<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 867VAE NAT overload and static internet issues in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097538#M335351</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your crypto peer is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set peer 148.133.208.5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How is your Cisco router connected ? I assume there is another device ?&lt;/P&gt;</description>
    <pubDate>Thu, 04 Jun 2020 12:27:33 GMT</pubDate>
    <dc:creator>Georg Pauwen</dc:creator>
    <dc:date>2020-06-04T12:27:33Z</dc:date>
    <item>
      <title>Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097459#M335341</link>
      <description>&lt;P&gt;I have a&amp;nbsp;Cisco 867VAE with an IPsec to my Cisco ASA. Because the network (192.168.10.0/24) is already used on my site (ASA) I have to NAT the entire network to&amp;nbsp;172.19.66.0/24 for the communication through the ipsec.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As soon as I add the static NAT&amp;nbsp;192.168.10.0/24 can not reach the internet anymore, in return the communication through the ipsec works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;...
ip nat inside source list 180 interface GigabitEthernet2 overload
ip nat inside source static network 192.168.10.0 172.19.66.0 /24 no-alias
...
access-list 180 deny   ip 192.168.10.0 0.0.0.255 10.199.1.0 0.0.0.255
access-list 180 deny   ip 172.19.66.0 0.0.0.255 10.199.1.0 0.0.0.255
access-list 180 deny   ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255
access-list 180 deny   ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255
access-list 180 permit ip 192.168.10.0 0.0.0.255 any
access-list 180 permit ip 172.19.66.0 0.0.0.255 any&lt;BR /&gt;...&lt;/PRE&gt;&lt;P&gt;I'm also not sure which network i have to list in acl 180 and did some tests....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea or advice?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 09:42:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097459#M335341</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-04T09:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097473#M335343</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what traffic is defined in your encryption domain ? Post the full running configuration of your router (show run)...&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 10:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097473#M335343</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T10:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097479#M335345</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/132463"&gt;@sidp&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;As soon as I add the static NAT&amp;nbsp;192.168.10.0/24 can not reach the internet anymore, in return the communication through the ipsec works.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip nat inside source &lt;STRONG&gt;static network&lt;/STRONG&gt; 192.168.10.0 172.19.66.0 /24 &lt;STRONG&gt;no-alias &lt;/STRONG&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Looks like you have negated the rtr from creating arp entries for the translated addressing plus you wouldn’t want static nat performing this fr the whole subnet.&lt;BR /&gt;As suggested can you post the running-configuration of the rtr into a file and attach it to your post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 10:37:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097479#M335345</guid>
      <dc:creator>paul driver</dc:creator>
      <dc:date>2020-06-04T10:37:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097494#M335346</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;no parser cache
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime localtime
service timestamps log datetime localtime
service password-encryption
!
hostname RO01
!
boot-start-marker
boot-end-marker
!
!
logging buffered 16000
enable secret 5 **************
!
aaa new-model
!
!
aaa authentication login vty-con local
aaa authentication login localuser line
aaa authentication login userauthen local
aaa authentication ppp default if-needed local
aaa authorization network groupauthor local 
!
aaa session-id common
wan mode ethernet
clock timezone MEZ 1 0
clock summer-time MESZ recurring last Sun Mar 2:00 last Sun Oct 3:00
no ip source-route
!
ip dhcp excluded-address 192.168.10.255
ip dhcp excluded-address 192.168.10.0 192.168.10.150
!
ip dhcp pool VRMLAN_EXAMPLE
 network 192.168.10.0 255.255.255.0
 default-router 192.168.10.1 
 ip name-server 8.8.8.8&lt;BR /&gt; ip name-server 8.8.4.4
 lease 0 2
!
ip inspect max-incomplete high 1100
ip inspect max-incomplete low 1100
ip inspect one-minute low 1100
ip inspect one-minute high 1100
ip inspect name INTERNET ftp
ip inspect name INTERNET tftp
ip inspect name INTERNET tcp
ip inspect name INTERNET udp
ip inspect name INTERNET realaudio
ip inspect name INTERNET icmp
ip inspect name INTERNET rtsp
ip inspect name INTERNET vdolive
ip inspect name INTERNET dns
no ip bootp server
ip domain lookup source-interface Vlan200
ip domain name example.local
ip name-server 1.1.1.1
ip cef
no ipv6 cef
!
vpdn enable
!
username cisco privilege 15 secret 5 **************
!
controller VDSL 0
 shutdown
!
crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 2
 lifetime 28800
crypto isakmp key ************** address 148.133.208.5    no-xauth
crypto isakmp keepalive 30 5
crypto isakmp nat keepalive 15
!
