<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA (8.0(4)) VPN with NAT issues in VPN</title>
    <link>https://community.cisco.com/t5/vpn/asa-8-0-4-vpn-with-nat-issues/m-p/1641682#M50737</link>
    <description>&lt;P&gt;I am trying to setup a VPN tunnel with one of our customers.&amp;nbsp; We usually do all the NATing on a separate ASA, but for this tunnel we have to do it on the same ASA.&amp;nbsp; Now from what I can tell ,my traffic is being NATed, but the ASA does not seem to think it belongs in the tunnel.&amp;nbsp; It is not being encrypted and send out the interface, but not the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the basic layout:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I have a protected DMZ.&amp;nbsp; A server on that DMZ (192.168.6.5, or 192.168.6.6) connects to an internal NAT (192.168.6.34). &lt;/LI&gt;&lt;LI&gt;A dynamic policy hides the two servers (.5 and .6) behind an external IP address (10.10.10.5),&amp;nbsp; the intern al NAT has been statically NATed to the IP address of the customer server (100.100.100.100).&lt;/LI&gt;&lt;LI&gt;The VPN peer on the customer site (200.200.200.200) is configured.&lt;/LI&gt;&lt;LI&gt;Static route for 100.100.100.100 via 200.200.200.200 is configured on the ASA.&lt;/LI&gt;&lt;LI&gt;We also have an external IP address (10.10.10.6) that is exposed to the customer and statically NATed to internal server (192.168.6.10).&lt;UL&gt;&lt;LI&gt;for this exposed IP address, the customer will always come in with the same IP (100.100.100.101), which is also NATed statically to (192.169.6.35)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the customer is attempting to access the exposed IP address (10.10.10.6), the tunnel establishes correctly, but the return traffic is NOT put back into the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure where I have gone wrong, but my rules seem to lead the ASA to believe the traffic does not belong in the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joerg&lt;/P&gt;</description>
    <pubDate>Mon, 07 Feb 2011 20:30:33 GMT</pubDate>
    <dc:creator>joerggrau</dc:creator>
    <dc:date>2011-02-07T20:30:33Z</dc:date>
    <item>
      <title>ASA (8.0(4)) VPN with NAT issues</title>
      <link>https://community.cisco.com/t5/vpn/asa-8-0-4-vpn-with-nat-issues/m-p/1641682#M50737</link>
      <description>&lt;P&gt;I am trying to setup a VPN tunnel with one of our customers.&amp;nbsp; We usually do all the NATing on a separate ASA, but for this tunnel we have to do it on the same ASA.&amp;nbsp; Now from what I can tell ,my traffic is being NATed, but the ASA does not seem to think it belongs in the tunnel.&amp;nbsp; It is not being encrypted and send out the interface, but not the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the basic layout:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I have a protected DMZ.&amp;nbsp; A server on that DMZ (192.168.6.5, or 192.168.6.6) connects to an internal NAT (192.168.6.34). &lt;/LI&gt;&lt;LI&gt;A dynamic policy hides the two servers (.5 and .6) behind an external IP address (10.10.10.5),&amp;nbsp; the intern al NAT has been statically NATed to the IP address of the customer server (100.100.100.100).&lt;/LI&gt;&lt;LI&gt;The VPN peer on the customer site (200.200.200.200) is configured.&lt;/LI&gt;&lt;LI&gt;Static route for 100.100.100.100 via 200.200.200.200 is configured on the ASA.&lt;/LI&gt;&lt;LI&gt;We also have an external IP address (10.10.10.6) that is exposed to the customer and statically NATed to internal server (192.168.6.10).&lt;UL&gt;&lt;LI&gt;for this exposed IP address, the customer will always come in with the same IP (100.100.100.101), which is also NATed statically to (192.169.6.35)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the customer is attempting to access the exposed IP address (10.10.10.6), the tunnel establishes correctly, but the return traffic is NOT put back into the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure where I have gone wrong, but my rules seem to lead the ASA to believe the traffic does not belong in the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Joerg&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2011 20:30:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/asa-8-0-4-vpn-with-nat-issues/m-p/1641682#M50737</guid>
      <dc:creator>joerggrau</dc:creator>
      <dc:date>2011-02-07T20:30:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (8.0(4)) VPN with NAT issues</title>
      <link>https://community.cisco.com/t5/vpn/asa-8-0-4-vpn-with-nat-issues/m-p/1641683#M50738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem seems to be on your end because the traffic is not sent through the tunnel.&lt;/P&gt;&lt;P&gt;You're seeing the local traffic being NATed but not encrypted... do you have the crypto ACL specifying the NATed address instead than the real address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 20:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/asa-8-0-4-vpn-with-nat-issues/m-p/1641683#M50738</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-02-07T20:59:42Z</dc:date>
    </item>
  </channel>
</rss>

