<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow traffic from remote offices (ISP provided site-to-site VPN) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traffic-from-remote-offices-isp-provided-site-to-site-vpn/m-p/3839838#M26467</link>
    <description>Hi,&lt;BR /&gt;The example below will not nat traffic from your local network 192.168.203.x to the remote network FRD 192.168.208.x. This is similar to the nat configuration you already have in place for the destination network VPN.&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static LocalSubnet LocalSubnet destination static FRD FRD no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Tue, 16 Apr 2019 20:59:13 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-04-16T20:59:13Z</dc:date>
    <item>
      <title>Allow traffic from remote offices (ISP provided site-to-site VPN)</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-remote-offices-isp-provided-site-to-site-vpn/m-p/3839830#M26466</link>
      <description>&lt;P&gt;We have a customer moving to a new internet service.&amp;nbsp; The ISP will be managing the site-to-site vpn tunnels between the different locations.&amp;nbsp; At the main office, we are installing an ASA 5506-X to act as the gateway/router.&amp;nbsp; I have posted the configuration I have so far below.&amp;nbsp; The network objects correspond to the IP schemes at the remote offices.&amp;nbsp; We need the device to allow traffic from each remote office without being NATed.&amp;nbsp; (i.e. traffic from SLC, 192.168.208.x -&amp;gt; LocalSubnet 192.168.203.x) and I am unclear how to do this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.168.1-192.168.168.50 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address &amp;lt;Public IP&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.203.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;no nameif&lt;BR /&gt;security-level 100&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa992-32-lfbff-k8.SPA&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network LocalSubnet&lt;BR /&gt;subnet 192.168.203.0 255.255.255.0&lt;BR /&gt;object network SLC&lt;BR /&gt;subnet 192.168.201.0 255.255.255.0&lt;BR /&gt;object network COS&lt;BR /&gt;subnet 192.168.205.0 255.255.255.0&lt;BR /&gt;object network GRJ&lt;BR /&gt;subnet 192.168.202.0 255.255.255.0&lt;BR /&gt;object network FRD&lt;BR /&gt;subnet 192.168.208.0 255.255.255.0&lt;BR /&gt;object network PKR&lt;BR /&gt;subnet 192.168.207.0 255.255.255.0&lt;BR /&gt;object network FTC&lt;BR /&gt;subnet 192.168.206.0 255.255.255.0&lt;BR /&gt;object network Linux_Server&lt;BR /&gt;host 192.168.203.2&lt;BR /&gt;object network VPN&lt;BR /&gt;subnet 192.168.168.0 255.255.255.0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &amp;lt;Public Gateway&amp;gt; 1&lt;BR /&gt;access-list vpn-split standard permit 192.168.203.0 255.255.255.0&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-7101.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (inside,outside) source static LocalSubnet LocalSubnet destination static VPN VPN no-proxy-arp route-lookup&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;nat (any,outside) dynamic interface&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication http console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.203.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 192.168.203.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 20&lt;BR /&gt;ssh version 2&lt;BR /&gt;ssh key-exchange group dh-group14-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.203.100-192.168.203.250 inside&lt;BR /&gt;dhcpd dns 192.168.203.1 8.8.8.8 interface inside&lt;BR /&gt;dhcpd lease 845600 interface inside&lt;BR /&gt;dhcpd domain &amp;lt;domainname&amp;gt; interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.6.03049-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.6.03049-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy RemoteVPN internal&lt;BR /&gt;group-policy RemoteVPN attributes&lt;BR /&gt;vpn-tunnel-protocol ssl-client ssl-clientless&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value vpn-split&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username ***** password ***** privilege 15&lt;BR /&gt;tunnel-group RemoteVPN type remote-access&lt;BR /&gt;tunnel-group RemoteVPN general-attributes&lt;BR /&gt;address-pool vpnpool&lt;BR /&gt;default-group-policy RemoteVPN&lt;BR /&gt;tunnel-group RemoteVPN webvpn-attributes&lt;BR /&gt;group-alias RemoteVPN enable&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 20:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-remote-offices-isp-provided-site-to-site-vpn/m-p/3839830#M26466</guid>
      <dc:creator>xtech</dc:creator>
      <dc:date>2019-04-16T20:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic from remote offices (ISP provided site-to-site VPN)</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-from-remote-offices-isp-provided-site-to-site-vpn/m-p/3839838#M26467</link>
      <description>Hi,&lt;BR /&gt;The example below will not nat traffic from your local network 192.168.203.x to the remote network FRD 192.168.208.x. This is similar to the nat configuration you already have in place for the destination network VPN.&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static LocalSubnet LocalSubnet destination static FRD FRD no-proxy-arp route-lookup&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 16 Apr 2019 20:59:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-from-remote-offices-isp-provided-site-to-site-vpn/m-p/3839838#M26467</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-16T20:59:13Z</dc:date>
    </item>
  </channel>
</rss>

