VPN tunnel using the public as IP being the preserve of LAN to LAN encryption

I have a question who responded to variations throughout the forum, and I feel that my beginner status will be clear. Here is my installation problem... I use a Cisco ASA 5506 and I connect to a provider. I just need the configuration on the local side that they manipulate to their side.

Internal IP range
192.168.1.1 255.255.255.0

Public IP address from ISP

97.X.X.22

174.X.X.194

Config required by the seller.

All Http Https traffic must come from the 97.X.X.22

local peer 97.X.X.22

remote peer 144.X.X.25

Our local encryption field must be a public IP address: 174.X.X.194/32

Areas of remote encryption:

207.X.X.0 255.255.255.0

144.X.X.90 255.255.255.255
144.X.X.91 255.255.255.255
144.X.X.22 255.255.255.255
144.X.X.25 255.255.255.255

currently I have the external value 97.X.X.22

I know now that I need to NAT all inside the traffic destined for the remote areas of encryption to 174.X.X.194/32 and then move the valuable traffic to the VPN.

I use the ASA Version 9.5 (2) can someone help me so that I can avoid interruptions of service, it will be very appreciated. ?

You will need to modify the ACL Crypto to be the public IP address you use

outside_cryptomap_1 list extended access permit ip host 174.X.X.194 object-group SP

--

Please do not forget to select a correct answer and rate useful posts

Tags: Cisco Security

Similar Questions

  • VPN tunnel between the concentrator 3005 and router Cisco 827

    I am trying to establish a VPN tunnel between the Central Office with VPN 3005 and controller branch Cisco 827 router.

    There is a router of perimeter with access set up in front of the 3005 list.

    I quote the ACLs on the Central perimeter router instructionsuivante to allow traffic to permit ip 3005 - acl 101 all 193.188.X.X (address of the hub)

    I get the following message appears when I try to ping a local host in the Central site.

    Can Anyoune give me the correct steps to 827 and 3005.

    Thank you

    CCNP Ansar.

    ------------------------------------------------------------------------------------------------------

    Debug crypto ISAKMP

    encryption of debugging engine

    Debug crypto his

    debug output

    ------------------

    1d20h: IPSEC (sa_request):,.

    (Eng. msg key.) Local OUTGOING = 172.22.113.41, distance = 193.188.108.165.

    local_proxy = 202.71.244.160/255.255.255.240/0/0 (type = 4),

    remote_proxy = 128.128.1.78/255.255.255.255/0/0 (type = 1),

    Protocol = ESP, transform = esp - esp-md5-hmac.

    lifedur = 3600 s and KB 4608000,

    SPI = 0x83B8AC1B (2209917979), id_conn = 0, keysize = 0, flags = 0x400D

    1d20h: ISAKMP: ke received message (1/1)

    1d20h: ISAKMP: 500 local port, remote port 500

    1d20h: ISAKMP (0:1): entry = IKE_MESG_FROM_IPSEC, IKE_SA_REQ_MM

    Former State = new State IKE_READY = IKE_I_MM1

    1d20h: ISAKMP (0:1): early changes of Main Mode

    1d20h: ISAKMP (0:1): lot of 193.188.108.165 sending (I) MM_NO_STATE

    1d20h: ISAKMP (0:1): retransmission phase 1 MM_NO_STATE...

    1d20h: ISAKMP (0:1): will increment the error counter on his: retransmit the phase 1

    1d20h: ISAKMP (0:1): retransmission phase 1 MM_NO_STATE

    1d20h: ISAKMP (0:1): lot of 193.188.108.165 sending (I) MM_NO_STATE

    1d20h: ISAKMP (0:1): retransmission phase 1 MM_NO_STATE...

    1d20h: ISAKMP (0:1): will increment the error counter on his: retransmit the phase 1

    1d20h: ISAKMP (0:1): retransmission phase 1 MM_NO_STATE

    1d20h: ISAKMP (0:1): lot of 193.188.108.165 sending (I) MM_NO_STATE

    1d20h: IPSEC (key_engine): request timer shot: count = 1,.

