<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zero NAT on inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082584#M1070046</link>
    <description>&lt;P&gt;I have sent you private message with config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the config i need to add for IPSEC connection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 3600&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set L2L esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group 172.24.32.115 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 172.24.32.115 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key xxxxxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit icmp&amp;nbsp; 10.0.0.0 255.0.0.0&amp;nbsp; 10.70.160.0 255.255.255.248&amp;nbsp; echo log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 554 log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended deny ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP&amp;nbsp; 20 match address LAN_Traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP&amp;nbsp; 20 set peer 172.24.32.115&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP 20 set transform-set L2L&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list NAT_EXEMPT extended permit ip 10.96.96.0 255.255.255.0 10.70.160.248&lt;BR /&gt;nat (inside) 0 access-list NAT_EXEMPT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 09 May 2020 18:38:21 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2020-05-09T18:38:21Z</dc:date>
    <item>
      <title>Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4081994#M1070005</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have this nat for vpn users&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat_pool&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; --------------------current nat&amp;nbsp; for vpn&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also i need IPsec connection for vendor traffic where we do not want nat inside traffic&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ASA&amp;nbsp; 8.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NAT_EXEMPT ------------------------------nat for IPSEC tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How will this work?&lt;/P&gt;&lt;P&gt;Do it has to be in certain order?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 13:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4081994#M1070005</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-08T13:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082066#M1070010</link>
      <description>&lt;P&gt;nat (inside) 0 access-list NAT_EXEMPT ------------------------------nat for IPSEC tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;mean you doing a NAT Exemption. as you running 8.2 which is EOL so if i convert it to 8.3 post. its command will be like this.&lt;/P&gt;
&lt;PRE&gt;object network INSIDE
subnet 1.1.1.0 255.255.0.0
object network OUTSIDE
subnet 2.2.2.0 255.255.0.0
nat (inside,outside) source static INSIDE INSIDE destination static OUTSIDE OUTSIDE&lt;/PRE&gt;
&lt;P&gt;so ideally it should work. have a change control in place if you need to revert back.&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 15:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082066#M1070010</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-08T15:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082103#M1070013</link>
      <description>&lt;P&gt;Thanks for replying.&lt;/P&gt;&lt;P&gt;So if i use NAT exempt for inside interface for two different configs it should work right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does it has to be in any order?&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 15:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082103#M1070013</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-08T15:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082117#M1070015</link>
      <description>&lt;P&gt;Is this change is for the existing vpn tunnel peer or a new vpn tunnel peer?&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 16:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082117#M1070015</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-08T16:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082139#M1070017</link>
      <description>&lt;P&gt;currently we have VPN working and using&amp;nbsp; below nat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside) 0 access-list nonat_pool&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Now for IPSEC i need to add this nat&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside) 0 access-list NAT_EXEMPT&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;so if i add above nat config will vpn users connection will still work?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 17:09:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082139#M1070017</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-08T17:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082436#M1070029</link>
      <description>&lt;P&gt;share your firewall config please in order to give you correct advise.&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 08:34:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082436#M1070029</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-09T08:34:37Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082584#M1070046</link>
      <description>&lt;P&gt;I have sent you private message with config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the config i need to add for IPSEC connection&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto isakmp policy 20&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption aes-256&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 3600&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set L2L esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel-group 172.24.32.115 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group 172.24.32.115 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key xxxxxx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit icmp&amp;nbsp; 10.0.0.0 255.0.0.0&amp;nbsp; 10.70.160.0 255.255.255.248&amp;nbsp; echo log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.2 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp 10.96.96.0 255.255.255.0 host 10.70.160.3 eq 554 log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 80 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit udp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.2&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended permit tcp host 10.70.160.3&amp;nbsp; 10.96.96.0 255.255.255.0 eq 554 log&lt;/P&gt;&lt;P&gt;access-list LAN_Traffic extended deny ip any any log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP&amp;nbsp; 20 match address LAN_Traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP&amp;nbsp; 20 set peer 172.24.32.115&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map VPNCMAP 20 set transform-set L2L&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list NAT_EXEMPT extended permit ip 10.96.96.0 255.255.255.0 10.70.160.248&lt;BR /&gt;nat (inside) 0 access-list NAT_EXEMPT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 May 2020 18:38:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082584#M1070046</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-09T18:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082746#M1070059</link>
      <description>&lt;P&gt;here is the configuration you need to implement in order to bring up the tunnel. I assume 10.96.96.0/24 is your source ip addresses and the remote networks are 10.70.160.x. Is this correct?&lt;/P&gt;
&lt;P&gt;if you want to allow only certain protocols to work with access-list forexample tcp/udp. than you have to give command &lt;STRONG&gt;sysopt connection permit-vpn"&lt;/STRONG&gt; &lt;SPAN class="ILfuVd NA6bn"&gt;&lt;SPAN class="e24Kjd"&gt;Configure the &lt;STRONG&gt;sysopt connection permit&lt;/STRONG&gt;-&lt;STRONG&gt;vpn&lt;/STRONG&gt; command, which exempts traffic that matches the &lt;STRONG&gt;VPN connection&lt;/STRONG&gt; from the access control policy. ... This is the more secure method to allow traffic in the &lt;STRONG&gt;VPN&lt;/STRONG&gt; because external users cannot spoof IP addresses in the remote access &lt;STRONG&gt;VPN&lt;/STRONG&gt; address pool.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;crypto isakmp policy 20
authentication pre-share
encryption aes-256
hash sha
group 2
lifetime 3600
!
crypto ipsec transform-set L2L esp-aes-256 esp-sha-hmac
!
tunnel-group 172.24.32.115 type ipsec-l2l
tunnel-group 172.24.32.115 ipsec-attributes
pre-shared-key xxxxxx
!
access-list LAN_Traffic extended permit ip 10.96.96.0 255.255.255.0 host 10.70.160.2 
access-list LAN_Traffic extended permit ip 10.96.96.0 255.255.255.0 host 10.70.160.3
!
nat (inside) 0 access-list LAN_Traffic
crypto map VPNCMAP  20 match address LAN_Traffic
crypto map VPNCMAP  20 set peer 172.24.32.115                                                                                                                                 
crypto map VPNCMAP 20 set transform-set L2L
!
&lt;/PRE&gt;</description>
      <pubDate>Sun, 10 May 2020 09:09:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4082746#M1070059</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2020-05-10T09:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Zero NAT on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4083621#M1070099</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for answering all the queries here.&lt;/P&gt;&lt;P&gt;Will do this change soon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Appreciate your&amp;nbsp; help on this.&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 21:39:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zero-nat-on-inside-interface/m-p/4083621#M1070099</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2020-05-11T21:39:43Z</dc:date>
    </item>
  </channel>
</rss>