crypto isakmp client configuration group VPN_EXAMPLE
 key *****************************
 dns 172.19.66.1
 pool ippool
 acl 190
!
crypto ipsec transform-set AES256 esp-aes 256 esp-sha-hmac 
 mode tunnel
crypto ipsec transform-set AES256_S2S esp-aes 256 esp-sha-hmac 
 mode tunnel
!
crypto dynamic-map vpn-dynamic 10
 description *** VPN-Clients ***
 set security-association lifetime seconds 43200
 set transform-set AES256 
!
crypto map IPSECMAP client authentication list userauthen
crypto map IPSECMAP isakmp authorization list groupauthor
crypto map IPSECMAP client configuration address respond
crypto map IPSECMAP 10 ipsec-isakmp 
 description *** S2S
 set peer 148.133.208.5
 set security-association lifetime seconds 28800
 set transform-set AES256_S2S 
 match address 191
 qos pre-classify
crypto map IPSECMAP 65000 ipsec-isakmp dynamic vpn-dynamic 
!
interface ATM0
 description *** ADSL-Interface
 no ip address
 shutdown
 no atm ilmi-keepalive
!
interface Ethernet0
 description *** VDSL-Interface
 no ip address
 shutdown
!
interface FastEthernet0
 switchport access vlan 200
 no ip address
 spanning-tree portfast
!
interface FastEthernet1
 switchport access vlan 200
 no ip address
 spanning-tree portfast
!
interface FastEthernet2
 switchport access vlan 200
 no ip address
 spanning-tree portfast
!
interface GigabitEthernet0
 switchport access vlan 200
 no ip address
 spanning-tree portfast
!
interface GigabitEthernet1
 switchport access vlan 200
 no ip address
 spanning-tree portfast
!
interface GigabitEthernet2
 description *** WAN
 ip address 172.31.255.6 255.255.255.252
 ip access-group 151 in
 ip inspect INTERNET out
 ip nat outside
 ip virtual-reassembly in
 duplex auto
 speed auto
 crypto map IPSECMAP
!
interface Vlan1
 no ip address
 shutdown
!
interface Vlan200
 ip address 192.168.10.1 255.255.255.0
 ip access-group 101 in
 no ip redirects
 ip directed-broadcast
 ip nat inside
 ip virtual-reassembly in
 ip tcp adjust-mss 1200
 hold-queue 100 out
!
ip local pool ippool 10.199.1.0 10.199.1.254
ip forward-protocol nd
no ip http server
no ip http secure-server
!
ip dns server
ip nat inside source list 180 interface GigabitEthernet2 overload
ip route 0.0.0.0 0.0.0.0 172.31.255.5
ip route 127.0.0.0 255.0.0.0 Null0
ip route 169.254.0.0 255.255.0.0 Null0
ip ssh source-interface Vlan200
ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr
ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr
!
snmp-server enable traps tty
access-list 1 permit 148.133.208.0 0.0.0.15
access-list 1 remark *** SSH
access-list 1 permit 172.19.66.0 0.0.0.255
access-list 1 permit 192.168.10.0 0.0.0.255
access-list 1 permit 10.199.1.0 0.0.0.255
access-list 101 permit ip any any
access-list 151 remark *** INTERNET -&amp;gt; ROUTER (CBAC)
access-list 151 remark *** IPSec -&amp;gt; Router
access-list 151 permit esp any host 172.31.255.6
access-list 151 permit udp any host 172.31.255.6 eq isakmp
access-list 151 permit udp any host 172.31.255.6 eq non500-isakmp
access-list 151 permit ip 10.199.1.0 0.0.0.255 192.168.10.0 0.0.0.255
access-list 151 remark *** NTP
access-list 151 permit udp host 130.149.17.21 eq ntp any eq ntp
access-list 151 permit udp host 8.8.8.8 eq domain any
access-list 151 permit udp host 8.8.4.4 eq domain any
access-list 151 remark *** ICMP
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any administratively-prohibited
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any echo
access-list 151 permit icmp any any echo-reply
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any packet-too-big
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any time-exceeded
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any traceroute
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any unreachable
access-list 151 remark *** SSH
access-list 151 permit tcp 148.133.208.0 0.0.0.15 host 172.31.255.6 eq 22
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any administratively-prohibited
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any echo
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any packet-too-big
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any time-exceeded
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any traceroute
access-list 151 permit icmp 148.133.208.0 0.0.0.15 any unreachable
access-list 151 permit tcp 148.133.208.0 0.0.0.15 host 172.31.255.6 eq 22
access-list 151 deny   ip any any log
access-list 180 deny   ip 192.168.10.0 0.0.0.255 10.199.1.0 0.0.0.255
access-list 180 deny   ip 172.19.66.0 0.0.0.255 10.199.1.0 0.0.0.255
access-list 180 deny   ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255
access-list 180 deny   ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255
access-list 180 permit ip 192.168.10.0 0.0.0.255 any
access-list 180 permit ip 172.19.66.0 0.0.0.255 any
access-list 190 deny   ip 172.19.66.0 0.0.0.255 10.199.1.0 0.0.0.255
access-list 191 permit ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255
!
