<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078414#M1069800</link>
    <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for answering all the questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
    <pubDate>Sat, 02 May 2020 22:35:00 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2020-05-02T22:35:00Z</dc:date>
    <item>
      <title>Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078244#M1069780</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have Cisco ASA 5520 configured for remote VPN where users running windows laptop use vpn client software to connect to&lt;/P&gt;&lt;P&gt;the company network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now for new project I need to config site to site IPSEC tunnel for vendor to connect to our network.&lt;/P&gt;&lt;P&gt;For this I need to use the ASA outside interface.&lt;/P&gt;&lt;P&gt;Need to know if i config ASA outside interface for site to site ipsec will it cause any issues with ASA config for Remote VPN users?&lt;/P&gt;&lt;P&gt;Any issues will it cause to Remote VPN connections?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 04:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078244#M1069780</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-02T04:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078274#M1069782</link>
      <description>Hi.&lt;BR /&gt;There should be no issues running a Site-to-Site VPN and Remote Access VPN on the same outside interface.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Sat, 02 May 2020 07:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078274#M1069782</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-05-02T07:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078368#M1069793</link>
      <description>&lt;P&gt;This will work fine.&amp;nbsp; I do this all the time.&amp;nbsp; What you do is NAT your interesting traffic to your interface IP with destination of the remote side of the VPN, then configure your site to site VPN with the public IP of your ASA.&lt;/P&gt;
&lt;P&gt;NAT example:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network LOCAL-LAN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;subnet 10.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;subnet 11.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic LOCAL-LAN interface destination static REMOTE-LAN REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 17:54:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078368#M1069793</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-05-02T17:54:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078389#M1069795</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to see reply from you.&lt;/P&gt;&lt;P&gt;We are running old code&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)59&lt;BR /&gt;Device Manager Version 6.4(9)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we want is that inside traffic subnet 10.96.96.0/24 going to vendor network can access the 10.70.160.0/29 network.&lt;/P&gt;&lt;P&gt;This is&amp;nbsp; Private network connection that goes via our ISP and it is using 172.24.x.x and 10.x.x.x network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outside Interface IP is 10.61.10.20.&lt;/P&gt;&lt;P&gt;We do not want any NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So this NAT config is good&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.96.96.0 10.96.96.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;crypto isakmp enable outside
crypto isakmp policy 1
 authentication pre-share
 encryption aes-256
 hash sha
 group 2
 lifetime 86400&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG&gt;crypto ipsec transform-set L2L esp-aes-256 esp-sha-hmac&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list LAN_Traffic extended permit ip 10.96.96.0 255.255.255.010.71.160.0 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;tunnel-group 172.24.32.115 type ipsec-l2l&lt;BR /&gt;tunnel-group 172.24.32.115 ipsec-attributes&lt;BR /&gt;pre-shared-key XXXXXXXXXX&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;PRE&gt;crypto map L2L 1 match address LAN_Traffic
crypto map L2L 1 set peer 172.24.32.115
crypto map L2L 1 set transform-set L2L&lt;/PRE&gt;&lt;PRE&gt;&lt;STRONG&gt;crypto map L2L interface outside&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IS this config good.&lt;/P&gt;&lt;P&gt;Please check?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And security policy will allow any traffic from 10.96.96.x to 10.70.160.x right?&lt;/P&gt;&lt;P&gt;Also I&amp;nbsp; need security policy to allow traffic from vendor to our network if vendor ping from subnet 10.70.160.0 to 10.96.96.2 right?&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 20:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078389#M1069795</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-02T20:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078395#M1069796</link>
      <description>&lt;P&gt;Yes configuration looks good. however you running old software which is EOL so consider doing upgrade. &lt;A href="http://authentication pre-share  encryption aes-256  hash sha  group 2  lifetime 86400" target="_self"&gt;here&lt;/A&gt; document mentioned how to setup a site to site vpn version 8.0.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you configuration for nat will be like this&lt;/P&gt;
&lt;PRE&gt;nat (inside) 0 access-list inside_nat0_outbound
!
access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 remote 255.255.255.0 &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And security policy will allow any traffic from 10.96.96.x to 10.70.160.x right?&lt;/P&gt;
&lt;P&gt;correct.&lt;/P&gt;
&lt;P&gt;Also I need security policy to allow traffic from vendor to our network if vendor ping from subnet 10.70.160.0 to 10.96.96.2 right?&lt;/P&gt;
&lt;P&gt;correct&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 20:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078395#M1069796</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-02T20:58:22Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078397#M1069797</link>
      <description>&lt;P&gt;Need to confirm that NAT config below is correct&lt;/P&gt;&lt;P&gt;Also this NAT will only apply to the below NAT config right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;PRE&gt;access-list inside_nat0_outbound extended permit ip 10.96.96.0 255.255.255.0  10.70.10.0 255.255.248&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 21:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078397#M1069797</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-02T21:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078408#M1069799</link>
      <description>&lt;P&gt;yes correct. here is the sample configuration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;crypto isakmp enable outside
!
crypto isakmp policy 1
  authentication pre-share
  encryption aes
  hash sha
  group 2
  lifetime 86400
!
 tunnel-group 8.8.8.8 type ipsec-l2l
 tunnel-group 8.8.8.8 ipsec-attributes 
  pre-shared-key superman
!
access-list 100 extended permit ip 10.96.96.0 255.255.255.0 10.70.10.0 255.255.248
!
crypto ipsec transform-set myset esp-aes esp-sha-hmac
!
crypto map outside_map 10 set peer 8.8.8.8
crypto map outside_map 10 match address 100
crypto map outside_map 10 set transform-set myset
crypto map outside_map 10 set pfs
crypto map outside_map interface outside
!
group-policy SITE_A internal
 vpn-tunnel-protocol ipsec
!
group-policy SITE_A attributes
 vpn-idle-timeout none
!
tunnel-group 8.8.8.8 general-attributes
 default-group-policy SITE_A
!
NAT Exemption
access list that defines the traffic to be exempted from the NAT checks. In this version, it appears similar to the access list that you defined for 
the traffic of interest:
!
access-list nonat line 1 extended permit ip 10.96.96.0 255.255.255.0 10.70.10.0 255.255.248
!
The access list is used with the NAT, as shown here:
!
nat (inside) 0 access-list nonat
!
Note: The inside here refers to the name of the inside interface on which the ASA receives the traffic that matches the access list.
&lt;/PRE&gt;</description>
      <pubDate>Sat, 02 May 2020 22:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078408#M1069799</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-02T22:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078414#M1069800</link>
      <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for answering all the questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sat, 02 May 2020 22:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4078414#M1069800</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-02T22:35:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cisco ASA outside interface for IPSEC tunnel and Remote VPN</title>
      <link>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4079906#M1069873</link>
      <description>&lt;P&gt;Seems one thing need too confirm as we want to allow traffic which is initiated&amp;nbsp; from outside to inside like below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp host 10.70.160.2 10.96.96.0 255.255.255.0 eq 554 log&lt;BR /&gt;access-list outside_acl extended permit tcp host 10.70.160.3 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also for inside interface i have below acl already configured say&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;access-list inside_acl extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 80 log&lt;BR /&gt;access-list inside_acl extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 80 log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so in crypto map how i will refer which name i need to refer to?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;do i need to create new acl and name it say nonat and config the above acl there?&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 17:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-cisco-asa-outside-interface-for-ipsec-tunnel-and-remote/m-p/4079906#M1069873</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-05T17:12:25Z</dc:date>
    </item>
  </channel>
</rss>

