<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec with internet access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036834#M1067085</link>
    <description>Manual NAT Policies (Section 1)&lt;BR /&gt;1 (VLAN100) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 65, untranslate_hits = 65&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;BR /&gt;2 (VLAN200) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 10, untranslate_hits = 10&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;BR /&gt;&lt;BR /&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (VLAN100) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 5.148.97.249/27&lt;BR /&gt;2 (VLAN200) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 666, untranslate_hits = 12&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 5.148.97.249/27&lt;BR /&gt;Build-ASA# nat (VLAN200,outside) source static LOCAL-NETS LOCAL-NETS destinati$&lt;BR /&gt;&lt;BR /&gt;nat (VLAN200,outside) source static LOCAL-NETS LOCAL-NETS destination static SPI ^RAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 27 Feb 2020 12:09:16 GMT</pubDate>
    <dc:creator>MohammedNaim3234</dc:creator>
    <dc:date>2020-02-27T12:09:16Z</dc:date>
    <item>
      <title>IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036762#M1067066</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created IPsec tunnel from site A to site B and it is working fine and I can reach both ends but in site A I want to allow users to have internet access but unfortunately, I couldn't I did tried different&amp;nbsp; &amp;nbsp;ways of NAT but that is also didn't work&amp;nbsp;&lt;/P&gt;&lt;P&gt;so here is the run configuration for the ASA can you please help me to find out what is the issue&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: I can ping internet sites from the firewall and I removed the nat but still everything working fine for the IPsec tunnel&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;BR /&gt;: Serial Number: JAD213509RP&lt;BR /&gt;: Hardware: ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.7(1)4&lt;BR /&gt;!&lt;BR /&gt;hostname Build-ASA&lt;BR /&gt;domain-name uk.global.spiraxsarco.com&lt;BR /&gt;enable password $sha512$5000$MF+JvS7koYTGIgZRv2j6mg==$1apzVaXyFjy5jqjN8/RSpA== pbkdf2&lt;BR /&gt;names&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 0&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif mange&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 5.148.97.249 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.100&lt;BR /&gt;vlan 100&lt;BR /&gt;nameif VLAN100&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.50.9 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8.200&lt;BR /&gt;vlan 200&lt;BR /&gt;nameif VLAN200&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.21.11.20 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;no nameif&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name uk.global.spiraxsarco.com&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network BUILD-SW-172.21.11.0_24&lt;BR /&gt;subnet 172.21.11.0 255.255.255.0&lt;BR /&gt;object network SXS-172.20.0.0_16&lt;BR /&gt;subnet 172.20.0.0 255.255.0.0&lt;BR /&gt;object network BUILD-SW-192.168.50.8-30&lt;BR /&gt;subnet 192.168.50.8 255.255.255.252&lt;BR /&gt;object network Local-192.168.50.0_24&lt;BR /&gt;subnet 192.168.50.0 255.255.255.0&lt;BR /&gt;object-group network SPIRAX-NETS&lt;BR /&gt;network-object object SXS-172.20.0.0_16&lt;BR /&gt;object-group network LOCAL-NETS&lt;BR /&gt;network-object object BUILD-SW-172.21.11.0_24&lt;BR /&gt;network-object object BUILD-SW-192.168.50.8-30&lt;BR /&gt;access-list ACL extended permit udp host 81.145.54.250 eq isakmp any&lt;BR /&gt;access-list ACL extended permit gre host 81.145.54.250 any&lt;BR /&gt;access-list ACL extended permit esp host 81.145.54.250 any&lt;BR /&gt;access-list ACL extended permit udp any any eq isakmp&lt;BR /&gt;access-list ACL extended permit tcp any any eq ssh&lt;BR /&gt;access-list ACL extended permit udp any any eq 4500&lt;BR /&gt;access-list ACL extended deny ip any any log&lt;BR /&gt;access-list outside_cryptomap extended permit ip object-group LOCAL-NETS object-group SPIRAX-NETS&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging buffer-size 52428800&lt;BR /&gt;logging buffered informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu mange 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu VLAN100 1500&lt;BR /&gt;mtu VLAN200 1500&lt;BR /&gt;no failover&lt;BR /&gt;no monitor-interface service-module&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 5.148.97.225 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 mange&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map1 1 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map1 1 set pfs group5&lt;BR /&gt;crypto map outside_map1 1 set peer 81.145.54.250&lt;BR /&gt;crypto map outside_map1 1 set ikev1 transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map1 1 set reverse-route&lt;BR /&gt;crypto map outside_map1 interface outside&lt;BR /&gt;crypto ca trustpoint _SmartCallHome_ServerCA&lt;BR /&gt;no validation-usage&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain _SmartCallHome_ServerCA&lt;BR /&gt;certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a&lt;BR /&gt;308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30&lt;BR /&gt;0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117&lt;BR /&gt;30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b&lt;BR /&gt;13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504&lt;BR /&gt;0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72&lt;BR /&gt;20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56&lt;BR /&gt;65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043&lt;BR /&gt;65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30&lt;BR /&gt;36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b&lt;BR /&gt;30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20&lt;BR /&gt;496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65&lt;BR /&gt;74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967&lt;BR /&gt;6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c&lt;BR /&gt;79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562&lt;BR /&gt;6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72&lt;BR /&gt;69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00&lt;BR /&gt;3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b&lt;BR /&gt;e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1&lt;BR /&gt;b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49&lt;BR /&gt;ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969&lt;BR /&gt;7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406&lt;BR /&gt;04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd&lt;BR /&gt;75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983&lt;BR /&gt;cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f&lt;BR /&gt;3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405&lt;BR /&gt;30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701&lt;BR /&gt;0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007&lt;BR /&gt;06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516&lt;BR /&gt;23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f&lt;BR /&gt;2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af&lt;BR /&gt;33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a&lt;BR /&gt;982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98&lt;BR /&gt;097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8&lt;BR /&gt;e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e&lt;BR /&gt;db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f&lt;BR /&gt;e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619&lt;BR /&gt;e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e&lt;BR /&gt;6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6&lt;BR /&gt;183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 am-disable&lt;BR /&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 5&lt;BR /&gt;lifetime 28800&lt;BR /&gt;telnet 0.0.0.0 0.0.0.0 mange&lt;BR /&gt;telnet timeout 60&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 0.0.0.0 0.0.0.0 mange&lt;BR /&gt;ssh timeout 60&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh cipher encryption high&lt;BR /&gt;ssh cipher integrity high&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;tunnel-group 81.145.54.250 type ipsec-l2l&lt;BR /&gt;tunnel-group 81.145.54.250 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:c8f2e0765e3fbe638a3d494a63de3b18&lt;BR /&gt;: end&lt;BR /&gt;Build-ASA#&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 09:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036762#M1067066</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T09:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036765#M1067068</link>
      <description>&lt;P&gt;Hi, Do you want to allow access to the internet over the VPN tunnel or just from the local ASA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you just need internet access from the local ASA, then use the follow example for NAT:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This example NATs traffic from networks in the object LOCAL-NETS&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic LOCAL-NETS interface&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This ensures that traffic over the VPN is not NATTED by the rule above&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 10:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036765#M1067068</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T10:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036789#M1067070</link>
      <description>&lt;P&gt;I did that but when I add&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;nat (INSIDE,OUTSIDE) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;it stops the VPN connection so that is my problem&amp;nbsp;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 10:38:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036789#M1067070</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T10:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036793#M1067071</link>
      <description>&lt;P&gt;Add both of those commands, then provide me the output of "show nat detail".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is important the dynamic nat rule is below the other nat rule, which is why it has the command after-auto.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 10:48:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036793#M1067071</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T10:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036797#M1067072</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is the outcome&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, Translated: 172.21.11.0/24, 192.168.50.8/30&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, Translated: 5.148.97.249/27&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036797#M1067072</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T11:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036805#M1067073</link>
      <description>Ok, it looks like you have sub interfaces, with unique nameif - vlan100 and vlan200.&lt;BR /&gt;&lt;BR /&gt;Modify your nat rules and change nameif of inside to vlan100 and then duplicate the rule for vlan200.</description>
