<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Access VPN and NAT inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460843#M268560</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, as you can see from the second &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output there is no Phase for NAT so there is no translation for the source address 192.168.50.1. And this probably is no surprise as the Loopback interface probably in this situation does not need any connectivity to the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An easy thing to test the above would be to temporarily configure Dynamic PAT for the Loopback interface IP address 192.168.50.1 and see if you could then PING the IP address from the VPN Client. You should not be able to do this without further adding a NAT0 / NAT Exempt for it OR removing the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see from the above, you typically need NAT0 configuration only because if you did not configure NAT0 the traffic would match the Dynamic PAT and fail. And removing the Dynamic PAT naturally is not possible on a typical firewall as the users need that for Internet access. NAT0 is essentially used to bypass another NAT configurations in these cases. Since there is no NAT configurations for your Loopback interface it does not need NAT0 to bypass any Dynamic NAT/PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had an ASA which only services VPN connections and NO users Internet connections you could simply leave the NAT configurations completely empty and the ASA would not perform any NAT on traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Mar 2014 09:07:08 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-03-07T09:07:08Z</dc:date>
    <item>
      <title>Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460840#M268546</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured Remote VPN access.&lt;/P&gt;&lt;P&gt;Inside interface and vpn pool is 10.0.0.0 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA inside interface has NAT exempt as per config below&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.0.0.0_25 NETWORK_OBJ_10.0.0.0_25 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.0.0_24&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.0.0_25&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i have ASA inside interface connected to R1 as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1 ---10.0.0.2------------inside int&amp;nbsp; IP 10.0.0.1--------ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R1 has loopback int 192.168.50.1 and ASA has static route to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i connect to remote access vpn i can ping the IP 192.168.50.1 from My pc which is connected to outside interface of ASA.&lt;/P&gt;&lt;P&gt;This ping works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar 04 2014 21:58:27: %ASA-6-302020: Built inbound ICMP connection for faddr 10.0.0.52/1(LOCAL\ipsec-user) gaddr 192.168.50.1/0 laddr 192.168.50.1/0 (ipsec-user&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; )&lt;/P&gt;&lt;P&gt;Mar 04 2014 21:58:28: %ASA-6-302021: Teardown ICMP connection for faddr 10.0.0.52/1(LOCAL\ipsec-user) gaddr 192.168.50.1/0 laddr 192.168.50.1/0 (ipsec-user)&lt;SPAN id="mce_marker"&gt; &lt;/SPAN&gt;Mar 04 2014 21:58:27:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Need to understand how this ping works without exempting 192.168.50.0 from natiing &lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how does nat work for above ping from 10.0.0.52 VPN user PC IP to loopback interface of R1 in regards to NATing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:53:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460840#M268546</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T03:53:50Z</dc:date>
    </item>
    <item>
      <title>Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460841#M268551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Log in with the VPN and check the IP address that is assigned to your client PC&lt;/LI&gt;&lt;LI&gt;Use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command to simulate the ICMP above using the aboe mentioned VPN Client IP as the source&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside icmp &lt;VPN client="" ip=""&gt; 8 0 192.168.50.1&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets see if this producess some output that tells us what is happening. I would however presume that the situation might be one of the following for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You have another NAT configuration that matches this traffic&lt;/LI&gt;&lt;LI&gt;You DONT have any Dynamic NAT/PAT configurations for the Loopback interface IP address which therefore lets you connect directly to it from the VPN Client as the Loopback interface IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I think I need to clarfiy the second point above. What I mean by it is that you necesarily have not configured any Dynamic NAT/PAT rule for the Loopback interface IP address on the ASA and therefore ASA does not match any NAT configuration for the traffic TO and FROM the Loopback interface. This means that from the ASAs perspective this traffic is passed essentially like it had NAT0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the reason why you need the NAT0 configuration for the LAN network is that they have a Dynamic NAT/PAT configurations towards the "outside" interface. If you did not add any NAT0 configuration and the VPN Client attempted the connection then the ASA would drop the traffic as the ASA would check if any NAT configuration matches for the traffic going from the VPN Client to the LAN and from the LAN to the VPN Client (the reverse check). The reverse check would match the Dynamic NAT/PAT rule (if you had no NAT0) and therefore the ASA would drop the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; to confirm if the Loopback interface has any NAT configuration on the ASA at all you can use this command for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside icmp 192.168.50.1 8 0 8.8.8.8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Provided ofcourse that traffic is allowed through the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as I said I presume that you either have a NAT0 configuration for the Loopback interface IP address (or some wider rule that applies to it) OR you have absolutely no NAT configurations on the ASA matching the Loopback interface IP address and therefore the ASA does NO NAT for the traffic to and from the Loopback interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this made any sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what the above test show.