<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with VPN with overlapping subnets and NAT to forward to another FW in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993571#M30814</link>
    <description>&lt;P&gt;here is a good example guide how you can fix the issue (this is ASA to ASA this can be same as ASA and pfsense).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or post complete config to look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Dec 2019 17:12:37 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2019-12-04T17:12:37Z</dc:date>
    <item>
      <title>Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993542#M30813</link>
      <description>&lt;P&gt;We have a VPN setup to another ASA Firewall, however their are overlapping subnets and the remote VPN is now sending all traffic to 10.150.249.1/30. I don't have this to assigned to any physical interfaces on the local ASA and need to forward traffic to a PFSense appliance with an IP of 172.16.10.2.&amp;nbsp; I have tried applying static NAT on the object we use for the VPN but it's not working and I am not seeing any traffic appear on the PFsense.&amp;nbsp; Any help appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 16:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993542#M30813</guid>
      <dc:creator>fluffy998</dc:creator>
      <dc:date>2019-12-04T16:36:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993571#M30814</link>
      <description>&lt;P&gt;here is a good example guide how you can fix the issue (this is ASA to ASA this can be same as ASA and pfsense).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or post complete config to look.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 17:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993571#M30814</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-12-04T17:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993750#M30815</link>
      <description>&lt;P&gt;Thanks for the link, I had a try with that but still no luck.&amp;nbsp; Please see below diagram.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is the traffic from 10.150.249.176/30 needs to forward 172.20.1.2.&amp;nbsp; The 10.150.249.176 subnet is not attached to any physical interfaces but is configured as the encryption domain/local subnet on the VPN.&amp;nbsp; It looks like they have created a NAT rule to forward traffic from 10.150.249.176/30 to 172.20.1.2 but there is no traffic appearing on 172.20.1.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The whole reason for this is the partner the other side of the VPN has a 172.20.x.x subnet somewhere.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="diagram.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/62761i2F855C6E8045F9D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="diagram.PNG" alt="diagram.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 22:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993750#M30815</guid>
      <dc:creator>fluffy998</dc:creator>
      <dc:date>2019-12-04T22:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993967#M30816</link>
      <description>&lt;P&gt;May be i missed some bit here, where is the Overlap IP range here, as per diagram i have not seen anything like that?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you post the configuration to have look along with show crypto ipsec sa output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 08:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993967#M30816</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-12-05T08:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993985#M30819</link>
      <description>&lt;P&gt;The 172.20.1.x networks appears on both sides of the VPN. As a result they are now sending all traffic to 10.150.249.176/30 and we would like to forward that to a PFsense which is internal on 172.20.1.2. I hope that makes sense.&lt;/P&gt;&lt;P&gt;The output from the crypto command is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface: Outside&lt;BR /&gt;Crypto map tag: Outside_map0, seq num: 1, local addr: x.x.x.x&lt;/P&gt;&lt;P&gt;access-list Outside_cryptomap_1 extended permit ip 10.100.150.0 255.255.255.0 192.168.42.0 255.255.255.0&lt;BR /&gt;local ident (addr/mask/prot/port): (10.100.150.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.42.