line con 0
 location *** Serial
 exec-timeout 30 0
 logging synchronous
 login authentication vty-con
 no modem enable
 history size 30
 stopbits 1
line aux 0
line 2
 no activation-character
 no exec
 transport preferred none
 transport input all
 stopbits 1
line vty 0 4
 location *** SSH
 access-class 1 in
 exec-timeout 30 0
 login authentication vty-con
 history size 30
 transport input ssh
!
scheduler allocate 60000 1000
sntp server 130.149.17.21
sntp broadcast client
!
end&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 11:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097494#M335346</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-04T11:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097505#M335348</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;change your access list 180 to the one below, so it contains only two lines:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 180 deny ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;access-list 180 permit ip 172.19.66.0 0.0.0.255 any&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 11:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097505#M335348</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T11:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097514#M335349</link>
      <description>Changed it but still the same problem.&lt;BR /&gt;&lt;BR /&gt;RO01#sh ip access-lists 180&lt;BR /&gt;Extended IP access list 180&lt;BR /&gt;10 deny ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;20 permit ip 172.19.66.0 0.0.0.255 any</description>
      <pubDate>Thu, 04 Jun 2020 11:55:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097514#M335349</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-04T11:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097538#M335351</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your crypto peer is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;set peer 148.133.208.5&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How is your Cisco router connected ? I assume there is another device ?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 12:27:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097538#M335351</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T12:27:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097541#M335352</link>
      <description>Yes there is an other device from the provider. It is in PPPoE passthrough mode, without any firewall on it.</description>
      <pubDate>Thu, 04 Jun 2020 12:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097541#M335352</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-04T12:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097597#M335355</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;remove access list 151 from the external interface and check the results:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet2&lt;BR /&gt;description *** WAN&lt;BR /&gt;ip address 172.31.255.6 255.255.255.252&lt;BR /&gt;&lt;STRONG&gt;--&amp;gt; no ip access-group 151 in&lt;/STRONG&gt;&lt;BR /&gt;ip inspect INTERNET out&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map IPSECMAP&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 13:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097597#M335355</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T13:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097629#M335360</link>
      <description>still the same problem</description>
      <pubDate>Thu, 04 Jun 2020 14:14:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097629#M335360</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-04T14:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097664#M335362</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;strip the entire configuration down to the bare bone essentials as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no parser cache&lt;BR /&gt;no service pad&lt;BR /&gt;service tcp-keepalives-in&lt;BR /&gt;service tcp-keepalives-out&lt;BR /&gt;service timestamps debug datetime localtime&lt;BR /&gt;service timestamps log datetime localtime&lt;BR /&gt;service password-encryption&lt;BR /&gt;!&lt;BR /&gt;hostname RO01&lt;BR /&gt;!&lt;BR /&gt;boot-start-marker&lt;BR /&gt;boot-end-marker&lt;BR /&gt;!&lt;BR /&gt;logging buffered 16000&lt;BR /&gt;enable secret 5 **************&lt;BR /&gt;!&lt;BR /&gt;aaa new-model&lt;BR /&gt;!