<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT internal address before passing to VPN in VPN</title>
    <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978424#M68898</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnout extended permit ip object-group localnet_sn object-group ETNW (ACL for PAT)&lt;/P&gt;&lt;P&gt;access-list vpnpat extended permit ip object-group S2S_PAT object-group ETNW (ACL for VPN crypto)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 5 10.98.203.112-10.98.203.125 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list vpnout&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map site2 10 match address vpnpat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Jul 2012 16:12:27 GMT</pubDate>
    <dc:creator>nkarthikeyan</dc:creator>
    <dc:date>2012-07-27T16:12:27Z</dc:date>
    <item>
      <title>NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978420#M68894</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been tasked with retiring a VPN Concentrator 3000 and replacing it with an ASA 5520.&amp;nbsp; I'm trying to get a handle on how to set up the NATs and ACLs, since most of my experience is remote access VPNs, not site-to-site.&amp;nbsp; Plus I've not configured a VPN 3000 in about 6 years so I'm having to re-learn a lot of the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN 3000 has a feature called LAN-to-LAN NAT rules that basically allow you to NAT an address on your internal network to an address on the "local" network for the LAN-to-LAN connection so it can then go through the tunnel to the remote side.&amp;nbsp; The config looks something like this in the VPN 3000:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Source Network&amp;nbsp; Translated Network&amp;nbsp; Remote Network &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 172.16.3.151&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.200.151&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.3.136.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which looks to me like a "Static Policy NAT" in ASDM.&amp;nbsp; So I set one of those up, that should be translating 172.16.3.151 on the inside interface to 192.168.200.151 on the inside interface (yes, the same interface) which should then (logically) be picked up as "interesting traffic" by the crypto-map and sent across the VPN tunnel.&amp;nbsp; However, that doesn't seem to be the case - both the "packet trace" in the ASDM and traceroute from the source workstation show the packets getting to the inside interface, and then passed right out the outside interface to the internet router (which then drops the packets as they're a private IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure I've missed something fundamental...what else do I need to do to make the crypto-map pick up the NATted traffic?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jul 2012 03:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978420#M68894</guid>
      <dc:creator>Greg Dickinson</dc:creator>
      <dc:date>2012-07-27T03:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978421#M68895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please attach the running-configuration of your FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Portu&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 04:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978421#M68895</guid>
      <dc:creator>Javier Portuguez</dc:creator>
      <dc:date>2012-07-27T04:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978422#M68896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Here's an (anonymized) coy of the running config.&amp;nbsp; The test tunnel I have set up is between me and the fake IP 12.13.14.66.&amp;nbsp; My PC is 172.16.3.151, which should be NATted to 192.168.168.168 and sent across the tunnel.&amp;nbsp; I know the tunnel is up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by greg.dickinson at 07:59:31.060 CDT Fri Jul 27 2012&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)13 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname DCP-5520-01&lt;/P&gt;&lt;P&gt;domain-name westchester.il.revcs.com&lt;/P&gt;&lt;P&gt;enable password [snipped] encrypted&lt;/P&gt;&lt;P&gt;passwd [snipped] encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 1.2.3.189 RAPP2 description RemoteApp TS Gateway&lt;/P&gt;&lt;P&gt;name 10.199.1.191 Int_RAPP description RemoteApp Employee Server&lt;/P&gt;&lt;P&gt;name 10.199.1.192 Int_RAPP2 description RemoteApp Client Server&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; description **Telx Level 3 Outside Interface**&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.2.3.190 255.255.255.192 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; description **Data Center Inside Interface**&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.199.7.250 255.255.248.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; description **Data Center DMZ Interface**&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.199.8.250 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description **Data Center 5520 Mgmt Interface**&lt;/P&gt;&lt;P&gt; nameif management&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt; ospf cost 10&lt;/P&gt;&lt;P&gt; ospf network point-to-point non-broadcast&lt;/P&gt;&lt;P&gt; management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;banner exec $(hostname).