, I was running packet - trace to see what NAT rule actually hit you.
packet-tracer input inside 10.1.12.232 12345 10.24.4.65 12345

Tags: Cisco Security

Similar Questions

  • Tunnel VPN IPSEC (LAN to LAN) not succeeded traffic

    I had a temporary scenario I need to establish an IPSEC VPN between branch (cisco router) and HQ (VPN concentrator).

    The tunnel is established end but traffic stop happening after some 5-10 minutes. I have to manually clear the session encryption and then connectivity is fine. To test the above, I'll send branch ICMP packets to HQ. I can see ' cryto isakmp his ' and ' crytpo ipsec his ' active and fine.

    Share your opinion on this guy!

    Hello

    Make sure that this life corresponds to the router and the hub.

    This is a doc for IPSEC troubleshooting: -.

    http://www.Cisco.com/en/us/customer/products/ps6120/products_tech_note09186a00807e0aca.shtml

    Parminder Sian

  • ASA IPP on VPN L2L w/NAT

    I have a tunnel VPN L2L on a Cisco ASA 5520 I am trying to get IPPS, to work on. On my ACL cryptomap I defined a local group object and a remote object-group, and I'm the one-to-one NAT scene on the local group. I also have a configured route map that will take the static routes and redistribute in my ACE. EIGRP two things - 1, I noticed, I don't see on my ASA static routes that point to remote subnets and 2, the ACL that I used in my definition of route map is not getting any hits on it.

    Any thoughts on where I can go wrong?

    Thank you

    Darren

    You have configured the following:

    crypto set reverse-road map

    If you do, can you remove and Add again and see if that fixes the problem?

  • Problem with Tunnel VPN L2L between 2 ASA´s

    Hi guys,.

    I have some problems with my VPN Site to site tunnel between 2 ASA (5520/5505).

    I watched a lot of videos on youtube, but I can't find out why the tunnel does not...

    Both devices can ping eachothers WAN IP address (outside interfaces), but I don't see any traffic between the 2 sites. It seems that the tunnel is not open to everyone. When i PING from the local to the Remote LAN (which should be an interesting traffic for the tunnel...), the its IKEv1 remains empty...

    Am I missing something? I can't understand it more why same phase 1 is not engaged.

    You NAT won't. In your config file traffic is NATted initially and then does not match any more crypto ACL. You must move the rule dynamic NAT/PAT until the end of the table on two ASAs NAT:

     no nat (INSIDE,OUTSIDE) source dynamic any interface nat (INSIDE,OUTSIDE) after-auto source dynamic any interface

  • Do not do a ping ASA inside IP port of the remote site VPN L2L with her

    The established VPN L2L OK between ASA-1/ASA-2:

    ASA-2# see the crypto isakmp his

    KEv1 SAs:

    ITS enabled: 1

    Generate a new key SA: 0 (a tunnel report Active 1 and 1 to generate a new key during the generate a new key)

    Total SA IKE: 1

    1 peer IKE: 207.140.28.102

    Type: L2L role: answering machine

    Generate a new key: no State: MM_ACTIVE

    There are no SAs IKEv2

    QUESTION: 3750-2, we ping 3750-1 (10.10.2.253) are OK, but not ASA-1 inside port (10.10.2.254).

    Debug icmp ASA-1 data:

    ASA-1 debug icmp trace #.

    trace of icmp debug enabled at level 1

    Echo ICMP Internet request: 10.100.2.252 server: 10.10.2.253 ID = 400 seq = 0 len = 72

    ICMP echo response from the server: 10.10.2.253 Internet: 10.100.2.252 ID = 400 seq = 0 len = 72

    Echo ICMP Internet request: 10.100.2.252 server: 10.10.2.253 ID = 400 seq = 1 len = 72

    ICMP echo response from the server: 10.10.2.253 Internet: 10.100.2.252 ID = 400 seq = 1 len = 72

    Echo request ICMP 10.100.2.252 to 10.10.2.254 ID = 401 seq = 0 len = 72

    Echo request ICMP 10.100.2.252 to 10.10.2.254 ID = 401 seq = 1 len = 72

    Echo request ICMP 10.100.2.252 to 10.10.2.254 ID = 401 seq = 2 len = 72

    Make sure you have access to the administration # inside

    lt me know f This allows.