    You must also allow the esp Protocol in your ACL.

    access-list 101 permit esp any host x.x.x.x (address of the hub)

    Hope this helps,

    -Nairi

  • Two VPN tunnels on the same device with the same protected networks

    There is a remote site that wants me to put in place two separate tunnels of VPN with the same internal IP at each end. FOR EXAMPLE

    LAN = 10.212.170.201/32, 10.212.170.202/32

    Remote network 192.168.0.0/24 =

    I currently have a tunnel between the above:

    End Point distance = 111.93.152.186

    Local endpoint point = 198.205.115.252

    Now, they want to set up a VPN for the same networks between:

    End Point distance = 115.115.130.34

    Local endpoint point = 198.205.115.252

    It is my understanding that the Cisco ASA 5520 can do. The only way I've seen this done with Cisco hardware is to use two ASAs, but there may be a way to use the costs of road or some other tricks to make it happen.

    I'm open to suggestions.

    Is a backup?

    In, specify endpoint remote second as a "backup" of the peer in the first virtual private network.  Alone will be active at the time - but there are toggled if the VPN in first dies.

  • VPN Tunnel to the TOP but no traffic passing (PIX515)

    I'll put up a remote engineers access to off-site to access my network (using the cisco vpn client). I use PIX 515E software version 7.0 (3) 20 as a vpn server. I can establish a tunnel, but I can't access network resources. I can ping the external interface of the PIX. This is my setup: internet-router-pix-dmz(server farm). Please find attached my setup. Thanks in advance.

    After a glance at your policy, it seems that the Pool of IP, that is assigned to the clients behind the outside interface, runs behind the DMZ. I don't think it will work.

    In addition, defined distribution policy seems to be backward. Im sure that you intend to send traffic FROM the IP pool to 196.26.12.64/26. Your acl split is the opposite.

    In addition, your routing table does not contain a route for the 196 network, so the firewall will use the default route to the outside. If this is intentional, the clients and dst are on the outside, which is considered to be crossed. This is allowed on the SAA only with the same security setting configured.

  • Is it possible to build a vpn tunnel to the DMZ on a pix 515 interface?

    I would like to know if it is possible to have a vpn tunnel ending on a DMZ interface rather then inside interface of a pix 3-way. All the examples of configuration, I found route traffic from the VPN client somewhere on the internet on the inside interface of the pix. I tried a sheep-access list of the demilitarized zone to the vpn client, but it does not work. According to me, because the vpn traffic goes to the safety higher by definition interface. Am I wrong?

    Hello

    You can do it in use (nat 0 dmz x.x.x.x y.y.y.y)

  • Problems with VPN tunnels after the upgrade to PIX 7.0

    It seems that Cisco has revamped the VPN process on the new Version of PIX 7.0.

    After I've upgraded, I noticed that AH (i.e. ah-sha-hmac, ah-md5-hmac) was no longer supported and all my container transformation games OH no were not converted.

    Another question, if you have enabled on Versieon 6.3, names when you upgrade, tunnel groups will be created (formerly "identity isakmp crypto, crypto key isakmp peer ') which will include a hostname (hostname of identity) instead of IP as it was to the point 6.3. Guess what... Nothing works! Having to delete and recreate it using the IP address.

    See an example...

    tunnel-group OTHER_END type ipsec-l2l

    IPSec-attributes tunnel-group OTHER_END

    pre-shared-key *.

    The above does not work... Having to recreate using the IP address mapped to OTHER_END...

    tunnel-group 2.2.2.2 type ipsec-l2l

    2.2.2.2 tunnel-group ipsec-attributes

    pre-shared-key *.

    Furthermore, I have problems with my racoon and freeswan extranet... Did someone recently updated with success and other gateways VPN provider (i.e. checkpoint, Freeswan and Racoon) work?

    We found the solution for this problem. It appeared that the perfect forward secrecy is enabled at the other side. If a 'card crypto outside_map 10 set pfs' is necessary. With the pix 6.3 version that appears not to make the difference, the vpn works even with pfs disabled on the side of pix.

  • SSL VPN authentication using the ad group

    Hi all

    I tried to restrict users to authenticate to the SSL VPN using an ad server. I have install the AAA server with the IP address of the AD server and attributed to the connection profile as well; However, I see that any user who is a member of a group in AD is able to authenticate.

