<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Ipsec Hosted behind FW with Single IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5140847#M1114046</link>
    <description>&lt;P&gt;Apologies for the delay -- here's what the topology looks like (Attached)&lt;/P&gt;&lt;P&gt;On a side note, I did find this link:&amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/vpn/denied-due-to-nat-reverse-path-failure/td-p/2496573" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn/denied-due-to-nat-reverse-path-failure/td-p/2496573&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I've applied it, but haven't had a chance to test this config yet.&amp;nbsp; Could this be the answer?&amp;nbsp; Testing with it via Packet Trace, it appears to work -- although, I had this confirmation before...so who knows.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attaching my full run as well....i did notice a couple of the IPs I included in my diagram didn't match my run config...but my 10 net space works fine -- tons of nat translations etc.&lt;/P&gt;&lt;P&gt;Can't express how much your help is appreciated.&lt;/P&gt;</description>
    <pubDate>Sat, 06 Jul 2024 07:47:36 GMT</pubDate>
    <dc:creator>Plaethos</dc:creator>
    <dc:date>2024-07-06T07:47:36Z</dc:date>
    <item>
      <title>ASA Ipsec Hosted behind FW with Single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5139170#M1113956</link>
      <description>&lt;DIV&gt;&lt;DIV&gt;So my youtube-googlefoo has failed me.&amp;nbsp; I'm looking for some basic help -- and based on that, the issue I'm having, which I don't even know if it's possible....&lt;/DIV&gt;&lt;DIV&gt;I have an ASA 5555-x with advanced license; Cable Modem service with single IP; My VPN termination point is sitting in my DMZ.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;First question out the gate:&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Is it even possible to NAT inside traffic while also serving (to my understanding anyway) 1:1 NAT to VPN headend in the DMZ?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I'm sort of newb/intermediate when it comes to this stuff, so I'm hopeful my info share will be clear with my end goal.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;1.&amp;nbsp; Cable Modem hosts public IP, nats to a 192.168.0.0 /24 subnet.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;2.&amp;nbsp; I have reserved 192.168.0.15 as my Outside Iface.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;3.&amp;nbsp; ASA Inside addr is 192.168.250.3 /29 -- L3 connection via PO to 3850 - vlan 250 - 192.168.250.2). (route inside 10.0.0.0 255.0.0.0 192.168.250.2)&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;LAN is 10.x.x.x/16 - individual SVI's on a 3850&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;4.&amp;nbsp; I am using a DMZ, Subnet is&amp;nbsp; 172.16.250.0 /29&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Static IPs - 172.168.250.1 (gateway/Static on ASA) and 4/5 as Hosts.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | [DMZ] 172.16.250.1&amp;nbsp; -----&amp;nbsp; [hosts] 172.16.250.4/5&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;Internet ----- Pu.bl.ic.IP | 192.168.0.1/24&amp;nbsp; ------ [Outside] 192.168.0.15/24 |&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; | [Inside] 192.168.250.3&amp;nbsp; ----------- [3850] 192.168.250.2 | 10.0.0.0 /16&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;By default I have:&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;nat (inside,outside)&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;nat (dmz,outside)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.1&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;route inside 10.0.0.0 255.0.0.0 192.168.250.2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;Inspect passthrough traffic.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;ACL:&amp;nbsp; Outbound_In in Outside&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;&amp;nbsp; permit any 172.16.250.4 ObjectIpsec (udp/500 - udp/4500)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;So what am I trying to do?&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I would like to setup a site to site vpn using a 3rd party vendor "remote-outside' to the same 3rd party vendor in my DMZ - or to generalize,&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I'd like to allow ipsec udp/500-4500 traffic to my DMZ Host from anywhere remote-outside.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I've read somewhere I need to create a crypto-map to pass the ipsec traffic -- but I don't want to go through the site-to-site wizard unless I have to.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;What I see now from my VPN "headend" is my traffic to my remote is clean and makes it.&amp;nbsp; the return traffic no so much.&amp;nbsp; I end up getting a NoSyn Flag. from&amp;nbsp; Remote to Headend.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Packet Tracer is showing it should work....but it no workie.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Thoughts/Links/Suggestions?&amp;nbsp; I'm all eyes for anyone who can assist.&amp;nbsp; I feel I'm right there....&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2024 23:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5139170#M1113956</guid>
      <dc:creator>Plaethos</dc:creator>
      <dc:date>2024-07-02T23:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Ipsec Hosted behind FW with Single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5139652#M1113991</link>
      <description>&lt;P&gt;can you draw topolgy&amp;nbsp;&lt;BR /&gt;thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jul 2024 22:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5139652#M1113991</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-07-03T22:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Ipsec Hosted behind FW with Single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5140847#M1114046</link>
      <description>&lt;P&gt;Apologies for the delay -- here's what the topology looks like (Attached)&lt;/P&gt;&lt;P&gt;On a side note, I did find this link:&amp;nbsp;&amp;nbsp;&lt;A href="https://community.cisco.com/t5/vpn/denied-due-to-nat-reverse-path-failure/td-p/2496573" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn/denied-due-to-nat-reverse-path-failure/td-p/2496573&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I've applied it, but haven't had a chance to test this config yet.&amp;nbsp; Could this be the answer?&amp;nbsp; Testing with it via Packet Trace, it appears to work -- although, I had this confirmation before...so who knows.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Attaching my full run as well....i did notice a couple of the IPs I included in my diagram didn't match my run config...but my 10 net space works fine -- tons of nat translations etc.&lt;/P&gt;&lt;P&gt;Can't express how much your help is appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jul 2024 07:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-ipsec-hosted-behind-fw-with-single-ip/m-p/5140847#M1114046</guid>
      <dc:creator>Plaethos</dc:creator>
      <dc:date>2024-07-06T07:47:36Z</dc:date>
    </item>
  </channel>
</rss>

