<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT from one VPN tunnel through 5510 over another VPN tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605208#M202047</link>
    <description>&lt;P&gt;So, I have been presented with an interesting challenge. I would prefer using an internal Linux host to solve this, but my manager is convinced the ASA can do this. Hope this is the correct group. This is a NAT and routing question.&lt;/P&gt;&lt;P&gt;We have two VPN tunnels. One goes to Company X and connects to our internal network. Let's call the internal network 10.10.5.0 /24. That internal network can connect over the VPN tunnel to Company X,&amp;nbsp;allowing&amp;nbsp;only a single IP address in a /30 subnet on the inside of Company X that we can connect to (10.109.1.253). The kicker is that Company X will only allow a single VPN tunnel from our company.&lt;/P&gt;&lt;P&gt;The 2nd tunnel is coming from &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="b06ed50f-cdbc-43ee-aba9-b322921c3173" id="d885195d-ff1e-43ce-a24b-6ea8618263b0"&gt;our Cloud provider (Company Y) and also connects internally and can reach IP addresses on the 10.10.5.0 /24 subnet.&lt;/GS&gt;&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="891e68d9-9207-469b-8fdb-d3987be24467" id="a02979a6-ae83-4a98-90ad-d7d3585ea113"&gt;Question&lt;/GS&gt; is, can I set up a NAT on the ASA 5510 (9.1&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="891e68d9-9207-469b-8fdb-d3987be24467" id="19c81d85-63ee-4ec5-af5e-6b5578c861b9"&gt;(&lt;/GS&gt;3)) to allow translation from hosts coming from Company Y over their tunnel, say subnet 10.120.136.0 /24 to hit an internal IP here, say 10.10.5.145 and have that NAT to a destination IP on the Company X site or to the 10.109.1.253?&lt;/P&gt;&lt;P&gt;Or should I simply route requests coming from Company Y (10.120.136.0 /24&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="426a32b3-ca74-402c-a0cc-ea4b7705d355" id="f4320888-7671-4733-9bb0-56a4b968ff57"&gt; )&lt;/GS&gt; to the /30 subnet at Company X&amp;nbsp;(10.109.1.253 /30) using a NAT'ed internal IP address, say 10.10.5.145?&lt;/P&gt;&lt;P&gt;Or would the best solution simply have users in 10.120.136.0 (Company Y) hit a Linux box at 10.10.5.145 (our internal network), and the &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="59031f9a-ee4e-403d-92e4-213524a932d6" id="9c3e3015-8a79-4333-b0c6-89a98c48c2cc"&gt;ip&lt;/GS&gt;&amp;nbsp;forward all requests to 10.109.1.253 (the &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="59031f9a-ee4e-403d-92e4-213524a932d6" id="856f17ba-d9ed-4735-a0be-98a422080c8b"&gt;pingable&lt;/GS&gt;&amp;nbsp;host at Company X)?&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:14:41 GMT</pubDate>
    <dc:creator>kerryjcox</dc:creator>
    <dc:date>2019-03-12T05:14:41Z</dc:date>
    <item>
      <title>NAT from one VPN tunnel through 5510 over another VPN tunnel</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605208#M202047</link>
      <description>&lt;P&gt;So, I have been presented with an interesting challenge. I would prefer using an internal Linux host to solve this, but my manager is convinced the ASA can do this. Hope this is the correct group. This is a NAT and routing question.&lt;/P&gt;&lt;P&gt;We have two VPN tunnels. One goes to Company X and connects to our internal network. Let's call the internal network 10.10.5.0 /24. That internal network can connect over the VPN tunnel to Company X,&amp;nbsp;allowing&amp;nbsp;only a single IP address in a /30 subnet on the inside of Company X that we can connect to (10.109.1.253). The kicker is that Company X will only allow a single VPN tunnel from our company.&lt;/P&gt;&lt;P&gt;The 2nd tunnel is coming from &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="b06ed50f-cdbc-43ee-aba9-b322921c3173" id="d885195d-ff1e-43ce-a24b-6ea8618263b0"&gt;our Cloud provider (Company Y) and also connects internally and can reach IP addresses on the 10.10.5.0 /24 subnet.&lt;/GS&gt;&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="891e68d9-9207-469b-8fdb-d3987be24467" id="a02979a6-ae83-4a98-90ad-d7d3585ea113"&gt;Question&lt;/GS&gt; is, can I set up a NAT on the ASA 5510 (9.1&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="891e68d9-9207-469b-8fdb-d3987be24467" id="19c81d85-63ee-4ec5-af5e-6b5578c861b9"&gt;(&lt;/GS&gt;3)) to allow translation from hosts coming from Company Y over their tunnel, say subnet 10.120.136.0 /24 to hit an internal IP here, say 10.10.5.145 and have that NAT to a destination IP on the Company X site or to the 10.109.1.253?&lt;/P&gt;&lt;P&gt;Or should I simply route requests coming from Company Y (10.120.136.0 /24&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="426a32b3-ca74-402c-a0cc-ea4b7705d355" id="f4320888-7671-4733-9bb0-56a4b968ff57"&gt; )&lt;/GS&gt; to the /30 subnet at Company X&amp;nbsp;(10.109.1.253 /30) using a NAT'ed internal IP address, say 10.10.5.145?&lt;/P&gt;&lt;P&gt;Or would the best solution simply have users in 10.120.136.0 (Company Y) hit a Linux box at 10.10.5.145 (our internal network), and the &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="59031f9a-ee4e-403d-92e4-213524a932d6" id="9c3e3015-8a79-4333-b0c6-89a98c48c2cc"&gt;ip&lt;/GS&gt;&amp;nbsp;forward all requests to 10.109.1.253 (the &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="59031f9a-ee4e-403d-92e4-213524a932d6" id="856f17ba-d9ed-4735-a0be-98a422080c8b"&gt;pingable&lt;/GS&gt;&amp;nbsp;host at Company X)?&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605208#M202047</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2019-03-12T05:14:41Z</dc:date>
    </item>
    <item>
