<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925887#M157217</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;You need to use dynamic nat + pat.&lt;/P&gt;
&lt;P&gt;You can mix a dynamic NAT + PAT. I'll copy the Cisco doc link instead of retyping all commands:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've never tested it in a L2L vpn but it should work.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2016 15:00:54 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2016-06-29T15:00:54Z</dc:date>
    <item>
      <title>NAT for IPSec S2S Tunnel after using AnyConnect RA SSL VPN</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925886#M157214</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;so here is a complicated thing that I need to implement and need your help with NAT Commands:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have implemented RA AnyConnect VPN. My employees connect to my ASA with anyconnect and get the IP from:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;net_anyconnect_pool : 10.1.1.0/24&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My inside network is: &lt;STRONG&gt;net_inside_all : 10.37.0.0/24&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a Business Partner (lets call it BP)&amp;nbsp;with whom my Firewall builds an IPSec S2S VPN. Now the condition of my BP is that while connecting to its S2S Tunnel, my Source IP Address must be from the network&lt;STRONG&gt; local_s2s_net: 10.41.41.0/29&amp;nbsp;&lt;/STRONG&gt;, i.e. in other words my BP will enter only&amp;nbsp;&lt;STRONG&gt;10.41.41.0/29&amp;nbsp;&lt;/STRONG&gt;as remote networks on his firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So I need to use Source NAT to translate my :&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;net_inside_all : 10.37.0.0/24&amp;nbsp;&lt;/STRONG&gt;and my vpn pool&amp;nbsp;&lt;STRONG&gt;net_anyconnect_pool : 10.1.1.0/24&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;to&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;local_s2s_net: 10.41.41.0/29&amp;nbsp;&lt;/STRONG&gt;when accessing BP's networks.(&lt;STRONG&gt;NOTE&lt;/STRONG&gt; here that source addr given to me by BP is a /29 net)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BP's local networks for me i.e. my S2S VPN remote networks are: &lt;STRONG&gt;s2s_remote_net : 10.51.0.0/24, 10.52.0.0/24, 10.53.0.0/24&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;So is the following NAT config correct?&amp;nbsp;(note: no need of internet access to anyone)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Is Static Twice NAT the right way to go?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside)&amp;nbsp;source static&amp;nbsp;&lt;STRONG&gt;net_inside_all&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN&gt;&lt;STRONG&gt;net_inside_all&lt;/STRONG&gt; destination static&amp;nbsp;&lt;STRONG&gt;net_anyconnect_pool&amp;nbsp;net_anyconnect_pool&lt;/STRONG&gt;&amp;nbsp;no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside)&amp;nbsp;&lt;SPAN&gt;source static&amp;nbsp;&lt;STRONG&gt;net_inside_all local_s2s_net&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;destination static &lt;STRONG&gt;s2s_remote_net s2s_remote_net &lt;/STRONG&gt;no-proxy-arp&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;nat (outside,outside)&amp;nbsp;&lt;SPAN&gt;source static &lt;STRONG&gt;net_anyconnect_pool&amp;nbsp;net_anyconnect_pool&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;destination static &lt;STRONG&gt;s2s_remote_net s2s_remote_net &lt;/STRONG&gt;no-proxy-arp&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks and Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:58:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925886#M157214</guid>
      <dc:creator>rjadhav163</dc:creator>
      <dc:date>2019-03-12T07:58:01Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925887#M157217</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;You need to use dynamic nat + pat.&lt;/P&gt;
&lt;P&gt;You can mix a dynamic NAT + PAT. I'll copy the Cisco doc link instead of retyping all commands:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/nat_objects.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've never tested it in a L2L vpn but it should work.&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 15:00:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925887#M157217</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-29T15:00:54Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925888#M157221</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;thanks for the reply. Additional question:&lt;/P&gt;
&lt;P&gt;will the configuration that i wrote above not work at all? I mean the mapped subnet is /29, so lets say for first 6 users it should work right?&lt;/P&gt;
&lt;P&gt;Thanks and Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 05:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925888#M157221</guid>
      <dc:creator>rjadhav163</dc:creator>
      <dc:date>2016-06-30T05:16:19Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925889#M157226</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;It should not works but never tried.&lt;/P&gt;