    I want to only users who belong to the group "VPN users" get authenticated while everyone and all those who have credentials of the AD and not even a part of the 'VPN users' group is making authenticated.

    Can someone advice how I can make the ASA authenticate users based on ad groups? I use the ASDM to configure my VPN RA.

    Thanks in advance!

    Kind regards

    Riou

    Hey riri,.

    Try to use DAP to restrict access to users who belong to a specific ad group:

    https://supportforums.Cisco.com/document/7691/ASA-8X-dynamic-access-poli...

    Use the AAA attribute "LDAP .member of" to allow access to the users belonging to a specific group and deny access to other users.

    concerning

    Eric

  • On Pix VPN tunnel to the same subnet

    I have a customer who want to set up a the PIX VPN tunnel located on each site. For some reason, each side has the same subnet number, for example. 10.10.10.x/32. I'm sure we must run NAT, but is it possible.

    This can help

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a00800949f1.shtml

  • How to get to the VPN tunnel to the subnet 2/3

    I have not yet tried something else a few years back I got on my back which head with an ASA firewall you cannot route traffic to a subnet of second or third (it's 2 or 3 jumps away) on a same VPN tunnel if you add routes to all LAN subnets in all required firewall and tunnels.

    I know other manufacturers such as SonicWall, here you can do it, so the question is, is possible in the firewall Cisco ASA with version 7.07 and 7.2.4? If this is not the case, is it possible in a future release? and if this is not possible, how can I make it work? I can't work with a firewall router 1 LAN to LAN s 3?

    Attached are also a network card for the visualization of all subnets.

    Thanks in advance

    Johan Mannerstrom

    ICT technician

    If the firewall HQ is already connected to LAN2 (way I mean), then you have even connect an interface on the firewall of HQ and in him giving an ip address that belongs to LAN2. As firewall HQ has a route to 192.168.20.0/24 and 18.0/24 and vice versa, that's enough.

    And you're on the point on the rest of the steps you have provided regarding the config.

    And of course, you must configure matching exemption to ACL and NAT image mirror on the remote VPN encryption too.

  • Backup of the GRE Tunnel using the address IP of Seconadary

    Is it possible to configure a GRE Tunnel to backup using an IP of Seconadary address on the WAN interface.  The router is a

    Cisco 871.  Any help would be greatly appreciated.

    Thank you.

    Nicholas

    I'm not sure it would work for use a secondary address on the WAN interface for a GRE tunnel. Maybe if you tell us more about what you're trying to do we could be able to help find alternatives that would work.

    Two tunnels from the same interface (even though you could use a secondary address) to another router would not provide a backup, if they work at all. Work of two tunnels of the same interface of router (and two using the main address) fairly well if they go to different remote routers, and it is a common way to provide backup for the GRE tunnels.

    HTH

    Rick

  • Authentication IPsec VPN Client using the digital certificate

    Hello

    Please I need some clarification and help to set up my ASA 5540 with IOS 8.3 x for client certificate authentication remote.

    I have my certificate root from the Microsoft CA, but not quite sure if the steps described in the following cisco Web sites are exactly what I need since the firewall seems to generate the certificate to use.

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a0080930f21.shtml

    http://www.Cisco.com/en/us/products/ps6120/products_configuration_example09186a008073b12b.shtml

    My setup is such that the CA will issue certificates to remote clients and the ASA firewall, and remote clients will authenticate and connect with their certificates which the firewall is constantly updating using the Revocation list updated by the certification authority.

    The dhcp pool must be issued by the DC inside network and not on the firewall.

    Are there any examples or best practices to achieve steps will be really appreciated.

    Thank you

    Hi Josh,.

    Let me explain briefly how Auth PKI:

    In a public key infrastructure configuration, devices trust not each other directly, but they have a certification authority, which is the one who issues the certificate. We call this root CA (there may be a more complex configuration WHERE intermediate are involved, but that's another story). So when the root CA issues a certificate, he signs it with its private key. To be able to verify this signature, we should have the CA public key, which is included with the certification authority.

    So for certificate authentication, you must create a trustpoint, that defines the parameters of the root certification authority.

    Then you will authenticate this trustpoint, which basically means that you will get the certificate of the root CA and store locally.

