<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN ASA inside Interface and  ip pool are one same Subnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376397#M271232</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work but I generally would not suggest having the same network on the LAN and also configured partially as a VPN Pool network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem at the moment is simply lacking the NAT0 configuration for the traffic between LAN and VPN Pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing the VPN Pool first and then configuring this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet &lt;VPN pool="" network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 source static LAN LAN destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have to use the line number &lt;STRONG&gt;"1"&lt;/STRONG&gt; in the above command so that it gets moved to the top since your current Dynamic PAT would otherwise override it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the future it would be best if you changed your current Dynamic PAT configuration to this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We simply add the &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; to this Dynamic PAT configuration so that it gets moved down in priority. The &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; refers to the fact that this NAT will be inserted after Auto NAT (after Section 2). Your current rule is Manual NAT (Sectiom 1). The new rule will be Manual NAT (Section 3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Jan 2014 07:14:23 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-20T07:14:23Z</dc:date>
    <item>
      <title>VPN ASA inside Interface and  ip pool are one same Subnet</title>
      <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376396#M271231</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured RA VPN full tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside interface of ASA is &lt;/P&gt;&lt;P&gt;Vlan1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;inside&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.0.1 &lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; CONFIG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool 10-pool &lt;STRONG&gt;10.0.0.51-10.0.0.100&lt;/STRONG&gt; mask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Need to know is it good design to have both on same subnet?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i access the Switch&amp;nbsp; connecting to VPN ASA&amp;nbsp; inside interface via--&lt;STRONG&gt;&lt;A class="jive-link-external-small" href="https://10.0.0.2" rel="nofollow" target="_blank"&gt;https://10.0.0.2&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;which has IP 10.0.0.2&amp;nbsp; while using Remote VPN connection to ASA it does not work gives error &lt;/P&gt;&lt;P&gt;message as below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 19 2014 19:42:46: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:10.0.0.51/51077(LOCAL\ipsec-user) dst inside:10.0.0.2/443 denied due to NAT reverse path failure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 19 2014 19:42:57: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:10.0.0.51/51078(LOCAL\ipsec-user) dst inside:10.0.0.2/443 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;Jan 19 2014 19:42:59: %ASA-6-302014: Teardown TCP connection 22418 for outside:10.0.0.51/51069(LOCAL\ipsec-user) to identity:10.0.0.1/443 duration 0:01:08 bytes 1035 TCP Reset-O (ipsec-user)&lt;/P&gt;&lt;P&gt;Jan 19 2014 19:42:59: %ASA-6-106015: Deny TCP (no connection) from 10.0.0.51/51069 to 10.0.0.1/443 flags FIN ACK&amp;nbsp; on interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Current NAT config is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: mahesh parmar&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376396#M271231</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T03:32:32Z</dc:date>
    </item>
    <item>
      <title>VPN ASA inside Interface and  ip pool are one same Subnet</title>
      <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376397#M271232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mahesh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work but I generally would not suggest having the same network on the LAN and also configured partially as a VPN Pool network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem at the moment is simply lacking the NAT0 configuration for the traffic between LAN and VPN Pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest changing the VPN Pool first and then configuring this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet &lt;VPN pool="" network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/VPN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 source static LAN LAN destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have to use the line number &lt;STRONG&gt;"1"&lt;/STRONG&gt; in the above command so that it gets moved to the top since your current Dynamic PAT would otherwise override it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the future it would be best if you changed your current Dynamic PAT configuration to this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We simply add the &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; to this Dynamic PAT configuration so that it gets moved down in priority. The &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; refers to the fact that this NAT will be inserted after Auto NAT (after Section 2). Your current rule is Manual NAT (Sectiom 1). The new rule will be Manual NAT (Section 3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2014 07:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376397#M271232</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-20T07:14:23Z</dc:date>
    </item>
    <item>
      <title>VPN ASA inside Interface and  ip pool are one same Subnet</title>
      <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376398#M271233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF i use same IP and VPN pool subnet then should i use NAT0 to make this work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF i use NAT config below &lt;/P&gt;&lt;P&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.0_24 NETWORK_OBJ_10.0.0.0_24 destination static NETWORK_OBJ_10.0.0.0_25 NETWORK_OBJ_10.0.0.0_25 &lt;STRONG&gt;no-proxy-arp route-lookup.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Then i can access the switch connected to ASA via&lt;STRONG&gt; &lt;STRONG&gt;&lt;A href="https://10.0.0.2/" rel="nofollow"&gt;https://10.0.0.2&lt;/A&gt;.&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Seems your NAT config and above config is pretty same only &lt;STRONG&gt;difference is --no-proxy-arp route-lookup.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Need to know what does no-proxy-arp route-lookup do in this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2014 15:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376398#M271233</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-20T15:37:26Z</dc:date>
    </item>
    <item>
      <title>VPN ASA inside Interface and  ip pool are one same Subnet</title>
      <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376399#M271234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need NAT0 either way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the purpose of configuring NAT0 for your internal LAN you wouldnt necesarily need the &lt;STRONG&gt;"route-lookup"&lt;/STRONG&gt; configuration. If you were to manage the ASA through the VPN using the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address then you would need it (not exactly sure of the reason but this seems to be the case). In this case you would also need the command &lt;STRONG&gt;"management-access inside"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"route-lookup"&lt;/STRONG&gt; parameter is meant to tell the ASA to follow the ASA routing table information rather than the information in this NAT configuration. Without the parameter the the traffic would choose the destination interface purely based on the destination interface used in the actual &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"no proxy-arp"&lt;/STRONG&gt; setting disables Proxy ARP for this NAT configuration so that the ASA doesnt reply to ARP request made for the MAC address of the NAT IP Address used in the &lt;STRONG&gt;"nat" &lt;/STRONG&gt;command. I have not seen the need to add this command in NAT0 configurations. I am not quite sure what device would even send an ARP request for such an IP address in our core network when there is naturally no private IP address range in the &lt;STRONG&gt;"outside" &lt;/STRONG&gt;interface of the ASA that would generate these ARP requests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2014 15:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376399#M271234</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-20T15:59:53Z</dc:date>
    </item>
    <item>
      <title>VPN ASA inside Interface and  ip pool are one same Subnet</title>
      <link>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376400#M271235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will go through this post today to understand all this here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Jan 2014 18:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-asa-inside-interface-and-ip-pool-are-one-same-subnet/m-p/2376400#M271235</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-01-20T18:40:00Z</dc:date>
    </item>
  </channel>
</rss>

