<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT over VPN  Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260155#M1076747</link>
    <description>&lt;P&gt;Can you draw the topology ?&lt;/P&gt;</description>
    <pubDate>Thu, 17 Dec 2020 15:25:17 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2020-12-17T15:25:17Z</dc:date>
    <item>
      <title>NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260126#M1076741</link>
      <description>&lt;P&gt;Hi colleagues&lt;BR /&gt;I need your supports on this scenario, I have made site to site IPsec vpn configuration with remote office, this office send some traffic to specific system (system A) in my network which has ip 192.168.1.30, and i want this traffic go through other system (system B IP 172.10.110.27), so this system will receive the traffic from remote office and send it to system A and then recieve reply from system A and send back to FW where vpn configuration done. but i need all of this scenario happened in transparent so remote offic just send to system A IP without make any modification or know about this change.&lt;BR /&gt;&lt;BR /&gt;I tried to configure destination NAT in the incoming interface ( NAT source IP: remote office host IP, Destination IP:192.168.1.30 , Translated destination:172.10.100.27) everything goes smootly but in return when system B send the reply that recieved from A&amp;nbsp; to remote office the routing happened and IPsec encapsulation done before NAT (source IP not change to be system A 192.168.1.30) so get SPI related to 172.10.100.27 not to desired one 192.168.1.30&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;from remote office they recievd packet with desired IP details (source IP:192.168.1.30, destination IP:remote office host IP) but&amp;nbsp; with different SPI not belongs to source subnet in VPN ACL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can you help to establish these scenario with any solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 14:52:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260126#M1076741</guid>
      <dc:creator>Mohammedomar05046</dc:creator>
      <dc:date>2020-12-17T14:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260155#M1076747</link>
      <description>&lt;P&gt;Can you draw the topology ?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 15:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260155#M1076747</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2020-12-17T15:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260187#M1076750</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled Diagram-Page-1.png" style="width: 960px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/99763i02215D6F93A31B38/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled Diagram-Page-1.png" alt="Untitled Diagram-Page-1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; this is the topology i have added 172.10.100.27 in ACL so in return traffic routed through VPN tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 16:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260187#M1076750</guid>
      <dc:creator>Mohammedomar05046</dc:creator>
      <dc:date>2020-12-17T16:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260242#M1076754</link>
      <description>&lt;P&gt;I do not believe it works as you expected. Since you already have 192.168.10.30 IP address in the network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;instead you can use any other IP to NAT (which is not used in the network)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;example :&lt;/P&gt;
&lt;P&gt;Source :&lt;/P&gt;
&lt;P&gt;192.168.10.10&lt;/P&gt;
&lt;P&gt;Destination :&lt;/P&gt;
&lt;P&gt;192.168.20.30&lt;/P&gt;
&lt;P&gt;Translated to 172.10.100.27&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or if you added intresting traffic remote site to access 172.10.100.27 - you do not need NAT at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is this make sense ? or am i miss understood the requirement.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 18:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260242#M1076754</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-12-17T18:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260252#M1076755</link>
      <description>&lt;P&gt;system B should be transparent and I don't want other office send traffic to system B directly (172.10.100.27)&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;the remote office should not know about system B in middle,&lt;BR /&gt;&lt;BR /&gt;the normal traffic flow from remote office host IP sends traffic to system A using IPsec Tunnel, and know i need to proxy all traffic and should be handled by system B (works as proxy system)&lt;BR /&gt;&lt;BR /&gt;and in future in case system B removed change will be in my site and easy to recover normal traffic flow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 18:17:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260252#M1076755</guid>
      <dc:creator>Mohammedomar05046</dc:creator>
      <dc:date>2020-12-17T18:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260256#M1076756</link>
      <description>&lt;P&gt;If you want to traffic to go to A and A need to route B, setup a reverse proxy. not sure what traffic we are considering here, if http/https you can do.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But still you have overlap IP between sites,&amp;nbsp; that need to resolved with NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 18:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260256#M1076756</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-12-17T18:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT over VPN  Issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260267#M1076759</link>
      <description>&lt;P&gt;the traffic is SMPP,&amp;nbsp; i just want redirecting traffic and allowed changes only in FW&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i used NAT the packet received from remote office (source IP 193.10.10.10 destination IP 192.168.10.30) and once entered the fw NAT applied so packet became&amp;nbsp;(source IP 193.10.10.10 destination IP 172.10.100.27) so based on routing sent to system B&lt;/P&gt;&lt;P&gt;then system B handled the traffic and sent directly to system A with following details&amp;nbsp;(source IP 172.10.100.27 destination IP 192.168.10.30) then System A reply to B (system B can correlate replay of any request) then B sent this reply to real source which is remote office with packet&amp;nbsp;(source IP 172.10.100.27 destination IP 193.10.10.10) and sent directly to FW&amp;nbsp;&lt;/P&gt;&lt;P&gt;and based on ACL (source IP 172.10.100.27 destination IP 193.10.10.10) this packet encapsulated and SPI assigned (SPI of 172.10.100.27 subnet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the issue occured after NAT where source IP changed and packet became (&amp;nbsp;source IP 192.168.10.30 destination IP 193.10.10.10 with SPI related to 172.10.100.27)&amp;nbsp; so in the other side (remote office ) error message dispalyed as below:&lt;/P&gt;&lt;P&gt;The decapsulated inner packet doesn't match the negotiated policy in the SA. The packet specifies its destination as 193.10.10.10, its source as 192.168.10.30, and its protocol as icmp. The SA specifies its local proxy as 193.10.10.10/255.255.255.255/ip/0&amp;nbsp; and its remote_proxy as&amp;nbsp;172.10.100.0/255.255.255.224/ip/0.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 19:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-over-vpn-issue/m-p/4260267#M1076759</guid>
      <dc:creator>Mohammedomar05046</dc:creator>
      <dc:date>2020-12-17T19:03:03Z</dc:date>
    </item>
  </channel>
</rss>