    After that, you sign up to this CA, which means that you will ask for (and get) your own certificate.

    Other users will do the same and have the same root CA Cert, but different personal (identity) certificates.

    So what happens on authentication is that both ends send their certificate to the other, and they will use the public key contained in the root CA to validate the signature of the certificate received from the remote peer. If the signature is correct, this means that the certificate authority root actually issued the certificate, and this remote peer can be trusted (or not)

    Hope this is clear.

  • GRE and IPSEC VPN tunnel over the same interface

    My client is currently connected to a service provider of call through a GRE Tunnel over IPSEC. They chose to move all connections to a VPN site-to-site traditional behind a firewall, here, to your corp office.  As the questions says, is possible for me to put in place the VPN site to site on the same router? Interface Tunnelx both ethernet have the same encryption card assigned to the destination router.  I thought that traffic could divide by identification of traffic 'interesting '.  Thanks for all the ideas, suggestions

    Ray

    Ray

    Thanks for the additional information. It takes so that the existing entries in ACL 101 remain so the existing tunnel will still work. And you have to add entries that will allow the new tunnel. Editing an ACL that is actively filtering traffic can get complicated. Here is a technique that I use sometimes.

    -create a new access list (perhaps ACL 102 assuming that 102 is not already in use).

    -Copy the entries of ACL 101 to 102 and add additional entries you need in places appropriate in the ACL.

    -Once the new version of the ACL is complete in the config, then go tho the interface and change the ip access-group to point to the new ACL.

    This provides a transition that does not affect traffic. And he made it back to the original easy - especially if something does not work as expected in the new ACL.

    If the encryption of the remote card has an entry for GRE and a separate entrance for the IPSec which is a good thing and should work. I guess card crypto for GRE entry specifies an access list that allows the GRE traffic and for IPSec crypto map entry points to a different access list that identifies the IP traffic is encrypted through the IPSec tunnel.

    HTH

    Rick

  • An easy - how bounce a VPN tunnel from the command line?

    I think I know the answer, but must ensure. Is - what the command to bounce a VPN?

    his clear crypto ipsec peer

    Just to check - this command does not delete the config, but simply bounces, right?

    For customers of IOS VPN...

    your order will only cause me to generate a new key when I send more traffic... just tried...

    For the ASA VPN Clients we have

    ASA - fw # vpn - sessiondb logoff?

    all the all sessions

    proxy email Email-Proxy sessions

    specific session to Index the index

    specific sessions address IP IPAddress

    IPsec LAN-to-LAN l2l sessions

    name user name specific sessions

    sessions specific Protocol

    remote access remote IPsec sessions

    sessions of customer VPN SSL SVC

    Group-Tunnel tunnel-group sessions

    Mgmt of VPN VPN - lb load balancing sessions

    WebVPN WebVPN sessions

  • VPN client using the certificate self-signed on SAA

    Hello

    I need set up a vpn client that use a certificate automatically generated by the ASA.

    The VPN configuration is easy, especially with the use of the wizard.

    The problem is that I need the procedure to configure the ASA as a CA server and how to send the certificate to the client

    Thank you

    Just to let you know, the ASA can act as a CA server for authentication of cert based for ipsec vpn. It is only possible for sslvpn. So in your case, the client should be the AnyConnect client.

  • Implementation of the remote access VPN IPSec using SRI 2801

    Hello

    I tried to set up a VPN for remote access using 2801 SRI. I've been able to establish my house vpn tunnel using the DSL (behind a NAT) connection, give it SRI the IP address that is in the ip pool I configured on safety. The problem I have right now is that it does not reach the company LAN network.

    DIAGRAM:

    MODEM PC (VPN CLIENT) ADSL - ROUTER SOHO - INTERNET - ISR2801 - LAN---(10.10.0.27&192.168.0.9) COMPANY

    PC: 172.16.10.122

    SOHO ROUTER LAN IP: 172.16.10.254

    SOHO ROUTER WAN IP: Dynamically assigned by ISP

    ISR2801 WAN IP: x.x.x.5/224

    IP LAN ISR2801: 10.10.0.50/24

    The CORPORATE LAN subnet: 10.10.0.0/24 and 192.168.0.9/24

    2801 SRI CONFIGURATION:

    AAA new-model

    !