      <title>You can easily solve that</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605209#M202049</link>
      <description>&lt;P&gt;You can easily solve that with&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;same-security-traffic permit intra-interface&lt;/LI&gt;&lt;LI&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/nat_rules.html#pgfId-1099300"&gt;policy-nat for (outside,outside)&lt;/A&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 18 Dec 2014 17:52:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605209#M202049</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T17:52:26Z</dc:date>
    </item>
    <item>
      <title>Karsten,Thanks much for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605210#M202051</link>
      <description>&lt;P&gt;Karsten,&lt;/P&gt;&lt;P&gt;Thanks much for the response. I have the&amp;nbsp;option "same-security-traffic permit intra-interface" already enabled.&lt;/P&gt;&lt;P&gt;I guess I am being daft about the policy NAT.&amp;nbsp;Looking over the link I &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="93802700-d78f-483d-bbc5-5e61e3ae1127" id="575ad7f9-9cad-46b4-8bb7-dbf778d1fe4f"&gt;am not seeing&lt;/GS&gt; a clear example of how to configure this. Would you be willing to provide one?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 20:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605210#M202051</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-12-18T20:44:22Z</dc:date>
    </item>
    <item>
      <title>I think I found an example</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605211#M202053</link>
      <description>&lt;P&gt;I think I found an example that may work for my situation. Thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will give it a shot.&lt;/P&gt;&lt;P&gt;---&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="f91e2333-50ba-4720-9981-c482dc84275d" id="28c3cb02-1250-42b9-be45-614d7e2ec2bb"&gt;no&lt;/GS&gt;&amp;nbsp;such luck.&amp;nbsp;&lt;/P&gt;&lt;P&gt;any examples would be appreciated on how to translate incoming IP addresses from the 10.120.139.0 /24 subnet to an internal 10.10.5.145 IP and have them them route or NAT over to the 10.109.1.253 /32 IP, so everything on the 10.109.1.253 address will see all traffic originating from 10.120.139.0 /24 as really coming from 10.10.5.145?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 21:12:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605211#M202053</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-12-18T21:12:10Z</dc:date>
    </item>
    <item>
      <title>Tried the following but with</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605212#M202055</link>
      <description>&lt;P&gt;Tried the following but with no luck. From the IP of 10.120.139.12, I cannot ping 10.10.5.145 which should NAT over to the other VPN IP of 10.109.1.253.&lt;/P&gt;&lt;P&gt;I am certain I am just missing something:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="870d6273-35a0-4dd0-8c36-ca1669de0954" id="c11a67e3-5d28-4a09-9bd2-8638c94c1678"&gt;object&lt;/GS&gt; network COMPANY_A&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="5b65b5e1-aa90-4a3d-8803-e3cd3b679060" id="2109da58-672a-4c1a-ac21-921b10b0c945"&gt;subnet&lt;/GS&gt; 10.120.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="7af60695-d2d6-45ba-8a23-be4712a67168" id="3fbddc63-51d6-466b-b0ca-365509b2e36a"&gt;object&lt;/GS&gt; network COMPANY_B&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="c2a15fb9-bde8-48f9-a6eb-f76059be2122" id="d2b11f49-9589-4e09-acaa-6b3a85c24593"&gt;host&lt;/GS&gt; 10.109.1.253&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="0105c3e6-d218-44a3-a9b1-8f92a83ceca5" id="397a807b-8061-4915-83d8-d33078d1e688"&gt;object&lt;/GS&gt; network INSIDE_MAP&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="844cb5e2-a285-49dd-9243-3aafdd3c7ab9" id="7a99856e-47ea-4389-a0f2-014e5da42f40"&gt;host&lt;/GS&gt; 10.10.5.145&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="8769f579-0694-4bb3-b7bc-4a4ff2f9b3cb" id="50677aee-e1e5-437b-aac5-e671ed5f9411"&gt;nat&lt;/GS&gt; (outside&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="8769f579-0694-4bb3-b7bc-4a4ff2f9b3cb" id="7bd38d8f-5b8e-4305-8690-8a2c6feeef75"&gt;,&lt;/GS&gt;outside) source dynamic COMPANY_A INSIDE_MAP destination static COMPANY_B COMPANY_B&lt;/P&gt;&lt;P&gt;Based on &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/nat_rules.html#30332"&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="b1087128-0856-42ea-ae4e-edff42a698f8" id="c32c1679-29f3-47fc-b127-0230cb879cd6"&gt;above link&lt;/GS&gt;&lt;/A&gt;, I am open to suggestions.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;&lt;GS class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="cc431bea-ded4-47b9-a7e7-eeb69bd57ee2" id="2c5be41c-ede8-4877-8ca1-6f216efac2b1"&gt;same&lt;/GS&gt;-security-traffic permit intra-interface is already enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 21:48:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605212#M202055</guid>
      <dc:creator>kerryjcox</dc:creator>
      <dc:date>2014-12-18T21:48:33Z</dc:date>
    </item>
    <item>
      <title>The nat-rule looks fine, but</title>
      <link>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605213#M202057</link>
      <description>&lt;P&gt;The nat-rule looks fine, but is it in the right order? It's very likely that it has to be above other rules in NAT-section1.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2014 21:59:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-from-one-vpn-tunnel-through-5510-over-another-vpn-tunnel/m-p/2605213#M202057</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-12-18T21:59:21Z</dc:date>
    </item>
  </channel>
</rss>

