<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi the link is too old. i in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097319#M133643</link>
    <description>&lt;P&gt;Hi the link is too old. i mean they running version 7. where at the moment 9.x. even the nat statement is different.&lt;/P&gt;</description>
    <pubDate>Tue, 01 Aug 2017 15:22:02 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2017-08-01T15:22:02Z</dc:date>
    <item>
      <title>ASA behind Router VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097315#M133633</link>
      <description>&lt;P&gt;Hi here is the problem.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Router1&amp;nbsp; SITE1--------- INTERNET ---------SITE2&amp;nbsp;&amp;nbsp; ASA------Router2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;wanted to setup a VPN site to site vpn between the ROUTER1 and ROUTER2. however as there is a ASA between. is it possible. do not want to configure a VPN on ASA but wanted to configure a vpn on Router2.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;router1&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;&amp;nbsp;encr aes 256&lt;BR /&gt;&amp;nbsp;hash sha512&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;crypto isakmp key cisco12345 address 209.165.201.254&lt;BR /&gt;crypto ipsec transform-set VPN esp-aes esp-sha512-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;crypto map VPN 1 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;set peer 209.165.201.254&lt;BR /&gt;&amp;nbsp;set transform-set VPN&lt;BR /&gt;&amp;nbsp;match address 100&lt;BR /&gt;&amp;nbsp;crypto map VPN&lt;/P&gt;
&lt;P&gt;show access-list&lt;BR /&gt;Extended IP access list 100&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit udp any any eq non500-isakmp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit udp any any eq isakmp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 40 permit ip 10.1.1.0 0.0.0.255 10.2.2.0 0.0.0.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Router2&lt;/P&gt;
&lt;P&gt;crypto isakmp policy 1&lt;BR /&gt;&amp;nbsp;encr aes 256&lt;BR /&gt;&amp;nbsp;hash sha512&lt;BR /&gt;&amp;nbsp;authentication pre-share&lt;BR /&gt;&amp;nbsp;group 5&lt;BR /&gt;crypto isakmp key cisco12345 address 209.165.200.1&lt;BR /&gt;crypto ipsec transform-set VPN esp-aes esp-sha512-hmac&lt;BR /&gt;&amp;nbsp;mode tunnel&lt;BR /&gt;crypto map VPN 1 ipsec-isakmp&lt;BR /&gt;&amp;nbsp;set peer 209.165.200.1&lt;BR /&gt;&amp;nbsp;set transform-set VPN&lt;BR /&gt;&amp;nbsp;match address 100&lt;BR /&gt;&amp;nbsp;crypto map VPN&lt;/P&gt;
&lt;P&gt;#show access-lists&lt;BR /&gt;Extended IP access list 100&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 permit ip 10.2.2.0 0.0.0.255 10.1.1.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit udp any any eq non500-isakmp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit udp any any eq isakmp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I gave a spare public ip to ROUTER2 what config do i have to make on firewall. what nat. policy nat please hlep&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:45:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097315#M133633</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-12T09:45:38Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097316#M133635</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_22 gr-alert gr_gramm gr_inline_cards gr_disable_anim_appear Punctuation only-ins replaceWithoutSep" id="22" data-gr-id="22"&gt;Yes&lt;/G&gt; it is possible.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to make ASA as a VPN &lt;G class="gr_ gr_46 gr-alert gr_spell gr_inline_cards gr_disable_anim_appear ContextualSpelling ins-del" id="46" data-gr-id="46"&gt;passthrough&lt;/G&gt; device.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to allow UDP 500,4500 and ESP traffic on the ASA for the two VPN peers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;More info on this link:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/63881-ipsec-pix70-nat.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Aditya&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Please rate helpful and mark correct answers&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 16:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097316#M133635</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2017-07-31T16:05:18Z</dc:date>
    </item>
    <item>
      <title>Hi sherazrose,</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097317#M133639</link>
      <description>&lt;P&gt;Hi&amp;nbsp;sherazrose,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You need to configure one to one NAT for routers public IP&amp;nbsp;and allow traffic from WAN to LAN for these ports and protocols. Let me know the router private IP to help you with the configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:19:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097317#M133639</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-08-01T15:19:44Z</dc:date>
    </item>
    <item>
      <title>hi what will be the nat</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097318#M133642</link>
      <description>&lt;P&gt;hi what will be the nat statment&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static INTERNAL EXTERNAL&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static PUBLIC-IPADDRESS&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:20:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097318#M133642</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2017-08-01T15:20:53Z</dc:date>
    </item>
    <item>
      <title>Hi the link is too old. i</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097319#M133643</link>
      <description>&lt;P&gt;Hi the link is too old. i mean they running version 7. where at the moment 9.x. even the nat statement is different.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097319#M133643</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2017-08-01T15:22:02Z</dc:date>
    </item>
    <item>
      <title>Configuration will be like</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097320#M133644</link>
      <description>&lt;P&gt;Configuration will be like the following:-&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network&amp;nbsp;ROUTER2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host &amp;lt;Private IP of router&amp;gt;&lt;BR /&gt;nat (inside,outside) static&amp;nbsp;209.165.201.254&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network&amp;nbsp;ROUTER1&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host&amp;nbsp;209.165.200.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object-group service VPN-SERVICES udp&lt;BR /&gt; port-object eq isakmp&lt;BR /&gt; port-object eq 4500&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in extended permit udp object ROUTER1&amp;nbsp;object&amp;nbsp;ROUTER2 object-group VPN-SERVICES&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit esp object ROUTER1 object ROUTER2&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 15:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097320#M133644</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-08-01T15:31:03Z</dc:date>
    </item>
    <item>
      <title>Hi Sherazrose,</title>
      <link>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097321#M133646</link>
      <description>&lt;P&gt;Hi Sherazrose,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;See my comment above for sample configuration&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 17:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-behind-router-vpn/m-p/3097321#M133646</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-08-01T17:29:49Z</dc:date>
    </item>
  </channel>
</rss>