    !

    connection of AAA NOCAUTHEN group local RADIUS authentication

    local NOCAUTHOR AAA authorization network

    !

    !

    IP domain name xxxxx.com

    !

    !

    !

    username root password 7 120B551806095F01386A

    !

    !

    crypto ISAKMP policy 3

    BA 3des

    preshared authentication

    Group 2

    ISAKMP crypto 5 40 keepalive

    ISAKMP crypto nat keepalive 20

    !

    Configuration group isakmp crypto-GROUP NOC client

    touch [email protected]/ * /! ~ $ 9876 qwerty

    DNS 192.168.0.9

    192.168.0.9 victories

    xxxxx.com field

    LWOP-pool

    include-local-lan

    netmask 255.255.255.0

    !

    !

    Crypto ipsec transform-set AC - SET esp-3des esp-sha-hmac

    !

    dynamic-map crypto NOC-DYNAMICMAP 10

    transformation-LWOP-SET game

    !

    !

    list of crypto AC-customer card NOCAUTHEN card authentication

    list of crypto isakmp NOCAUTHOR AC-card card authorization

    crypto map CNP-map client configuration address respond

    Crypto map AC - map 10-isakmp dynamic ipsec AC-DYNAMICMAP

    !

    !

    !

    !

    interface FastEthernet0/0

    IP address x.x.x.5 255.255.255.224

    Speed 100

    full-duplex

    card crypto AC-map

    !

    interface FastEthernet0/1

    IP 10.10.0.50 255.255.255.0

    Speed 100

    full-duplex

    !

    local IP NOC-POOL 192.168.250.101 pool 192.168.250.110

    IP route 0.0.0.0 0.0.0.0 XXX1

    IP route 10.10.0.0 255.255.255.0 10.10.0.10

    IP route 172.16.10.0 255.255.255.0 FastEthernet0/0

    Route IP 192.168.0.0 255.255.255.0 10.10.0.10

    IP route 192.168.250.0 255.255.255.0 FastEthernet0/0

    !

    I have attached a few screenshots. My goal here is to have access to my LAN to the company (10.10.0.0/24 and 192.168.0.9/24). I don't know what is missing here.

    No, we don't need not NAT. wanted to confirm if NAT could cause this problem.

    The config looks good. Can you ping routers ip internal interface the client LAN once it connects?

    Are correct, w.r.t. transatlantic lines reaching pool behind router VPN?

    If so, I would like to take a look at the exits following when a client is connected.

    See the crypto eli

    ISAKMP crypto to show his

    Crypto ipsec to show his

    SPSP

Maybe you are looking for

  • The Bootcamp Partition size

    Hello, recently I downloaded windows on my Macbook Pro early 2015, using boot camp. However, I underestimated the size and now want to increase it. I heard using popular tools to resize like Wiinclone, but I've also heard risks related to the use of

  • Screen black why waking up on Satellite Z830

    Since a few days, I wake up stalls on my Z830 (black screen). Once I thought I thought it had to do with the eco utility, so maybe the Toshiba Power Saver, then eventually the function key utility. Support wrote I should reinstall it from zero (Win7p

  • I downloaded with Firefox; Windows media player plugin decoder and when I go to play dvd, windows media player tell me that my computer doesn't have a decoder installed.

    I downloaded with you windows media player decoder plugin and when I watch a dvd on my computer (I have the dvd) windows media gets up and tells me there is no decoder installed on my computer... I cannot also watch videos on utube, etc in the list o

  • Not all the photos to back up

    Why only 21 photos appear indeed when I try to transfer the photos to the back to the top - I 1 151 in all the Photos. I have the iPhone 5 and the current (9.2.1) operating system. 12.5 GB I'm trying to move some of my photos to another device to fre

  • HP (MS-7613) 478-d with ASUS GTX670 DCUII?

    The desktop computer. http://h20000.www2.HP.com/bizsupport/techsupport/document.jsp?ObjectID=c02589909 & lang = to & CC = US & taskI...I know I have to change my diet to 750 watts. But the card mother compatiable with the asus gtx670?ASUS Gtx670 http