&lt;BR /&gt;aaa authentication login vty-con local&lt;BR /&gt;aaa authentication login localuser line&lt;BR /&gt;aaa authentication login userauthen local&lt;BR /&gt;aaa authentication ppp default if-needed local&lt;BR /&gt;aaa authorization network groupauthor local &lt;BR /&gt;!&lt;BR /&gt;aaa session-id common&lt;BR /&gt;wan mode ethernet&lt;BR /&gt;clock timezone MEZ 1 0&lt;BR /&gt;clock summer-time MESZ recurring last Sun Mar 2:00 last Sun Oct 3:00&lt;BR /&gt;no ip source-route&lt;BR /&gt;!&lt;BR /&gt;ip dhcp excluded-address 192.168.10.255&lt;BR /&gt;ip dhcp excluded-address 192.168.10.0 192.168.10.150&lt;BR /&gt;!&lt;BR /&gt;ip dhcp pool VRMLAN_EXAMPLE&lt;BR /&gt;network 192.168.10.0 255.255.255.0&lt;BR /&gt;default-router 192.168.10.1 &lt;BR /&gt;ip name-server 8.8.8.8&lt;BR /&gt;ip name-server 8.8.4.4&lt;BR /&gt;lease 0 2&lt;BR /&gt;!&lt;BR /&gt;no ip bootp server&lt;BR /&gt;ip domain lookup source-interface Vlan200&lt;BR /&gt;ip domain name example.local&lt;BR /&gt;ip name-server 1.1.1.1&lt;BR /&gt;ip cef&lt;BR /&gt;no ipv6 cef&lt;BR /&gt;!&lt;BR /&gt;vpdn enable&lt;BR /&gt;!&lt;BR /&gt;username cisco privilege 15 secret 5 **************&lt;BR /&gt;!&lt;BR /&gt;controller VDSL 0&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;encr aes 256&lt;BR /&gt;authentication pre-share&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 28800&lt;BR /&gt;crypto isakmp key ************** address 148.133.208.5 no-xauth&lt;BR /&gt;crypto isakmp keepalive 30 5&lt;BR /&gt;crypto isakmp nat keepalive 15&lt;BR /&gt;!&lt;BR /&gt;crypto isakmp client configuration group VPN_EXAMPLE&lt;BR /&gt;key *****************************&lt;BR /&gt;dns 172.19.66.1&lt;BR /&gt;pool ippool&lt;BR /&gt;acl 190&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set AES256 esp-aes 256 esp-sha-hmac &lt;BR /&gt;mode tunnel&lt;BR /&gt;crypto ipsec transform-set AES256_S2S esp-aes 256 esp-sha-hmac &lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;crypto dynamic-map vpn-dynamic 10&lt;BR /&gt;description *** VPN-Clients ***&lt;BR /&gt;set security-association lifetime seconds 43200&lt;BR /&gt;set transform-set AES256 &lt;BR /&gt;!&lt;BR /&gt;crypto map IPSECMAP client authentication list userauthen&lt;BR /&gt;crypto map IPSECMAP isakmp authorization list groupauthor&lt;BR /&gt;crypto map IPSECMAP client configuration address respond&lt;BR /&gt;crypto map IPSECMAP 10 ipsec-isakmp &lt;BR /&gt;description *** S2S&lt;BR /&gt;set peer 148.133.208.5&lt;BR /&gt;set security-association lifetime seconds 28800&lt;BR /&gt;set transform-set AES256_S2S &lt;BR /&gt;match address 191&lt;BR /&gt;qos pre-classify&lt;BR /&gt;crypto map IPSECMAP 65000 ipsec-isakmp dynamic vpn-dynamic &lt;BR /&gt;!&lt;BR /&gt;interface ATM0&lt;BR /&gt;description *** ADSL-Interface&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;no atm ilmi-keepalive&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0&lt;BR /&gt;description *** VDSL-Interface&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;no ip address&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet1&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;no ip address&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet2&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;no ip address&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;no ip address&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1&lt;BR /&gt;switchport access vlan 200&lt;BR /&gt;no ip address&lt;BR /&gt;spanning-tree portfast&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet2&lt;BR /&gt;description *** WAN&lt;BR /&gt;ip address 172.31.255.6 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypto map IPSECMAP&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;no ip address&lt;BR /&gt;shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;no ip redirects&lt;BR /&gt;ip directed-broadcast&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;ip tcp adjust-mss 1200&lt;BR /&gt;hold-queue 100 out&lt;BR /&gt;!&lt;BR /&gt;ip local pool ippool 10.199.1.0 10.199.1.254&lt;BR /&gt;ip forward-protocol nd&lt;BR /&gt;no ip http server&lt;BR /&gt;no ip http secure-server&lt;BR /&gt;!&lt;BR /&gt;ip dns server&lt;BR /&gt;ip nat inside source list 180 interface GigabitEthernet2 overload&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 172.31.255.5&lt;BR /&gt;ip route 127.0.0.0 255.0.0.0 Null0&lt;BR /&gt;ip route 169.254.0.0 255.255.0.0 Null0&lt;BR /&gt;ip ssh source-interface Vlan200&lt;BR /&gt;ip ssh server algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;ip ssh client algorithm encryption aes128-ctr aes192-ctr aes256-ctr&lt;BR /&gt;!