<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: pix vpn tunnel + nat  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622047#M1031198</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shading a little light on the case would be really helpfull&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Feb 2007 04:44:14 GMT</pubDate>
    <dc:creator>zulqurnain</dc:creator>
    <dc:date>2007-02-02T04:44:14Z</dc:date>
    <item>
      <title>pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622043#M1031096</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have been trying to work out this problem since more then two weeks now, but all my efforts are going in vain. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we 've a vpn tunnel established with our partner and working perfectly, now we 've been asked for the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. this partner will connect to our network through this vpn tunnel&lt;/P&gt;&lt;P&gt;2. onces inside our network they will connect to our other partner using our network, who is directly connected to us, &lt;/P&gt;&lt;P&gt;   although the second partner router which is inside our premises is only allowing few IP's from our internal network.&lt;/P&gt;&lt;P&gt;3. since due to security we connects to first partner using pre-defined Private Range IP Addresses ( i mean we do nat on &lt;/P&gt;&lt;P&gt;   our pix from internal IP Addresses to this pre-defined ip addresses) e.g. our network 192.168.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;   and pre-defined VPN Natted IP Address we use 10.10.60.0-25 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;4. This time "they" will try to establish a connection on IP Address 10.10.60.20 through our firewall to second partner &lt;/P&gt;&lt;P&gt;   as following&lt;/P&gt;&lt;P&gt;		&lt;/P&gt;&lt;P&gt;   1st partner server ----- pix ---- internal router ----- 2nd partner router ----- 2nd partner server (different subnet) 172.16.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. At this point in our pix we 've to change IP Addresses like following to make sure that first partner connects to second&lt;/P&gt;&lt;P&gt;   partner transparently meaning to second partner it will look like the traffic is coming from us instead of any other. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;      172.18.20.21(1st partner source IP) ------------- 192.168.1.200(our internal LAN IP, known to 2nd partner router to allow traffic&lt;/P&gt;&lt;P&gt;      10.10.60.20 (1st partner destination IP) ---------- 172.16.10.2 (2nd partner server ip, actually destination for 1st partner)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for all above mentioned case i 've tried do the following on pix but apperantly like i said all went in vain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. global (outside) 50 10.10.60.20&lt;/P&gt;&lt;P&gt;   nat (inside) 50 172.16.10.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. static (inside,outside) 10.10.60.20 192.168.1.200 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;   access-list VPN-PartnerOne permit ip host 10.10.60.20 host 172.18.20.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now i am trying this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 10.10.60.20 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.1.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 172.16.10.0 255.255.255.255 192.168.1.100 (our internal router)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this statement will tell our pix that 172.16.10.0 is trusted network and will now where to route packets&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622043#M1031096</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2019-03-11T09:27:45Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622044#M1031125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;little guidance and help from you experts would really great. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 20:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622044#M1031125</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-01T20:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622045#M1031158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, if I understand correctly, you are attempting to make Partner 1 appear as if it is on your inside network 192.168.1.0. Is this correct? Why doesn't partner 2 just allow their subnet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 21:02:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622045#M1031158</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-02-01T21:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622046#M1031181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that's correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Due to security issue's partner 2 does not want to do that and also other implications with management. therefore, this is the best possible solution we have to make. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Feb 2007 21:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622046#M1031181</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-01T21:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622047#M1031198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shading a little light on the case would be really helpfull&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 04:44:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622047#M1031198</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-02T04:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622048#M1031215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i don't believe this, no replies from any person. atleast one can say it's not possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 10:23:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622048#M1031215</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-02T10:23:02Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622049#M1031228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any body out there&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 17:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622049#M1031228</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-02T17:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622050#M1031238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To translate first partners ip address in your above example &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.1.200 172.18.20.21 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to make sure that 192.168.1.200 will be routed back to your pix when traffic returns from the 2nd partner to the first partner. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the server translation &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.60.20 172.16.10.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you will need the route on the pix for the 172.16.10.0/24 network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;your crypto access-list VPN-PartnerOne is correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 18:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622050#M1031238</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-02T18:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622051#M1031244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks alot for the reply. as for the route i believe what i wrote is also correct ofcourse otherwise i will work it out, but i though i should take the advice&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 18:59:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622051#M1031244</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-02T18:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622052#M1031249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to take care of two routing issues:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your pix needs to be able to route to 172.16.10.2. It looks like you have this correct in your post. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your internal router needs to know that 192.168.1.200 (which is the Natted partner 1 ip address ) is to be routed back to the pix. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should do it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Feb 2007 21:23:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622052#M1031249</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-02T21:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622053#M1031251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i tried your steps, but i guess something is still not right, as in my syslog from pix i am receving this messages. *log is attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i configured like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.1.200 172.18.20.21 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.60.20 172.16.10.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Partner_One permit ip host 10.10.60.20 host 172.18.20.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 172.16.10.0 255.255.255.255 172.20.4.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as you we will see in the log that after a while i get SYN_TIMEOUT message appearing. can't understand why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Feb 2007 09:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622053#M1031251</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-03T09:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622054#M1031253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought 192.168.1.100 was your internal router. Does the pix know how to get to 172.20.4.100 ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately i don't have excel on this laptop so i will look on Monday at work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you can do is on the inside interface of your pix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug packet inside dst 172.16.10.2 &lt;/P&gt;&lt;P&gt;debug packet inside src 172.16.10.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will show you whether everything is flowing through the pix and into your internal network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Feb 2007 16:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622054#M1031253</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-02-03T16:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: pix vpn tunnel + nat</title>
      <link>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622055#M1031255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;actually i made a silly mistake, i.e. while writing the config on the notepad just before copy pasting on to the pix telnet, by mistake i wrote 192.168.11.100. but later while examining the config i found my own dumb mistake. anyways, it worked after i changed it to what it should 've been.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks alot for your help &amp;amp; support. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Feb 2007 04:26:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-vpn-tunnel-nat/m-p/622055#M1031255</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-02-04T04:26:43Z</dc:date>
    </item>
  </channel>
</rss>

