<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dynamic Policy NAT Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395321#M271585</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hello,&lt;/P&gt;&lt;P&gt;New to the Cisco world, so bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Overview&lt;/P&gt;&lt;P&gt;Site - Site VPN between a Remote office 172.16.10.1/24 and Main Office with inside IP 192.168.15.22.&amp;nbsp; There is a 3rd Party router with inside IP 192.168.15.1 that has access to two subnets the Remote office needs access to.&amp;nbsp; The Remote Office must have it's IPs NAT'd only when accessing the 3rd Party Network to a 192.168.15.150 address (or some other open IP obviously).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I am thinking right now, and there may be some syntax issues.&amp;nbsp; This is on the Main Office ASA ver 7.2.&amp;nbsp; Also, I need a route on the Remote office as well correct?&amp;nbsp; I am routing to the inside interface of the Main office correct?&amp;nbsp; Thank you so much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group network REMOTE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 172.16.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group network 3RDPARTY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 10.10.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 10.10.20.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list VPN_policy_NAT permit ip object-group REMOTE object-group 3RDPARTY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (inside) 10 192.168.14.150&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 10 access-list VPN_policy_NAT&lt;/EM&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:29:23 GMT</pubDate>
    <dc:creator>licensing</dc:creator>
    <dc:date>2019-03-12T03:29:23Z</dc:date>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395321#M271585</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hello,&lt;/P&gt;&lt;P&gt;New to the Cisco world, so bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Overview&lt;/P&gt;&lt;P&gt;Site - Site VPN between a Remote office 172.16.10.1/24 and Main Office with inside IP 192.168.15.22.&amp;nbsp; There is a 3rd Party router with inside IP 192.168.15.1 that has access to two subnets the Remote office needs access to.&amp;nbsp; The Remote Office must have it's IPs NAT'd only when accessing the 3rd Party Network to a 192.168.15.150 address (or some other open IP obviously).&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I am thinking right now, and there may be some syntax issues.&amp;nbsp; This is on the Main Office ASA ver 7.2.&amp;nbsp; Also, I need a route on the Remote office as well correct?&amp;nbsp; I am routing to the inside interface of the Main office correct?&amp;nbsp; Thank you so much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group network REMOTE&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 172.16.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object-group network 3RDPARTY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 10.10.10.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;network-object 10.10.20.0 255.255.255.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list VPN_policy_NAT permit ip object-group REMOTE object-group 3RDPARTY&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (inside) 10 192.168.14.150&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside) 10 access-list VPN_policy_NAT&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:29:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395321#M271585</guid>
      <dc:creator>licensing</dc:creator>
      <dc:date>2019-03-12T03:29:23Z</dc:date>
    </item>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395322#M271589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understood you correctly the setup is as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remote site connected with L2L VPN to Main Site&lt;/LI&gt;&lt;LI&gt;Remote site with network 172.16.10.0/24&lt;/LI&gt;&lt;LI&gt;Main Site with 2 third party networks behind a router.&lt;UL&gt;&lt;LI&gt;10.10.10.0/24&lt;/LI&gt;&lt;LI&gt;10.10.20.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;When Remote Site connects to third party networks at Main Site their traffic should be Dynamic PATed to a single IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above is true then I am not sure why this Dynamic Policy PAT would be done on the Main Site? The naturaly place for this would be on the Remote Site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an ASA on the Remote Site then you would be configuring Dynamic Policy PAT from &lt;STRONG&gt;"inside"&lt;/STRONG&gt; to&lt;STRONG&gt; "outside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DYNAMIC-POLICY-PAT permit ip 172.16.10.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DYNAMIC-POLICY-PAT permit ip 172.16.10.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 200 &lt;PAT ip="" address=""&gt;&lt;/PAT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 200 access-list DYNAMIC-POLICY-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you would also need to notice is that you naturally have to change the Crypto ACL in the &lt;STRONG&gt;"crypto map" &lt;/STRONG&gt;configuration. You would have to add the &lt;STRONG&gt;&lt;PAT ip="" address=""&gt;&lt;/PAT&gt;&lt;/STRONG&gt; as one of the source IP address for the L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if I understood your setup wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 14:09:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395322#M271589</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T14:09:56Z</dc:date>
    </item>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395323#M271594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Wonderful Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be testing that today and will get back to you by tonight.&amp;nbsp; Your understanding of my setup is exactly right.&amp;nbsp; I was told by another technician that I should perform the PAT on the Main Office ASA, hence why I am working there.&amp;nbsp; Thank you so much, and as soon as I get word of how that'll work I will respond back.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 16:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395323#M271594</guid>
      <dc:creator>licensing</dc:creator>
      <dc:date>2014-01-14T16:22:34Z</dc:date>