&lt;BR /&gt;snmp-server enable traps tty&lt;BR /&gt;access-list 1 permit 148.133.208.0 0.0.0.15&lt;BR /&gt;access-list 1 remark *** SSH&lt;BR /&gt;access-list 1 permit 172.19.66.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 192.168.10.0 0.0.0.255&lt;BR /&gt;access-list 1 permit 10.199.1.0 0.0.0.255&lt;BR /&gt;access-list 180 deny ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;&lt;STRONG&gt;access-list 180 permit ip any any&lt;/STRONG&gt;&lt;BR /&gt;access-list 191 permit ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;!&lt;BR /&gt;line con 0&lt;BR /&gt;location *** Serial&lt;BR /&gt;exec-timeout 30 0&lt;BR /&gt;logging synchronous&lt;BR /&gt;login authentication vty-con&lt;BR /&gt;no modem enable&lt;BR /&gt;history size 30&lt;BR /&gt;stopbits 1&lt;BR /&gt;line aux 0&lt;BR /&gt;line 2&lt;BR /&gt;no activation-character&lt;BR /&gt;no exec&lt;BR /&gt;transport preferred none&lt;BR /&gt;transport input all&lt;BR /&gt;stopbits 1&lt;BR /&gt;line vty 0 4&lt;BR /&gt;location *** SSH&lt;BR /&gt;access-class 1 in&lt;BR /&gt;exec-timeout 30 0&lt;BR /&gt;login authentication vty-con&lt;BR /&gt;history size 30&lt;BR /&gt;transport input ssh&lt;BR /&gt;!&lt;BR /&gt;scheduler allocate 60000 1000&lt;BR /&gt;sntp server 130.149.17.21&lt;BR /&gt;sntp broadcast client&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 15:00:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097664#M335362</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T15:00:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097669#M335363</link>
      <description>&lt;P&gt;Actually, first, try to change the access lists to:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list 180 deny ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;access-list 180 deny ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;access-list 180 permit ip 172.19.66.0 0.0.0.255 any&lt;BR /&gt;access-list 191 permit ip 172.19.66.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;BR /&gt;access-list 191 permit ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 15:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4097669#M335363</guid>
      <dc:creator>Georg Pauwen</dc:creator>
      <dc:date>2020-06-04T15:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4099190#M335497</link>
      <description>They are doing maintenance atm. ... I will try it as soon as the router is online and give you the feedback.</description>
      <pubDate>Mon, 08 Jun 2020 08:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4099190#M335497</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-06-08T08:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 867VAE NAT overload and static internet issues</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4113964#M336517</link>
      <description>&lt;P&gt;Sorry, I forgot to post an update. I was not able to do two "ip nat inside" for the whole network without a route-map which Cisco 867 isn't supporting. I finally did the following.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list 181 permit ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255
! 
route-map VPN_NAT permit 10
 match ip address 181
!
ip nat inside source static 192.168.10.1 172.19.66.1 route-map VPN_NAT
ip nat inside source static 192.168.10.100 172.19.66.100 route-map VPN_NAT
ip nat inside source static 192.168.10.102 172.19.66.102 route-map VPN_NAT
ip nat inside source static 192.168.10.104 172.19.66.104 route-map VPN_NAT
ip nat inside source static 192.168.10.106 172.19.66.106 route-map VPN_NAT
ip nat inside source static 192.168.10.108 172.19.66.108 route-map VPN_NAT
ip nat inside source static 192.168.10.110 172.19.66.110 route-map VPN_NAT
ip nat inside source static 192.168.10.112 172.19.66.112 route-map VPN_NAT
ip nat inside source static 192.168.10.114 172.19.66.114 route-map VPN_NAT
ip nat inside source static 192.168.10.115 172.19.66.115 route-map VPN_NAT
ip nat inside source static 192.168.10.116 172.19.66.116 route-map VPN_NAT
ip nat inside source static 192.168.10.120 172.19.66.120 route-map VPN_NAT
!
access-list 180 deny   ip 192.168.10.0 0.0.0.255 172.18.0.0 0.0.255.255
access-list 180 permit ip 192.168.10.0 0.0.0.255 any
!
ip nat inside source list 180 interface GigabitEthernet2 overload&lt;/PRE&gt;</description>
      <pubDate>Mon, 06 Jul 2020 13:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/cisco-867vae-nat-overload-and-static-internet-issues/m-p/4113964#M336517</guid>
      <dc:creator>sidp</dc:creator>
      <dc:date>2020-07-06T13:56:14Z</dc:date>
    </item>
  </channel>
</rss>