$(domain)&lt;/P&gt;&lt;P&gt;banner exec Access is monitored and logged&lt;/P&gt;&lt;P&gt;banner asdm RCS Data Center - $(hostname)&lt;/P&gt;&lt;P&gt;banner asdm Access is monitored and logged&lt;/P&gt;&lt;P&gt;boot system disk0:/asa825-13-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone CST -6&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup dmz&lt;/P&gt;&lt;P&gt;dns server-group CSI&lt;/P&gt;&lt;P&gt; name-server 172.16.2.251&lt;/P&gt;&lt;P&gt; domain-name cashretriever.com&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 10.199.1.251&lt;/P&gt;&lt;P&gt; name-server 10.199.3.251&lt;/P&gt;&lt;P&gt; domain-name westchester.il.revcs.com&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network RemoteApp_Access&lt;/P&gt;&lt;P&gt; description RemoteApp Server RAPP2 accesses&lt;/P&gt;&lt;P&gt; network-object host RAPP2&lt;/P&gt;&lt;P&gt;object-group service TS_Gateway tcp&lt;/P&gt;&lt;P&gt; description RemoteApp TS Gateway access&lt;/P&gt;&lt;P&gt; port-object eq https&lt;/P&gt;&lt;P&gt; port-object eq ssh&lt;/P&gt;&lt;P&gt; port-object eq 3389&lt;/P&gt;&lt;P&gt;object-group network Livevox_Local&lt;/P&gt;&lt;P&gt; description LiveVox local addresses&lt;/P&gt;&lt;P&gt; network-object host 70.36.21.160&lt;/P&gt;&lt;P&gt; network-object host 70.36.21.170&lt;/P&gt;&lt;P&gt;object-group network Livevox_Remote&lt;/P&gt;&lt;P&gt; description LiveVox Remote Addresses&lt;/P&gt;&lt;P&gt; network-object 204.115.206.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.30&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.32&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.33&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.37&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.39&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.54&lt;/P&gt;&lt;P&gt; network-object host 8.14.80.62&lt;/P&gt;&lt;P&gt;object-group network HCH_Local&lt;/P&gt;&lt;P&gt; network-object 192.168.249.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network HCH_Remote&lt;/P&gt;&lt;P&gt; network-object 128.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt; network-object 172.16.46.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_1_cryptomap extended permit ip object-group HCH_Local object-group HCH_Remote &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group HCH_Local object-group HCH_Remote &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip host 192.168.168.168 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RCSAdmin_splitTunnelAcl standard permit 10.199.0.0 255.255.248.0 &lt;/P&gt;&lt;P&gt;access-list RCSAdmin_splitTunnelAcl standard permit 172.16.0.0 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list RCSAdmin_splitTunnelAcl standard permit 192.168.167.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl remark Chicago PC Network&lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 192.168.167.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 192.168.165.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 192.168.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 192.168.50.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 192.168.5.0 255.255.255.252 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl remark Birmingham Subnet&lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 172.16.0.0 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl remark Point-to-Point Interfaces&lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 10.255.255.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl remark Data Center Subnet&lt;/P&gt;&lt;P&gt;access-list RCS_RA_VPN_splitTunnelAcl standard permit 10.199.0.0 255.255.240.0 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip host 192.168.168.168 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list RCS_RA_splitClient standard permit host Int_RAPP &lt;/P&gt;&lt;P&gt;access-list RCS_RA_splitClient standard permit host Int_RAPP2 &lt;/P&gt;&lt;P&gt;access-list inside_nat_static extended permit ip host 172.16.3.151 10.10.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list ACL_Remote_APP webtype permit url rdp://10.199.1.191 log default&lt;/P&gt;&lt;P&gt;access-list ACL_Remote_APP webtype permit url &lt;/P&gt;&lt;P&gt;&lt;A href="https://10.199.1.192"&gt;https://10.199.1.192&lt;/A&gt; &lt;/P&gt;&lt;P&gt;log default&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging monitor informational&lt;/P&gt;&lt;P&gt;logging buffered informational&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging from-address &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:dcp-5520-asa@revcs.com"&gt;dcp-5520-asa@revcs.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging recipient-address &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:network@revcs.com"&gt;network@revcs.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;level errors&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;ip local pool RCS_AnyConnect_Pool 10.199.2.232-10.199.2.250 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;ip local pool DMZ_AnyConnect 10.199.8.50-10.199.8.75&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;no monitor-interface inside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;asdm location Int_RAPP 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,outside) RAPP2 Int_RAPP2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.168.168&amp;nbsp; access-list inside_nat_static &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 1.2.3.129 1&lt;/P&gt;&lt;P&gt;route inside 10.255.255.0 255.255.255.0 10.199.7.1 1&lt;/P&gt;&lt;P&gt;route inside 172.16.0.0 255.255.248.0 10.199.7.