  • Application of VPN S2S (with NAT)

    Hello experts,

    ASA (8.2) and standard Site 2 Site Internet access related configs.

    Outside: 1.1.1.1/24-> peer IP VPN S2S.

    Inside: Pvt subnets

    Standard "Nat 0' orders and crypto ACL for our remote offices, local networks with IP whp program.

    Requirement:

    Need to connect the PC to external clients (3.3.3.3 & 4.4.4.4) on tcp/443 via vpn S2S on our LAN. Client only accepts only the host with public IPs.

    I need NAT to my internal IP to the public IP say 1.1.1.2 and establish the VPN tunnel between 1.1.1.1-> PRi Client-side & secondary IPs (Cisco router).

    (without losing connectivity to remote offices). No policy NAT work here?

    ex:

    My Intern: 10.0.0.0/8 and 192.168.0.0/16
    Assigned IP available for NAT (some time to connect to the client only): 1.1.1.5

    External client LAN IPs: 3.3.3.3 & 4.4.4.4

    PAT: permit TOCLIENT object-group MYLAN object-group CUSTOMER LAN ip extended access-list

    NAT (inside) 5-list of access TOCLIENT

    5 1.1.1.5 (outside) global
        
     Crypto: tcp host 1.1.1.5 allowed extended CRYPTO access list object-group CUSTOMER LAN eq 443

    Outsidemap 1 crypto card matches the address CRYPTO
     
    Customer will undertake to peer with IP 1.1.1.1 only.

    Do I need a ' Nat 0' configs here?

    Also, for the specifications of the phase 2, it is not transform-set options gives. Info given was

    Phase2: AH: people with mobility reduced, life: 3 600 s, PFS: disabled, LZS Compression: disabled.
    This works with options of the phase 2?

    Thanks in advance

    MS

    Hello

    «Existing NAT (inside) 1 & global (outside) does not interfere with NAT 5 when users try to reach the ClientLAN.»

    Your inside nat index is '1', while the dynamic policy-nat is index '5 '.

    "" For the phase 2 in general, we define Crypto ipsec transform-set TEST ".

    Sure, the remote tunnel peers even accept transform set, everything you put up with the example below and distant homologous put the same tunnel.

    Crypto ipsec transform-set ESP-AES-128-SHA aes - esp esp-sha-hmac

    "In this scenario, no need to define any what and just add empty transform don't set statement under card crypto?

    No you need a defined transformation.

    "3. If we want to limit the destination port 443, I need to use separate VPN filters?

    That's right, use a vpn-filter.

    "4. we have several phase 1 configs, but wanted to use AES256 & DH5 (new policy)"... for s2s, these options work fine. ""

    Of course, you have set the phase 1, as required.

    Thank you

    Rizwan James

  • RA VPN VPN L2L via NAT strategy

    Scenario: we have remote access VPN users who need to access a VPN L2L by ASA even outside the interface. This particular VPN L2L is a partner that requires us to NAT (192.168.x.x) addresses to another private address (172.20.x.x). We also access VPN L2L to internal hosts. NATing to the partner is accomplished through a NAT policy.

    Our remote VPN users cannot access the L2L VPN. It seems that the host address VPN (assigned through RADIUS) is not in THAT NAT would not, even if it is in the range object.

    "Group" is configured and works for the other VPN.

    NO - NAT ACL does not seem to be involved (which it shouldn't), as the address of the internal host (192.168.60.x) is not NAT to be the public address.

    Internal hosts that can access the VPN tunnel very well.