&lt;P&gt;I can test it tonight and let you know.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 11:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925889#M157226</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-30T11:10:40Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925890#M157229</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So essentially you need to configure NAT so that both your VPN Client users and LAN users need to be visible from the same /29 sized subnet allocated to you by the remote end admin of the L2L VPN Connection?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In the past I have used the following type of configurations&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network BP-NAT-POOL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;range 10.41.41.1 10.41.41.5&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network BP-PAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;host 10.41.41.6&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object-group network BP-NAT+PAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object object BP-NAT-POOL&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object object BP-PAT&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object-group network BP-L2LVPN-SOURCE&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object 10.37.0.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object 10.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object-group network BP-L2LVPN-DESTINATION&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object 10.51.0.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object 10.52.0.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;network-object 10.53.0.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (any,outside) source dynamic BP-L2LVPN-SOURCE BP-NAT+PAT destination static BP-L2LVPN-DESTINATION BP-L2LVPN-DESTINATION&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The above configurations essentially define an &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; that will contain a NAT Pool and PAT address that are defined inside an&lt;STRONG&gt; "object".&lt;/STRONG&gt; The &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; will then be used as the translated source of the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations. The source addresses for the Dynamic Policy NAT/PAT will be defined under their own &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; and this will also be used in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations. All the destination subnets of the L2L VPN connection will be configured under their own &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; and this again will be used in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations. Last but not least you will see that I defined the source interface of the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command as &lt;STRONG&gt;"any"&lt;/STRONG&gt; this essentially matches incoming traffic from any interface and the source address "object-group" that we defined will tell the ASA which source subnets will match this NAT configuration. So for the LAN and VPN users you will have a single &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Above you have also listed a &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations that seems to be the NAT0 / Identity NAT for your LAN towards the VPN users? This seems correct to me though its not really related to the connectivity between VPN/LAN to the so called BP subnets.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As always I would suggest making sure that the above configurations does not in any way conflict with any existing configurations you might have. Though it should only apply when the destination is the mentioned 3 subnets and the source is one of the 2 mentioned subnets.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;/STRONG&gt; Also one more thing. If so far you HAVE NOT HAD any connections from VPN users (behind outside) towards Internet (behind outside) then you will have to make sure that another configuration on the ASA does not prevent this connectivity. For the ASA to pass traffic that originated from the same interface that it goes out on (outside or any other) you will need to have this configurations present on the ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;same-security-interface permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;To check the current configurations use the command&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;show run same-security-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;You can take a look at a old NAT 8.3+ document I made in 2013 if you want to get to know some of the CLI format of the new NAT. Sadly I have not updated it after the original date so it does not contain all the examples that it could.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- Jouni&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2016 13:18:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925890#M157229</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2016-06-30T13:18:01Z</dc:date>
    </item>
    <item>
      <title>Thanks Jouni. It worked</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925891#M157233</link>
      <description>&lt;P&gt;Thanks Jouni. It worked perfectly well.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2016 09:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925891#M157233</guid>
      <dc:creator>rjadhav163</dc:creator>
      <dc:date>2016-07-01T09:01:43Z</dc:date>
    </item>
    <item>
      <title>Thanks supportlan. Your idea</title>
      <link>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925892#M157234</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Thanks supportlan. Your idea of Dynamic NAT + PAT worked perfectly well.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jul 2016 09:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-for-ipsec-s2s-tunnel-after-using-anyconnect-ra-ssl-vpn/m-p/2925892#M157234</guid>
      <dc:creator>rjadhav163</dc:creator>
      <dc:date>2016-07-01T09:02:29Z</dc:date>
    </item>
  </channel>
</rss>