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.167.0 255.255.255.0 10.199.7.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server AD protocol nt&lt;/P&gt;&lt;P&gt;aaa-server AD (inside) host 10.199.1.251&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller RCS-DC-01&lt;/P&gt;&lt;P&gt;aaa-server AD (inside) host 10.199.3.251&lt;/P&gt;&lt;P&gt; nt-auth-domain-controller CHI-DC-01&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS (inside) host 10.199.1.251&lt;/P&gt;&lt;P&gt; key [snipped]&lt;/P&gt;&lt;P&gt; authentication-port 1812&lt;/P&gt;&lt;P&gt; accounting-port 1813&lt;/P&gt;&lt;P&gt; acl-netmask-convert auto-detect&lt;/P&gt;&lt;P&gt;aaa-server RADIUS (inside) host 172.16.2.251&lt;/P&gt;&lt;P&gt; key [snipped]&lt;/P&gt;&lt;P&gt; authentication-port 1812&lt;/P&gt;&lt;P&gt; accounting-port 1813&lt;/P&gt;&lt;P&gt;aaa-server AD2003 protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server AD2003 (inside) host 10.199.1.251&lt;/P&gt;&lt;P&gt; ldap-base-dn [snipped]&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa-server AD2003 (inside) host 192.168.167.251&lt;/P&gt;&lt;P&gt; ldap-base-dn [snipped]&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa-server AD2008 protocol ldap&lt;/P&gt;&lt;P&gt;aaa-server AD2008 (inside) host 10.199.1.251&lt;/P&gt;&lt;P&gt; server-type microsoft&lt;/P&gt;&lt;P&gt;aaa authentication enable console AD LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication http console AD LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console AD LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication secure-http-client&lt;/P&gt;&lt;P&gt;aaa authentication listener https outside port https &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 172.16.0.0 255.255.248.0 inside&lt;/P&gt;&lt;P&gt;http 10.199.0.0 255.255.248.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;http redirect outside 80&lt;/P&gt;&lt;P&gt;snmp-server host inside 10.199.1.199 community revcs-161V version 2c&lt;/P&gt;&lt;P&gt;snmp-server location Data Center&lt;/P&gt;&lt;P&gt;snmp-server contact &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:network@revcs.com"&gt;network@revcs.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;snmp-server community revcs-161D&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 20 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 40 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set pfs &lt;/P&gt;&lt;P&gt;crypto dynamic-map outside_dyn_map 60 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address outside_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set peer 5.6.7.225 &lt;/P&gt;&lt;P&gt;crypto map outside_map 1 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set peer 12.13.14.66 &lt;/P&gt;&lt;P&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map&lt;/P&gt;&lt;P&gt;crypto map outside_map interface outside&lt;/P&gt;&lt;P&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; enrollment self&lt;/P&gt;&lt;P&gt; email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:network@revcs.com"&gt;network@revcs.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; subject-name CN=DCP-5520-01,O=Revenue Cycle Solutions&lt;/P&gt;&lt;P&gt; serial-number&lt;/P&gt;&lt;P&gt; proxy-ldc-issuer&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca trustpoint LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; keypair LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; crl configure&lt;/P&gt;&lt;P&gt;crypto ca server &lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; database path disk0:/&lt;/P&gt;&lt;P&gt; smtp from-address &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:DCP-5520-01@revcs.com"&gt;DCP-5520-01@revcs.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;/P&gt;&lt;P&gt; certificate ca [snipped]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;/P&gt;&lt;P&gt; certificate [snipped]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto ca certificate chain LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt; certificate ca [snipped]&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 5&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 15&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes-256&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 25&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 35&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 45&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 50&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 28800&lt;/P&gt;&lt;P&gt;crypto isakmp policy 55&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 3600&lt;/P&gt;&lt;P&gt;crypto isakmp policy 75&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 1&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;vpn-addr-assign local reuse-delay 5&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 172.16.0.0 255.255.248.0 inside&lt;/P&gt;&lt;P&gt;ssh 10.199.0.0 255.255.248.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.167.