<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi estebanvojacek, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936098#M155701</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/estebanvojacek" title="View user profile." class="username" lang="" about="/users/estebanvojacek" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;estebanvojacek&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That works, my example was not that specific with the https protocol, now keep in mind that if you don't use a destination they are going to have limited internet access as well (only https), now about having 2000 clients that should not really cause a problem with the nat since at the end is just a simple nat.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JP-&lt;/P&gt;</description>
    <pubDate>Fri, 26 Aug 2016 01:38:45 GMT</pubDate>
    <dc:creator>JP Miranda Z</dc:creator>
    <dc:date>2016-08-26T01:38:45Z</dc:date>
    <item>
      <title>VPN + NAT</title>
      <link>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936095#M155696</link>
      <description>&lt;P&gt;Hello Guys:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am trying to do a VPN + NAT on my ASA 5545x 9.6 device, this is my scenario:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;BR /&gt;Interfaces:&lt;/SPAN&gt;&lt;BR /&gt;-outside&lt;BR /&gt;-VLAN43 (my VPN pool) 10.43.0.0 / 255.255.248.0&lt;BR /&gt;-VLAN200 (my DMZ VLAN) 10.20.2.0 / 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Security-Level:&lt;/SPAN&gt;&lt;BR /&gt;-outside (0)&lt;BR /&gt;-VLAN43 (10)&lt;BR /&gt;-VLAN200 (100)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I have an https server hosted in the VLAN200 with IP 10.20.2.100.&lt;BR /&gt;I want for my outside users to be able to login to the VPN (configured inside the same ASA w/dhcp pool 10.43.0.1 - 7.255 ipsec clients) and point the Internet Browser to the address &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;&lt;A href="https://10.43.0.90" target="_blank"&gt;https://10.43.0.90&lt;/A&gt;&lt;/STRONG&gt;&lt;/SPAN&gt; and being able to access the host 10.20.2.100 (nat from 10.43.0.90 to 10.20.2.100 https).&lt;BR /&gt;VPN config is all set up and working, but I am not able to create the nat config rule to work on the inside of the VPN.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any suggestions?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936095#M155696</guid>
      <dc:creator>estebanvojacek</dc:creator>
      <dc:date>2019-03-12T08:09:55Z</dc:date>
    </item>
    <item>
      <title>Hi estebanvojacek,</title>
      <link>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936096#M155698</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/estebanvojacek" title="View user profile." class="username" lang="" about="/users/estebanvojacek" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;estebanvojacek&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can use the following nat:&lt;/P&gt;
&lt;P&gt;object network obj-&lt;SPAN&gt;10.20.2.100&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;host 10.20.2.100&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;object network nat-10.43.0.90&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;host 10.43.0.90&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;nat (&lt;SPAN&gt;VLAN200,outside) source static obj-10.20.2.100&amp;nbsp;nat-10.43.0.90 destination static &amp;lt;vpnpool&amp;gt; &amp;lt;vpnpool&amp;gt;&amp;nbsp;no-proxy-arp route-lookup&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can test this doing a packet tracer to a VPN user already connected:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input vlan200 tcp 10.20.2.100 12345 &amp;lt;VPNclientaddress&amp;gt; detail&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JP-&lt;/P&gt;</description>
      <pubDate>Tue, 23 Aug 2016 22:00:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936096#M155698</guid>
      <dc:creator>JP Miranda Z</dc:creator>
      <dc:date>2016-08-23T22:00:17Z</dc:date>
    </item>
    <item>
      <title>Thank you JP...sadly that</title>
      <link>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936097#M155700</link>
      <description>&lt;P&gt;Thank you JP...sadly that doesn't work, or I am putting my rules wrong.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I did was, to unlock my vpn users from the vlan43, basically I removed the vlan43 value from the VPN Group Policy (GroupPolicy1), then added a new access-list rule to block all traffic from vlan43 to the outside, letting out only traffic to my https server on my web server on the vlan200, and it worked great!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is my config:&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network vlan43&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;subnet 10.43.0.0 255.255.248.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;description vlan43&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network webserver-extip&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;host 10.43.0.90&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network webserver&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;host 10.20.2.100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list vlan43_access_out extended permit tcp object vlan43 host 10.43.0.90 eq https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list vlan43_access_out extended deny ip object vlan43 any&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;BR /&gt;object network webserver&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;nat (vlan200,outside) static webserver-extip service tcp https https&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;!&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;group-policy GroupPolicy1 attributes&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;vpn-filter value vlan43_access_out&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;vpn-tunnel-protocol ikev1 l2tp-ipsec&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;[etc..]&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-size: 12pt;"&gt;This way works great, but..my only concern here is..I will be handling near 2000 users on this vpn, and they will be accessing this 10.43.0.90 host, am I using too much cpu for these nat and access-list?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Should I acomplish this in any other way?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;Thank you guys.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 18:09:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936097#M155700</guid>
      <dc:creator>estebanvojacek</dc:creator>
      <dc:date>2016-08-25T18:09:26Z</dc:date>
    </item>
    <item>
      <title>Hi estebanvojacek,</title>
      <link>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936098#M155701</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/estebanvojacek" title="View user profile." class="username" lang="" about="/users/estebanvojacek" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;estebanvojacek&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That works, my example was not that specific with the https protocol, now keep in mind that if you don't use a destination they are going to have limited internet access as well (only https), now about having 2000 clients that should not really cause a problem with the nat since at the end is just a simple nat.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this info helps!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rate if helps you!!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-JP-&lt;/P&gt;</description>
      <pubDate>Fri, 26 Aug 2016 01:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-nat/m-p/2936098#M155701</guid>
      <dc:creator>JP Miranda Z</dc:creator>
      <dc:date>2016-08-26T01:38:45Z</dc:date>
    </item>
  </channel>
</rss>