    </item>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395324#M271599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It seems I'm still having troubles.&amp;nbsp; Attached are all the config lines ive used to attempt to get this working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 10.10.10.0 255.255.255.0 192.168.15.1 1&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;route outside 10.10.20.0 255.255.255.0 192.168.15.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DYNAMIC-POLICY-PAT permit ip 172.16.10.0 255.255.255.0 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list DYNAMIC-POLICY-PAT permit ip 172.16.10.0 255.255.255.0 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_1_cryptomap extended permit ip 192.168.15.149 255.255.255.255 VPN-Remote 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;global (outside) 200 192.168.15.149&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside) 200 access-list DYNAMIC-POLICY-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything looks right.&amp;nbsp; When I run a packet-tracer from 172.16.10.X to one of the remote 3rd party IPs, its allowed the entire way, I see the NAT rule being applied and being translated from a 172.16.10.X to 192.168.15.149 just fine.&amp;nbsp; I also see the 192.168.15.149 being allowed through the VPN tunnel when I run &lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt; so it should be allow over the VPN.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something entirely?&amp;nbsp; I haven't done anything on the Main Office ASA, I don't think I need to allow anything as it's a 192.168.15.0 address going through the tunnel, which is already allowed through the crypto map config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 04:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395324#M271599</guid>
      <dc:creator>licensing</dc:creator>
      <dc:date>2014-01-15T04:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395325#M271601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually now I understand why you were possibly told that this should be done at Main Office.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its because of your NAT IP address used. This is an IP address beloging directly to the Main Office ASA interface. Therefore this traffic at the moment probably wont ever be forwarded to the VPN connection atleast in the direction Main Office -&amp;gt; Remote Office since the 3rd party Router will try to ARP for the MAC address of the host 192.168.15.149 as it thinks that its connected directly to that network. And as there is no NAT/PAT at the moment on the Main Site for that IP address the ASA wont answer that ARP request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This kind of makes me think that the situation originally has been so that changes can't be made to the 3rd party router and thats why you are trying to PAT the Remote Site to an IP address that the 3rd party router already has a route for (directly connected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So next there are these questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the 3rd party router using as default gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could an IP address from some new subnet be used as the Dynamic PAT IP address for the Remote Site users? This comes back to the above question as to what is the default gateway of the 3rd party router? If its not your ASA then a route for the new Dynamic PAT IP address (configured on Remote Site) would have to configured on the 3rd party router pointing it towards the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 11:51:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395325#M271601</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-15T11:51:13Z</dc:date>
    </item>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395326#M271603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The router for the 3rd Party Network at the main office is in the route statements above, 192.168.15.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could I do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DYNAMIC-POLICY_PAT .....&lt;/P&gt;&lt;P&gt;global (inside) 200 192.168.15.49&lt;/P&gt;&lt;P&gt;nat (outside) 200 access-list DYNAMIC_POLICY_PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the Main office ASA?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The 3rd Party basically won't do anything for us in way of their configuration.&amp;nbsp; They will only allow the Main Office subnet, none others, and won't make a route back to the 172.16.10.0 network, hence why I am stuck in this predicament.&amp;nbsp; If they would just route back to the Remote office, I wouldn't be on here trying to find a convuluted solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 12:30:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395326#M271603</guid>
      <dc:creator>licensing</dc:creator>
      <dc:date>2014-01-15T12:30:15Z</dc:date>
    </item>
    <item>
      <title>Dynamic Policy NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395327#M271607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think it might work. To be honest I have never done such a setup since we simply dont accept that a situation where a 3rd party would dictate us to make these kind of unusual setups just because they can't be bothered to make changes to their devices (which are pretty simple) &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you will probably need in that &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command is the parameter &lt;STRONG&gt;"outside"&lt;/STRONG&gt; in the end of the command. This is because you are doing Dynamic PAT from a lower &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; interface to a higher one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this section from ASA Command Reference&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1756533"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/no.html#wp1756533&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quote&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt; For policy dynamic NAT and NAT exemption: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1769558"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat&lt;/STRONG&gt; (&lt;EM style="font-style: italic;"&gt;real_ifc) nat_id &lt;/EM&gt;access-list &lt;EM&gt;access_list_name &lt;/EM&gt;[&lt;STRONG&gt;dns&lt;/STRONG&gt;] [&lt;STRONG&gt;outside]&lt;/STRONG&gt; [[&lt;STRONG&gt;tcp&lt;/STRONG&gt;] &lt;EM&gt;tcp_max_conns&lt;/EM&gt; [&lt;EM&gt;emb_limit&lt;/EM&gt;]] [&lt;STRONG&gt;udp&lt;/STRONG&gt; &lt;EM&gt;udp_max_conns&lt;/EM&gt;] [&lt;STRONG&gt;norandomseq&lt;/STRONG&gt;] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1769563table1769561" width="80%"&gt;
&lt;TBODY&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;
&lt;P&gt; &lt;STRONG&gt;outside&lt;/STRONG&gt; &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1769614"&gt;&lt;/A&gt;
&lt;P&gt; (Optional) If this interface is on a lower security level than the interface you identify by the matching &lt;STRONG&gt;global&lt;/STRONG&gt; statement, then you must enter &lt;STRONG&gt;outside&lt;/STRONG&gt;. This feature is called outside NAT or bidirectional NAT. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, this is not something I have done other than to test it in some labs so I am not 100% sure how it acts with the other NAT configurations. I can't see a problem at the moment atleast since its specifically made to be a Policy type of NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this Dynamic Policy PAT should work as the ASA the ASA should do NAT operations before sending traffic towards the Remote Site (would untranslate the PAT to the real IP address before VPN rules matched) and when traffic is coming from the L2L VPN towards Main Office I would imagine that when the packet is decapsulated/decrypted it would then be PATed to the correct IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 12:43:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-policy-nat-help/m-p/2395327#M271607</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-15T12:43:43Z</dc:date>
    </item>
  </channel>
</rss>