    Here are the relevant config:

    permit same-security-traffic intra-interface

    the OURHosts object-group network

    host 192.168.1.x network-object

    host 192.168.2.x network-object

    object-network 192.168.60.0 255.255.255.0

    the PartnerHosts object-group network

    network-host 10.2.32.a object

    network-host 10.2.32.b object

    network-host 10.2.32.c object

    access-list extended NAT2 allowed ip object-group OURHosts-group of objects PartnerHosts

    Global (OUTSIDE) 2 172.20.x.x

    NAT (INSIDE) 2-list of access NAT2

    The syslog error we receive:

    % ASA-4-402117: IPSEC: received a package not IPSec (Protocol = ICMP) 10.2.32.a to 192.168.60.x

    Yes. According to the config that you posted, there is no command currently in no place in vpn nat clients the RA to the hairpin above the tunnel.

    The inside of our customers work due to "nat (INSIDE) 2 NAT2 access-list. But because your VPN RA customers coming from "OUTSIDE", this statement by nat would have no effect on them.

  • VPN IPsec with NAT

    ASA5510, 8.0.x

    I need to set up a VPN from Site to Site (L2L) in a remote location.

    The remote IT consultant asks me NOT to go out with my real (pulbic), IP address, but translated to a single IP address.

    From my side, I have a 24 network, on the remote site, I have to reach only 4 IP addresses.

    The VPN is one way only: I need to reach their servers, but not vice versa.

    I tried to follow the document ID-99122 (http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml), but it seems not to work with a static NAT to a translated 24 on a single IP address.

    I tried to ask them to allow me to NAT a 24, but they disagree.

    Any solution?

    Kind regards

    Claudio

    Hello

    If I understand, you want to translate your 24 network to IP address dynamic PAT unique when contacting the remote site only via VPN L2L.

    For this, you can try to use the PAT political dynamics

    access-list L2LVPN - POLICYNAT note define traffic for the political dynamics for VPN L2L PAT

    L2LVPN-POLICYNAT ip 10.10.10.0 access list allow 255.255.255.0 host 1.1.1.1

    L2LVPN-POLICYNAT ip 10.10.10.0 access list allow 255.255.255.0 host 1.1.1.2

    L2LVPN-POLICYNAT ip 10.10.10.0 access list allow 255.255.255.0 host 1.1.1.3

    L2LVPN-POLICYNAT ip 10.10.10.0 access list allow 255.255.255.0 host 1.1.1.4

    Global 200 (outside)

    NAT (inside) 200 access-list L2LVPN-POLICYNAT

    Also of course your L2L Crypto VPN ACL map should look like this

    access-list L2LVPN-CRYPTOMAP Note set encryption to connect VPN L2L domain

    access-list L2LVPN-CRYPTOMAP allowed ip 1.1.1.1 host

    access-list L2LVPN-CRYPTOMAP allowed IP host 1.1.1.2

    access-list L2LVPN-CRYPTOMAP allowed IP host 1.1.1.3

    access-list L2LVPN-CRYPTOMAP allowed IP host 1.1.1.4

    crypto card matches the address L2LVPN-CRYPTOMAP

    Where

    • 10.10.10.0/24 = is your souce LAN network
    • 1.1.1.1 - 4 = are the remote end 4 hosts, you must contact by the VPN L2L
    • PAT = IP is the IP address assigned by the remote end to be used with VPN L2L

    Hope this helps

    EDIT: Copy/paste strikes again. I had both the ACL with the same name. Which corrected.

    -Jouni

  • Redirect peer tunnel VPN L2L ina

    Question of curiosity... I have 2 new ASA5515 which I put up for an improvement of the equipment. In the time before I swap them I am using them as a sort of laboratory of fortune to get him going to setup VPN L2L. I didn't use current IP addresses for the test environment, so I used false numbers.

    My question is: can I go back and change the IP address peer and address local/remote without having to tear them up to specifications plant again?

    -Do I have reprint just the type of Tunnel-Group IPsec-l2l X.X.X.X command with the IP address?

    I know that there are a few other of the region that I have to change the IP of both peers, but just of my question is, I can do or do I have to start over?

    -Jon

    Jon

    You should not reconfigure from scratch if that's what you're asking.

    You just need to change the peer IPs everywhere where they appear in your configuration.