      <pubDate>Thu, 27 Feb 2020 11:10:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036805#M1067073</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T11:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036806#M1067074</link>
      <description>&lt;P&gt;I'm sorry can please explain more what you mean&amp;nbsp;&lt;/P&gt;&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;Modify your nat rules and change nameif of inside to vlan100 and then duplicate the rule for vlan200.&lt;/DIV&gt;&lt;DIV class="lia-message-body-content"&gt;and thank you for your help&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-panel lia-panel-standard MessageTagsTaplet Chrome lia-component-message-view-widget-tags"&gt;&lt;DIV class="lia-decoration-border"&gt;&lt;DIV class="lia-decoration-border-top"&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class="lia-decoration-border-content"&gt;&lt;DIV&gt;&lt;DIV class="lia-panel-heading-bar-wrapper"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036806#M1067074</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T11:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036809#M1067075</link>
      <description>&lt;P&gt;sorry I understand now it is working fine thanks a lot you saved my day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 4, untranslate_hits = 11&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, Translated: 172.21.11.0/24, 192.168.50.8/30&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (VLAN100) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, Translated: 5.148.97.249/27&lt;BR /&gt;2 (VLAN200) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 151, untranslate_hits = 4&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, Translated: 5.148.97.249/27&lt;BR /&gt;Build-ASA#&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:27:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036809#M1067075</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T11:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036820#M1067079</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;unfortunately, it did work for 5 minutes but then the VPN connection has gone can you help me to find what is the issue?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:42:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036820#M1067079</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T11:42:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036822#M1067081</link>
      <description>Ok, glad I could help resolve this for you.</description>
      <pubDate>Thu, 27 Feb 2020 11:44:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036822#M1067081</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T11:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036826#M1067083</link>
      <description>&lt;P&gt;I'm sorry to say it works for 5 minutes and now I can't reach the other end of VPN&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:51:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036826#M1067083</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T11:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036829#M1067084</link>
      <description>&lt;P&gt;You didn't appear to modify the NAT exempt rule for the VPN traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;no &lt;EM&gt;nat (INSIDE,OUTSIDE) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;nat (VLAN100,OUTSIDE) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&amp;nbsp;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat (VLAN200,OUTSIDE) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&amp;nbsp;&lt;/EM&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:59:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036829#M1067084</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-27T11:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036834#M1067085</link>
      <description>Manual NAT Policies (Section 1)&lt;BR /&gt;1 (VLAN100) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 65, untranslate_hits = 65&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;BR /&gt;2 (VLAN200) to (outside) source static LOCAL-NETS LOCAL-NETS destination static SPIRAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;translate_hits = 10, untranslate_hits = 10&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24&lt;BR /&gt;Destination - Origin: 172.20.0.0/16, Translated: 172.20.0.0/16&lt;BR /&gt;&lt;BR /&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (VLAN100) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 5.148.97.249/27&lt;BR /&gt;2 (VLAN200) to (outside) source dynamic LOCAL-NETS interface&lt;BR /&gt;translate_hits = 666, untranslate_hits = 12&lt;BR /&gt;Source - Origin: 172.21.11.0/24, 192.168.50.8/30, 192.168.50.0/24, Translated: 5.148.97.249/27&lt;BR /&gt;Build-ASA# nat (VLAN200,outside) source static LOCAL-NETS LOCAL-NETS destinati$&lt;BR /&gt;&lt;BR /&gt;nat (VLAN200,outside) source static LOCAL-NETS LOCAL-NETS destination static SPI ^RAX-NETS SPIRAX-NETS no-proxy-arp&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Feb 2020 12:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036834#M1067085</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T12:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec with internet access</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036854#M1067089</link>
      <description>can you check the out come after I done the vpn nat</description>
      <pubDate>Thu, 27 Feb 2020 12:49:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-with-internet-access/m-p/4036854#M1067089</guid>
      <dc:creator>MohammedNaim3234</dc:creator>
      <dc:date>2020-02-27T12:49:02Z</dc:date>
    </item>
  </channel>
</rss>