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Mar 2014 08:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460841#M268551</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-06T08:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460842#M268556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address to PC is 10.0.0.52 ---------Assigned to Client PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Leting you&amp;nbsp; know that i have removed the NAT below config from inside to outside interface&amp;nbsp; &lt;/P&gt;&lt;P&gt;ASA inside interface has NAT exempt as per config below&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.0.0.0_25 NETWORK_OBJ_10.0.0.0_25 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.0.0_24&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network NETWORK_OBJ_10.0.0.0_25&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still ping works fine from VPN client PC to IP 192.168.50.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer output &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1# packet-tracer input outside&amp;nbsp; icmp 10.0.0.52 8 0 192.168.50.1&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.50.1&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit ip any host 192.168.50.1 log&lt;BR /&gt;access-list outside_access_in remark Allow Ping to Loopback IP of R1 Which is inside Network of ASA1&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: CP-PUNT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping from PC command prompt to IP 192.168.50.1 fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is second packet tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1# packet-tracer input inside icmp 192.168.50.1 8 0 8.8.8.8&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: DEBUG-ICMP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 18033, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So question is how ping from outside is working without nat exempt from inside to outside?&lt;/P&gt;&lt;P&gt;So does second packet tracer proves that i have no NAT config from loopback to outside and ping works because i have NO NAT configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 02:02:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460842#M268556</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-03-07T02:02:29Z</dc:date>
    </item>
    <item>
      <title>Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460843#M268560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, as you can see from the second &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output there is no Phase for NAT so there is no translation for the source address 192.168.50.1. And this probably is no surprise as the Loopback interface probably in this situation does not need any connectivity to the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An easy thing to test the above would be to temporarily configure Dynamic PAT for the Loopback interface IP address 192.168.50.1 and see if you could then PING the IP address from the VPN Client. You should not be able to do this without further adding a NAT0 / NAT Exempt for it OR removing the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So as you can see from the above, you typically need NAT0 configuration only because if you did not configure NAT0 the traffic would match the Dynamic PAT and fail. And removing the Dynamic PAT naturally is not possible on a typical firewall as the users need that for Internet access. NAT0 is essentially used to bypass another NAT configurations in these cases. Since there is no NAT configurations for your Loopback interface it does not need NAT0 to bypass any Dynamic NAT/PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you had an ASA which only services VPN connections and NO users Internet connections you could simply leave the NAT configurations completely empty and the ASA would not perform any NAT on traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 09:07:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460843#M268560</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-07T09:07:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460844#M268567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For first packet tracer output need to confirm that it also does not hit the NAT rule&amp;nbsp; and there is no NAT translation&amp;nbsp; like second packet tracer output right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second thing need to confirm with you is on ASA there is no dynamic PAT configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did test below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ping 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 40/42/50 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logs show &lt;/P&gt;&lt;P&gt;Mar 07 2014 06:17:03: %ASA-6-302020: Built outbound ICMP connection for faddr 8.8.8.8/0 gaddr 192.168.1.171/61674 laddr 192.168.1.171/61674&lt;/P&gt;&lt;P&gt;Mar 07 2014 06:17:03: %ASA-6-302021: Teardown ICMP connection for faddr 8.8.8.8/0 gaddr 192.168.1.171/61674 laddr 192.168.1.171/61674&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug &lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.171 to 8.8.8.8 ID=41725 seq=65382 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 8.8.8.8 to 192.168.1.171 ID=41725 seq=65382 len=64&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.171 to 8.8.8.8 ID=41725 seq=65382 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 8.8.8.8 to 192.168.1.171 ID=41725 seq=65382 len=64&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.171 to 8.8.8.8 ID=41725 seq=65382 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 8.8.8.8 to 192.168.1.171 ID=41725 seq=65382 len=64&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.171 to 8.8.8.8 ID=41725 seq=65382 len=72&lt;/P&gt;&lt;P&gt;!ICMP echo reply from 8.8.8.8 to 192.168.1.171 ID=41725 seq=65382 len=64&lt;/P&gt;&lt;P&gt;ICMP echo request from 192.168.1.171 to 8.8.8.8 ID=41725 seq=65382 len=72&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 40/42/50 ms&lt;/P&gt;&lt;P&gt;Above ping works because ASA is using the source IP of outside interface right?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA1# ping ins&lt;BR /&gt;ASA1# ping inside ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Hostname or A.B.C.D&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Ping destination IPv4 address or hostname&lt;BR /&gt;&amp;nbsp; Hostname or X:X:X:X::X&amp;nbsp; Ping destination IPv6 address or hostname&lt;BR /&gt;&amp;nbsp; &lt;CR&gt;&lt;BR /&gt;ASA1# ping inside 8.8.8.8&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;BR /&gt;?????