    Jon

  • ASA 8.3 VPN site-to-site does not UDP traffic to other peer

    Hello!!!

    Someone turned off the lights :-) I say this because that's 6.2 6.3 I can't get the basic things...

    On a SAA, I created a "site-site" VPN profile to connect to a remote site, on the other side (ASA 8.2) sees no problem, I can pass all IP traffic via VPN without NAT; but on a new ASA5505 with 8.3 (1) version fw and ASDM 6.3 (1) can't do that in any way :-(

    What I get is trivial...

    ... It works perfectly with TCP and ICMP traffic, but does not have UDP traffic: in practice, if I followed the traffic to a remote private IP, TCP and ICMP traffic I see only packets in vlan "inside" with the private IP, but with the UDP traffic on top of that, I see traffic on vlan 'out' with the IP public ASA and source port changed :

    Inside: UDP to 172.16.2.128:6000 to 172.16.0.200:6000
    Outside: UDP to 5.5.5.5:23400 to 172.16.0.200:6000

    Why?

    Of course, the traffic is not encrypted and does not reach the other side of the tunnel!

    Here are the important parts of the configuration:

    interface Vlan1
    nameif inside
    security-level 100
    172.16.2.1 IP address 255.255.255.0

    network obj_any object
    subnet 0.0.0.0 0.0.0.0

    remote network object
    172.16.0.0 subnet 255.255.254.0

    outside_cryptomap to access extended list ip 172.16.2.0 allow 255.255.255.0 network remote control object

    NAT (inside, outside) static source any any destination static remote-remote network

    network obj_any object

    NAT dynamic interface (indoor, outdoor)

    card crypto outside_map0 1 match address outside_cryptomap

    outside_map0 card crypto 1jeu pfs

    card crypto outside_map0 1 set ip.ip.ip.ip counterpart

    outside_map0 card crypto 1jeu nat-t-disable

    outside_map0 interface card crypto outside

    Given that the new business object, I have not yet quite clear (ok, I don't find time to do a deep reading of the documentation), someone is able to direct me to fix this trivial?

    Note: If I remove my drive manual nat and I flag "network translating" on the remote network object thus indicate that they want NAT with ip network remote control then don't work any IP vs. remote site traffic. Why, why have not more than the simple rules of 'nat exception' the old version and why the crypto-plan applies only to TCP traffic? Possible that there is an object any which takes all IP traffic?

    A big thank you to all.

    73,

    Arturo

    Hi Arturo,.

    I know that there is a certain NAT related bugs in 8.3 (1) and although I don't remember a specific which corresponds to your symptoms, I would say you try 8.3 (2) instead, or maybe even the last available version of a temp (currently to 8.3 (2.4):)

    http://tools.cisco.com/support/downloads/go/ImageList.x?relVer=8.3.2+Interim&mdfid=279916854&sftType=Adaptive+Security+Appliance+%28ASA%29+Software&optPlat=&nodecount=9&edesignator=null&modelName=Cisco+ASA+5510+Adaptive+Security+Appliance&treeMdfId=268438162&modifmdfid=&imname=&treeName=Security&hybrid=Y&imst=N

    If you still see the problem, then, check

    entry Packet-trace within the udp 172.16.2.2 1025 172.16.0.1 detail 123

    entry Packet-trace inside tcp 172.16.2.2 1025 172.16.0.1 detail 123

    and check what's different.

    HTH

    Herbert

  • WMP not allowing me to rip to CD or to designate the folder of extraction

    Windows Media Player does not allow me to extract a music disk. I try to designate the folder which I want to ripped music to and that the box is empty. I try to click on the button 'Edit' on the box "rip music to this location" and nothing happens. I tried a lot of things. Help, please!
    It's terribly frustrating because I use WMP to rip my music exclusively. I can't stand itunes because it makes the new artist folder for songs that have contributed artist (example; "Artist one" will be in a folder. "Artist a pi b artist ' goes into a new folder. IF BEAST!

