<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 VPN Lan IP allocation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391484#M306852</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I'll have to telnet into the 5510 rather than use ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the addresses 192.168.1.x are located on our side and need to be seen as a single IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what is lines of code should I use for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Jan 2014 17:34:42 GMT</pubDate>
    <dc:creator>unrealone1</dc:creator>
    <dc:date>2014-01-03T17:34:42Z</dc:date>
    <item>
      <title>ASA 5510 VPN Lan IP allocation - please assist</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391479#M306840</link>
      <description>&lt;P&gt;Hi ALL,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We recently had a VPN setup between CompanyA and CompanyB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We’ve had a bit of a shakeup of development servers and the IP address that was configured for the tunnel has changed.&lt;/P&gt;&lt;P&gt;Because we can have multiple IP’s that are now initiating requests we need a way to make everything appear as a single IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After speaking to Rackspace they are intending to NAT every server to a single IP in the firewall, only for that tunnel.&lt;/P&gt;&lt;P&gt;The hosts that we have currently that are trying to connect are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.214&lt;/P&gt;&lt;P&gt;192.168.1.215&lt;/P&gt;&lt;P&gt;192.168.1.216&lt;/P&gt;&lt;P&gt;192.168.1.217&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we use one of these IP addresses and have the rules setup on the firewall or is it best to use a new one?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:20:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391479#M306840</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2019-03-12T03:20:36Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391480#M306843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should pat them to one IP and configure it as an interesting traffic of the tunnel. I assume that there IPs will only initiate traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may use the followign:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL-HOSTS&lt;/P&gt;&lt;P&gt; host 192.168.1.214&lt;/P&gt;&lt;P&gt; host 192.168.1.215&lt;/P&gt;&lt;P&gt; host 192.168.1.216&lt;/P&gt;&lt;P&gt; host 192.168.1.217&lt;/P&gt;&lt;P&gt; nat (ingress-ifc, egress-ifc) dynamic &lt;PATTED ip=""&gt;&lt;/PATTED&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;---- &lt;BR /&gt;Mashal Shboul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Dec 2013 14:55:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391480#M306843</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-12-19T14:55:50Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391481#M306846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reponse, I am using the ASDM. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you give me instructions on how to do it on there?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 12:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391481#M306846</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-31T12:39:08Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation - please assist</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391482#M306848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the addresses 192.168.1.x located at the remote network (Rackspace) or are they the hosts on your side that need to be Dynamic PATed to a single IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that there is a single IP address configured on the L2L VPN as the source address for your side? If this is true then you can naturally Dynamic PAT the mentioned 4 IP addresses to that PAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont personally use ASDM at all to configure NAT or ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you perhaps share you current configuration (except any sensitive information). Your ASAs software level will also play a role in the NAT configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Software level 8.2 (and lower)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.214 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.215 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.216 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.217 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 100 access-list POLICY-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 100 x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the x.x.x.x is the PAT IP address which is configured as your source for the L2L VPN. In the ACL you have to tell the remote host(s) and/or networks to which you connect for each of your source host for the NAT configuration to work properly for all users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Software level 8.3 (and above)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.214&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.215&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.216&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.217&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DESTINATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object &lt;REMOTE network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network L2L-VPN-PAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic SOURCE L2L-VPN-PAT-IP destination static DESTINATION DESTINATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above the first &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; specifies the source addresses for the NAT configuration. The second &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; can be used to tell the destination addresses on the remote end of the L2L VPN for which this NAT configuration should apply to. The &lt;STRONG&gt;"object"&lt;/STRONG&gt; is supposed to contain the PAT IP address with which your traffic to the remote site should show up as. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Finally the actual &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration that does a Dynamic Policy PAT. In other words, a NAT configuration that PATs traffic to a certain IP address for specific destination IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 15:18:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391482#M306848</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-12-31T15:18:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391483#M306851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for your response:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is ASA 8.2(5)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASDM 6.4(5)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Dec 2013 15:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391483#M306851</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2013-12-31T15:56:32Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391484#M306852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok I'll have to telnet into the 5510 rather than use ASDM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the addresses 192.168.1.x are located on our side and need to be seen as a single IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what is lines of code should I use for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 17:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391484#M306852</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2014-01-03T17:34:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391485#M306855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello it should be &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NAT_VPN permit ip host 192.168.1.214 x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt;access-list NAT_VPN permit ip host 192.168.1.215 x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt;access-list NAT_VPN permit ip host 192.168.1.216 x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt;access-list NAT_VPN permit ip host 192.168.1.217 x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt; (where x.x.x.x is the other side subnet and y.y.y.y is the netmask)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 10 access-list NAT_VPN&lt;/P&gt;&lt;P&gt;global (outside) 10 192.168.1.X (whatever you want these IP addresses to look like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Notes&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;If you already configure the NAT 0 rule remember to remove the VPN traffic from it.&lt;/P&gt;&lt;P&gt;Remember to change the Crypto ACL for the VPN so now it should look like&lt;/P&gt;&lt;P&gt;access-list crypto acl permit ip 192.168.1.x (PAT IP addresss) x.x.x.x y.y.y.y&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Jan 2014 19:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391485#M306855</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-01-03T19:52:16Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391486#M306856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks for this, but I thought I had to PAT the devices?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 12:40:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391486#M306856</guid>
      <dc:creator>unrealone1</dc:creator>
      <dc:date>2014-01-06T12:40:17Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 VPN Lan IP allocation - please assist</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391487#M306857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I provided the CLI format configurations needed depending on what software level you are running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you a configuration that would work in your exact ASA setup we would have to see the CLI format configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was the example that applied to your software level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Software level 8.2 (and lower)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.214 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.215 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.216 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-PAT permit ip host 192.168.1.217 &lt;REMOTE host=""&gt;&lt;/REMOTE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 100 access-list POLICY-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 100 x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IP x.x.x.x would be the Dynamic PAT address with which your 4 hosts would show up to the remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally we would have to make sure that there are no overlapping NAT configuration that would prevent this from working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 14:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-vpn-lan-ip-allocation-please-assist/m-p/2391487#M306857</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-06T14:06:50Z</dc:date>
    </item>
  </channel>
</rss>