&lt;BR /&gt;Success rate is 0 percent (0/5)&lt;/CR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;log shows&lt;/P&gt;&lt;P&gt;Mar 07 2014 06:19:52: %ASA-6-302020: Built outbound ICMP connection for faddr 8.8.8.8/0 gaddr 10.0.0.1/12162 laddr 10.0.0.1/12162&lt;/P&gt;&lt;P&gt;Mar 07 2014 06:19:52: %ASA-6-302021: Teardown ICMP connection for faddr 8.8.8.8/0 gaddr 10.0.0.1/12162 laddr 10.0.0.1/12162&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug shows &lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 8.8.8.8, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;ICMP echo request from 10.0.0.1 to 8.8.8.8 ID=12162 seq=16887 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 8.8.8.8 to 10.0.0.1 ID=12162 seq=16887 len=64&lt;/P&gt;&lt;P&gt;?ICMP echo request from 10.0.0.1 to 8.8.8.8 ID=12162 seq=16887 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 8.8.8.8 to 10.0.0.1 ID=12162 seq=16887 len=64&lt;/P&gt;&lt;P&gt;?ICMP echo request from 10.0.0.1 to 8.8.8.8 ID=12162 seq=16887 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 8.8.8.8 to 10.0.0.1 ID=12162 seq=16887 len=64&lt;/P&gt;&lt;P&gt;?ICMP echo request from 10.0.0.1 to 8.8.8.8 ID=12162 seq=16887 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 8.8.8.8 to 10.0.0.1 ID=12162 seq=16887 len=64&lt;/P&gt;&lt;P&gt;?ICMP echo request from 10.0.0.1 to 8.8.8.8 ID=12162 seq=16887 len=72&lt;/P&gt;&lt;P&gt;ICMP echo reply from 8.8.8.8 to 10.0.0.1 ID=12162 seq=16887 len=64&lt;/P&gt;&lt;P&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above ping fails because we have no Natting from inside to outside right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 13:22:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460844#M268567</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-03-07T13:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460845#M268570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both of the earlier &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; outputs show that there is NO NAT performed for the Loopback interface. The first &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; fails though but that can be expected I guess since we are trying to simulate a connection that is supposed to arrive from a VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your &lt;STRONG&gt;"ping"&lt;/STRONG&gt; tests don't really give clear picture of the NAT situation on your firewall. Notice that when you simply ping a destination IP address without specifying the ASA interface then the ASA will just use the IP address closest to the destination as the source IP address. There is no NAT involved as this traffic is generated by the ASA. You can't NAT traffic sourced from the ASA itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that when you define the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface in the &lt;STRONG&gt;"ping"&lt;/STRONG&gt; command that no NAT configurations will be applied to this traffic because of the thing I mentioned above. ASA will not NAT its own interface IP address to another IP address when it generates some traffic (like the ICMP here)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you can have a Dynamic PAT configuration but the &lt;STRONG&gt;"ping inside"&lt;/STRONG&gt; command won't have its traffic NATed. It goes through the ASA simply with its original IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest thing to confirm these is naturally to look at the NAT configurations and confirm which interfaces and networks have NAT configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I don't see your configurations I would suggest rather using &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; to check what NAT gets applied to traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if you have an internal IP address of 10.0.0.100 for example then you could check what NAT is applied to it when it connects to the Internet with the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 10.0.0.100 12345 8.8.8.8 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see a NAT Phase and it should tell you the NAT IP address used. If you dont have any NAT configurations for this internal network then you wont see any NAT Phase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But with regards to your Router Loopback interface and its IP address I think that you simply dont have any NAT configuration that would apply to that IP address and thats why you are not needing a NAT0 configuration to be able to connect to it at the moment through your VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 13:47:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460845#M268570</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-03-07T13:47:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and NAT inside interface</title>
      <link>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460846#M268575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the output from the ASA of packet tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1# packet-tracer input inside tcp 10.0.0.2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 12345 8.8.88 80&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 20106, packet dispatched to next module&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where 10.0.0.2 was IP of Router connected to ASA1.&lt;/P&gt;&lt;P&gt;As per your anwser seems NO nat is used above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Router R1 IP 10.0.0.2 i can ping 8.8.8.8.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have explained very well one last thing to confirm is as per above info there is also No NAT from inside to outside&lt;/P&gt;&lt;P&gt;used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only NAT config on this ASA is for site to site VPN as per below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA1#&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sh run nat&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.2.0.0_24 NETWORK_OBJ_10.2.0.0_24 no-proxy-arp route-lookup description Site_To_Site_VPN NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second thing to ask is when&amp;nbsp; i do ping inside 8.8.8.8&amp;nbsp; it does not work as traffic goes un Natted.&lt;/P&gt;&lt;P&gt;So is this default behaviour of the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What can i do to make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Mar 2014 02:34:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/remote-access-vpn-and-nat-inside-interface/m-p/2460846#M268575</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-03-08T02:34:06Z</dc:date>
    </item>
  </channel>
</rss>

