<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with VPN configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121934#M1072144</link>
    <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1076881"&gt;@cjones615&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now that you have that dynamic NAT rule from outside to outside, you will need a NAT exemption rule from your RAVPN "vpntest" network to the Azure networks to ensure that traffic is not natted. e.g&lt;/P&gt;
&lt;PRE&gt;nat (OUTSIDE,OUTSIDE) source static vpntest vpnest destination static AZURE-NET AZURE-NET no-proxy-arp &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH &lt;/P&gt;</description>
    <pubDate>Mon, 20 Jul 2020 15:39:50 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-07-20T15:39:50Z</dc:date>
    <item>
      <title>Issues with VPN configuration</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121891#M1072140</link>
      <description>&lt;P&gt;Having issues with my VPN configuration.&amp;nbsp; I have a couple of servers on prem and a couple in Azure.&amp;nbsp; It worked fine until I added the following commands:&lt;/P&gt;&lt;P&gt;access-list TIMECARD_WS standard permit 5.5.5.5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network vpntest&lt;BR /&gt;subnet 192.168.0.230-192.168.0.239 255.255.252.0&lt;BR /&gt;nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The commands were needed to allow employees to access their timecard when they are working remotely.&amp;nbsp; The timecard website only allows entries when coming from our outside presented ip address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once I executed those commands, I got the website to work, but now I can't access any of the server in Azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 14:56:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121891#M1072140</guid>
      <dc:creator>cjones615</dc:creator>
      <dc:date>2020-07-20T14:56:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with VPN configuration</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121910#M1072142</link>
      <description>&lt;P&gt;we need more information - TIMECARD_WS - where this was applied what interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you applied on the interface only this Access-list all will be dropped except this, this is normal behaviour,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you like both should work, you need to tweak the ACL as per the requirement.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Post full configuraiton - all working, after adding this ACL to understand better.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 15:14:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121910#M1072142</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-07-20T15:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with VPN configuration</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121925#M1072143</link>
      <description>&lt;P&gt;here is the config&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 15:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121925#M1072143</guid>
      <dc:creator>cjones615</dc:creator>
      <dc:date>2020-07-20T15:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with VPN configuration</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121934#M1072144</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1076881"&gt;@cjones615&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now that you have that dynamic NAT rule from outside to outside, you will need a NAT exemption rule from your RAVPN "vpntest" network to the Azure networks to ensure that traffic is not natted. e.g&lt;/P&gt;
&lt;PRE&gt;nat (OUTSIDE,OUTSIDE) source static vpntest vpnest destination static AZURE-NET AZURE-NET no-proxy-arp &lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH &lt;/P&gt;</description>
      <pubDate>Mon, 20 Jul 2020 15:39:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4121934#M1072144</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-07-20T15:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with VPN configuration</title>
      <link>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4122553#M1072172</link>
      <description>&lt;P&gt;That worked!&amp;nbsp; Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 11:35:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issues-with-vpn-configuration/m-p/4122553#M1072172</guid>
      <dc:creator>cjones615</dc:creator>
      <dc:date>2020-07-21T11:35:43Z</dc:date>
    </item>
  </channel>
</rss>