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer: x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: x.x.x.x/500, remote crypto endpt.: x.x.x.x/500&lt;BR /&gt;path mtu 1500, ipsec overhead 78(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: C47BF518&lt;BR /&gt;current inbound spi : 622C22B6&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0x622C22B6 (1647059638)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (4055040/27893)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xC47BF518 (3296458008)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (3916800/27893)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;Crypto map tag: Outside_map0, seq num: 1, local addr: x.x.x.x&lt;/P&gt;&lt;P&gt;access-list Outside_cryptomap_1 extended permit ip 10.150.249.176 255.255.255.252 192.168.42.0 255.255.255.0&lt;BR /&gt;local ident (addr/mask/prot/port): (10.150.249.176/255.255.255.252/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.42.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer: x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0&lt;BR /&gt;#pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: x.x.x.x/500, remote crypto endpt.: x.x.x.x/500&lt;BR /&gt;path mtu 1500, ipsec overhead 78(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: C1001080&lt;BR /&gt;current inbound spi : A04CDB13&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0xA04CDB13 (2689391379)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (4147200/27893)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xC1001080 (3238006912)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (3916800/27893)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;Crypto map tag: Outside_map0, seq num: 1, local addr: x.x.x.x&lt;/P&gt;&lt;P&gt;access-list Outside_cryptomap_1 extended permit ip 172.20.1.0 255.255.255.0 192.168.42.0 255.255.255.0&lt;BR /&gt;local ident (addr/mask/prot/port): (172.20.1.0/255.255.255.0/0/0)&lt;BR /&gt;remote ident (addr/mask/prot/port): (192.168.42.0/255.255.255.0/0/0)&lt;BR /&gt;current_peer: 82.163.243.186&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#pkts encaps: 185248, #pkts encrypt: 185225, #pkts digest: 185225&lt;BR /&gt;#pkts decaps: 304869, #pkts decrypt: 304869, #pkts verify: 304869&lt;BR /&gt;#pkts compressed: 0, #pkts decompressed: 0&lt;BR /&gt;#pkts not compressed: 185248, #pkts comp failed: 0, #pkts decomp failed: 0&lt;BR /&gt;#pre-frag successes: 0, #pre-frag failures: 23, #fragments created: 0&lt;BR /&gt;#PMTUs sent: 23, #PMTUs rcvd: 3, #decapsulated frgs needing reassembly: 0&lt;BR /&gt;#TFC rcvd: 0, #TFC sent: 0&lt;BR /&gt;#Valid ICMP Errors rcvd: 0, #Invalid ICMP Errors rcvd: 0&lt;BR /&gt;#send errors: 0, #recv errors: 0&lt;/P&gt;&lt;P&gt;local crypto endpt.: x.x.x.x/500, remote crypto endpt.: x.x.x.x/500&lt;BR /&gt;path mtu 1444, ipsec overhead 78(44), media mtu 1500&lt;BR /&gt;PMTU time remaining (sec): 0, DF policy: copy-df&lt;BR /&gt;ICMP error validation: disabled, TFC packets: disabled&lt;BR /&gt;current outbound spi: C17F9A5E&lt;BR /&gt;current inbound spi : 97FE7CA6&lt;/P&gt;&lt;P&gt;inbound esp sas:&lt;BR /&gt;spi: 0x97FE7CA6 (2550037670)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (4284335/22421)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0xFFFFFFFF 0xFFFFFFFF&lt;BR /&gt;outbound esp sas:&lt;BR /&gt;spi: 0xC17F9A5E (3246365278)&lt;BR /&gt;SA State: active&lt;BR /&gt;transform: esp-aes-256 esp-sha-256-hmac no compression&lt;BR /&gt;in use settings ={L2L, Tunnel, IKEv2, }&lt;BR /&gt;slot: 0, conn_id: 43, crypto-map: Outside_map0&lt;BR /&gt;sa timing: remaining key lifetime (kB/sec): (3962147/22421)&lt;BR /&gt;IV size: 16 bytes&lt;BR /&gt;replay detection support: Y&lt;BR /&gt;Anti replay bitmap:&lt;BR /&gt;0x00000000 0x00000001&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 09:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993985#M30819</guid>
      <dc:creator>fluffy998</dc:creator>
      <dc:date>2019-12-05T09:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993986#M30820</link>
      <description>&lt;P&gt;Do you want the whole output from the running config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 09:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3993986#M30820</guid>
      <dc:creator>fluffy998</dc:creator>
      <dc:date>2019-12-05T09:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN with overlapping subnets and NAT to forward to another FW</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3994388#M30821</link>
      <description>&lt;P&gt;the out not shows any encryption and decryption?&lt;/P&gt;
&lt;P&gt;yes, we would like to see the whole config also just clarify, the VPN between ASA to ASA or ASA to Pssense?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Dec 2019 19:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-vpn-with-overlapping-subnets-and-nat-to-forward-to/m-p/3994388#M30821</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-12-05T19:52:27Z</dc:date>
    </item>
  </channel>
</rss>

