<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN passthrough ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273625#M1077373</link>
    <description>&lt;P&gt;here is the information passing VPN pass through&amp;nbsp; via ASA :&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001428" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001428&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/inspect.html#wp1522169" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/inspect.html#wp1522169&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 16 Jan 2021 02:51:05 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-01-16T02:51:05Z</dc:date>
    <item>
      <title>VPN passthrough ASA?</title>
      <link>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273572#M1077367</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A vendor is trying to set up a site to site to site VPN connection from their network to a internal router on our network. They have a juniper router on each side with our ASA in between. I have set up a public IP that is natted to the ip address of the Juniper device inside our network. I've also set up an ACL allowing the two public IP's they will be coming from and allowing UDP 500, 4500 TCP 22 and ESP. They are unable to get the tunnel to come up and I believe it may have to do with NAT traversal but not sure what I need to do to enable the traffic to passthrough. I've also tried it without the ACL and with an ACL that allows Any, just for testing. Our ASA is a 5515-X.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be appreciated!!&lt;/P&gt;</description>
      <pubDate>Fri, 15 Jan 2021 23:29:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273572#M1077367</guid>
      <dc:creator>N3t-Guy</dc:creator>
      <dc:date>2021-01-15T23:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough ASA?</title>
      <link>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273625#M1077373</link>
      <description>&lt;P&gt;here is the information passing VPN pass through&amp;nbsp; via ASA :&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001428" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001428&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/inspect.html#wp1522169" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa72/configuration/guide/conf_gd/inspect.html#wp1522169&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jan 2021 02:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273625#M1077373</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-01-16T02:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough ASA?</title>
      <link>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273672#M1077377</link>
      <description>&lt;P&gt;To me, it looks like you did all the work on the ASA. As long the NAT is correctly configured, there shouldn't be an issue. Did the vendor check the logs on Juniper? You can also do a packet capture on the ASA interface facing internal-router and provide to the vendor.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Suresh&lt;/P&gt;</description>
      <pubDate>Sat, 16 Jan 2021 10:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-passthrough-asa/m-p/4273672#M1077377</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2021-01-16T10:17:37Z</dc:date>
    </item>
  </channel>
</rss>