    Tried:
    Microsoft 'Fix it' automated tool

    Clear media library information
    change permissions for WMP

    Hello

    In this case, I would suggest you uninstall and reinstall Windows Media Player and check. See the following steps:

    (a) press the Windows key + X, select System.

    (b) click Windows updates on the lower left.

    (c) click on installed updates on the bottom left of the new window.

    (d) in the new window, click on turn Windows features ON or OFF on the left panel.

    (e) developing media features and uncheck the box against Windows Media Player.

    (f) click OK and restart if you are prompted.

    (g) repeat the same procedure and check the box against Windows Media Player to reinstall again.

    Try these steps and come back to us for assistance.

  • Get-VMHost: you have changed the world: DefaultVIServer and global: DefaultVIServers system variables. This is not allowed. Please reset them to $null and reconnect the server vSphere.

    Hello world

    After the upgrade to PowerCLI version 5.1 however I can't run even the simplest command because it always ends up with the following error:

    Get-VMHost: you have changed the world: DefaultVIServer and global: DefaultVIServers system variables. This is not aRA. Please reset them to $null and reconnect the server vSphere.

    C:\Users\Albert\AppData\Local\Temp\7900df01-f6c1-48c6-ac1e-047dfff90fb6.ps1:1 tank: 11
    + Get-VMHost < < < <
    + CategoryInfo: NotSpecified: (:)) [Get-VMHost], InvalidState)
    + FullyQualifiedErrorId: VMware.VimAutomation.ViCore.Types.V1.ErrorHandling.InvalidState, VMware.VimAutomation.ViCore.Cmdlets.Commands.GetVMHost

    Can someone please suggest to me how to fix the script for my v3.2.0 PowerGUI IDE can work with the latest PowerCLI in my computer laptop 64 bit Windows 7?

    Thank you.

    And I just tried with PowerGui (same versions of PowerGUI and PowerCLI you use), no problem.

    Must be something local on your desktop.

    Maybe try a uninstall/reinstall of PowerGUI?

  • IOS - help with VPN IPsec L2L with NAT

    Hello guys

    I tried to get VPN to work for a specific scenario where I do NAT for VPN traffic to avoid the duplication of subnet.

    I found several guides on cisco.com, but all the ones I found does not (or how) overload NAT (for internet traffic), I need for my setup.

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a00800b07ed.shtml

    http://www.Cisco.com/en/us/products/ps5855/products_configuration_example09186a0080a0ece4.shtml

    Basically, I need to know how the configuration looks like when make you static NAT in a VPN tunnel as well as provide internet connectivity using NAT in the same router?

    I have attached a drawing that needs to better explain my needs.

    Someone knows a guide that shows how to do this?

    Best regards

    Jesper

    You can use a static policy NAT NAT the traffic:

    access-list 101 permit ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255

    access-list 102 deny ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255

    access-list 102 permit ip 10.0.0.0 0.0.0.255 any

    policy-NAT allowed 10 route map

    corresponds to the IP 101

    internet-NAT allowed 10 route map

    corresponds to the IP 102

    IP nat inside source static network 10.0.0.0 road policy-NAT 10.30.10.0/24-feuille

    IP nat inside source map route internet-NAT interface overloading

    Hope that helps.


  • Muse Web fonts are loaded, but those with variations do not allow selection

    I can exchange Questrial to one of the other unique fonts, but it won't let me change any Cup from a font like Source Sans Pro family.

    I never used to have this problem, but I do now and that you want to change one of the fonts that I use on the site I created.

    Here's a link, but as you can guess I want to change the font in Muse do not adjust the code

    http://artefrancesco122614.BusinessCatalyst.com/index.html

    Thanks for the help

    Remember that not all fonts have variations such as bold or italic. It is possible that the police that you are trying to use is like that.

  • The FTC said that Mozilla has experimented with technology 'do not track '. I would like to know if in the Mozilla experience, if 'Do not track' would include research activity of Internet users in addition to their browsing activity.

    I'm an SEO.

    Do not track alone makes Firefox send a specific DNT = 1 entry via the HTTP response header. Nothing more. This is the server to decide how to respond to such a request.

Maybe you are looking for