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;/P&gt;&lt;P&gt;dhcpd enable management&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics host&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 130.126.24.24&lt;/P&gt;&lt;P&gt;ntp server 10.199.7.1 source inside prefer&lt;/P&gt;&lt;P&gt;ntp server 130.126.24.53 source dmz&lt;/P&gt;&lt;P&gt;ntp server 130.126.24.44&lt;/P&gt;&lt;P&gt;tftp-server inside 10.199.1.199 Configs/&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 inside&lt;/P&gt;&lt;P&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt; enable outside&lt;/P&gt;&lt;P&gt; enable inside&lt;/P&gt;&lt;P&gt; svc image disk0:/anyconnect-win-3.0.5075-k9.pkg 1&lt;/P&gt;&lt;P&gt; svc profiles RCSAdmin_AnyConnect_Profile disk0:/rcsadmin_anyconnect_profile.xml&lt;/P&gt;&lt;P&gt; svc profiles RCSClient_AnyConnect_Profile disk0:/rcsclient_anyconnect_profile.xml&lt;/P&gt;&lt;P&gt; svc enable&lt;/P&gt;&lt;P&gt; port-forward Client_RAPP_Server 2080 10.199.1.192 https RAPP2 TS Web Access Server Page&lt;/P&gt;&lt;P&gt; port-forward RCS_RAPP_Server 2081 10.199.1.191 https RCS Employee RemoteApp Server Access&lt;/P&gt;&lt;P&gt; tunnel-group-list enable&lt;/P&gt;&lt;P&gt;group-policy RCSAdmin internal&lt;/P&gt;&lt;P&gt;group-policy RCSAdmin attributes&lt;/P&gt;&lt;P&gt; wins-server none&lt;/P&gt;&lt;P&gt; dns-server value 10.199.1.251 10.199.3.251&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RCS_RA_VPN_splitTunnelAcl&lt;/P&gt;&lt;P&gt; default-domain value westchester.il.revcs.com&lt;/P&gt;&lt;P&gt; secure-unit-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication disable&lt;/P&gt;&lt;P&gt; user-authentication-idle-timeout none&lt;/P&gt;&lt;P&gt; ip-phone-bypass disable&lt;/P&gt;&lt;P&gt; leap-bypass disable&lt;/P&gt;&lt;P&gt; nem disable&lt;/P&gt;&lt;P&gt; address-pools value RCS_AnyConnect_Pool&lt;/P&gt;&lt;P&gt; client-firewall none&lt;/P&gt;&lt;P&gt; client-access-rule none&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; homepage none&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dtls enable&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc mtu 1406&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keep-installer installed&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc keepalive 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval client 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc dpd-interval gateway 30&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc compression none&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc modules value dart&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc profiles value RCSAdmin_AnyConnect_Profile&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask enable default svc timeout 15&lt;/P&gt;&lt;P&gt;&amp;nbsp; customization value DfltCustomization&lt;/P&gt;&lt;P&gt;&amp;nbsp; deny-message value Login was successful, but because certain criteria have not been met or due to some specific group policy, you do not have permission to use any of the VPN features. Contact your IT administrator for more information.&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc df-bit-ignore disable&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.199.1.251 10.199.3.251&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value RCS_RA_splitClient&lt;/P&gt;&lt;P&gt; default-domain value westchester.il.revcs.com&lt;/P&gt;&lt;P&gt; split-dns value westchester.il.revcs.com revcs.com cashretriever.com &lt;/P&gt;&lt;P&gt; address-pools value RCS_AnyConnect_Pool&lt;/P&gt;&lt;P&gt; webvpn&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc profiles value RCSClient_AnyConnect_Profile&lt;/P&gt;&lt;P&gt;&amp;nbsp; svc ask none default svc&lt;/P&gt;&lt;P&gt;group-policy LiveVox_VPN internal&lt;/P&gt;&lt;P&gt;group-policy LiveVox_VPN attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;group-policy HCH_L2L_VPN internal&lt;/P&gt;&lt;P&gt;group-policy HCH_L2L_VPN attributes&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol l2tp-ipsec &lt;/P&gt;&lt;P&gt;username admin password [snipped] encrypted privilege 15&lt;/P&gt;&lt;P&gt;username support password [snipped] encrypted privilege 15&lt;/P&gt;&lt;P&gt;username gilbert.martin password [snipped] encrypted privilege 15&lt;/P&gt;&lt;P&gt;username will.banister password [snipped] encrypted privilege 15&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt; address-pool (dmz) DMZ_AnyConnect&lt;/P&gt;&lt;P&gt; address-pool RCS_AnyConnect_Pool&lt;/P&gt;&lt;P&gt; authentication-server-group AD LOCAL&lt;/P&gt;&lt;P&gt; authentication-server-group (dmz) AD&lt;/P&gt;&lt;P&gt; accounting-server-group RADIUS&lt;/P&gt;&lt;P&gt; password-management password-expire-in-days 5&lt;/P&gt;&lt;P&gt;tunnel-group DefaultWEBVPNGroup general-attributes&lt;/P&gt;&lt;P&gt; authentication-server-group AD LOCAL&lt;/P&gt;&lt;P&gt;tunnel-group 5.6.7.225 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 5.6.7.225 general-attributes&lt;/P&gt;&lt;P&gt; default-group-policy HCH_L2L_VPN&lt;/P&gt;&lt;P&gt;tunnel-group 5.6.7.225 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key [snipped]&lt;/P&gt;&lt;P&gt;tunnel-group 8.9.10.125 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 8.9.10.125 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key [snipped]&lt;/P&gt;&lt;P&gt;tunnel-group RCS-AnyConnect type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group RCS-AnyConnect general-attributes&lt;/P&gt;&lt;P&gt; address-pool (inside) RCS_AnyConnect_Pool&lt;/P&gt;&lt;P&gt; address-pool RCS_AnyConnect_Pool&lt;/P&gt;&lt;P&gt; authentication-server-group AD LOCAL&lt;/P&gt;&lt;P&gt; authentication-server-group (inside) AD&lt;/P&gt;&lt;P&gt; accounting-server-group RADIUS&lt;/P&gt;&lt;P&gt; default-group-policy RCSAdmin&lt;/P&gt;&lt;P&gt; password-management password-expire-in-days 5&lt;/P&gt;&lt;P&gt;tunnel-group RCS-AnyConnect webvpn-attributes&lt;/P&gt;&lt;P&gt; group-alias RCS_AnyConnect enable&lt;/P&gt;&lt;P&gt;tunnel-group 12.13.14.66 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 12.13.14.66 ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key [snipped]&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;smtp-server 10.199.8.188&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;call-home reporting anonymous&lt;/P&gt;&lt;P&gt;call-home&lt;/P&gt;&lt;P&gt; profile CiscoTAC-1&lt;/P&gt;&lt;P&gt;&amp;nbsp; no active&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address http &lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.cisco.com/its/service/oddce/services/DDCEService"&gt;https://tools.cisco.com/its/service/oddce/services/DDCEService&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination address email &lt;/P&gt;&lt;P&gt;&lt;A href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; destination transport-method http&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;/P&gt;&lt;P&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;/P&gt;&lt;P&gt;Cryptochecksum:8ddd612ce980d489fb8b4690a9a847c2&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 13:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978422#M68896</guid>
      <dc:creator>Greg Dickinson</dc:creator>
      <dc:date>2012-07-27T13:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978423#M68897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes. You can get that done but you need to do nat for the crypto acl simply. but the crypto acl from the other end should get pointed to the nat ip address of yours. I will be posting you an example in next post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 15:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978423#M68897</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-27T15:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978424#M68898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpnout extended permit ip object-group localnet_sn object-group ETNW (ACL for PAT)&lt;/P&gt;&lt;P&gt;access-list vpnpat extended permit ip object-group S2S_PAT object-group ETNW (ACL for VPN crypto)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 5 10.98.203.112-10.98.203.125 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list vpnout&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map site2 10 match address vpnpat&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 16:12:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978424#M68898</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-27T16:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978425#M68899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Karthik... I guess the only questions I have are what do the various object-groups represent?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Localnet_sn, S2S_PAT, and ETNW? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2012 16:27:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978425#M68899</guid>
      <dc:creator>Greg Dickinson</dc:creator>
      <dc:date>2012-07-27T16:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978426#M68900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Greg Dickinson,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the scenario. You may have multiple object groups in your scenario can be done. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your original LAN IP to the Site -B LAN IP permit acl should be used for NAT/PAT.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; access-list NAT_ACLpermit ip 172.16.3.0 255.255.255.0 10.3.136.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.200.0 255.255.255.0 access-list NAT_ACL&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list CryptoACL permit ip 192.168.200.0 255.255.255.0 10.3.136.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map outside_map 1 match address CryptoACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your NAT/PAT IP to LAN IP subnet/IP's @ Site B will be the Cryptoacl for VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So whenever you hit a traffic for site to site from you LAN it will hit the NAT/PAT and get translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then your crypto acl will be with your PAT IP and it should in sync with the Site B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate for the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2012 04:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978426#M68900</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-28T04:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: NAT internal address before passing to VPN</title>
      <link>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978427#M68901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the missing link.&amp;nbsp; Thanks for the help! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2012 16:56:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/nat-internal-address-before-passing-to-vpn/m-p/1978427#M68901</guid>
      <dc:creator>Greg Dickinson</dc:creator>
      <dc:date>2012-07-28T16:56:24Z</dc:date>
    </item>
  </channel>
</rss>

