<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy nat with site to site vpn on firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247795#M346739</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are using the 1.1.1.0/24 only for the L2L VPN connection and NAT purposes it doesnt have to be configured on any interface or be routed on any upstream router. Its visible to the remote site through the L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Jul 2013 11:59:37 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-09T11:59:37Z</dc:date>
    <item>
      <title>Policy nat with site to site vpn on firewall</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247792#M346715</link>
      <description>&lt;P&gt;site 1-10.1.1.0/24 lan range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;site 2- 20.1.1.0/24 lan range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since site 1 range is getting used at far end policy nat is used below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on site 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test 10.1.1.0 255.255.255.0 20.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 10 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global(outside) 10 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list crypto_map 1.1.1.0&amp;nbsp; 255.255.255.0 20.1.1.0 255.255.255.0-&amp;nbsp; is it correct&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access_list nonat 10.1.1.0 255.255.255.0 20.1.1.0 255.255.255.0-- ( whether 10 range or 1 range needs to be specified)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the policy nat config is correct ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing 1.1.1.0/24 is not assigned to any interface to firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please assist&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247792#M346715</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2019-03-12T02:09:40Z</dc:date>
    </item>
    <item>
      <title>Policy nat with site to site vpn on firewall</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247793#M346723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you want to do Dynamic PAT towards the other site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the base information is&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Site A 10.1.1.0/24&lt;/LI&gt;&lt;LI&gt;Site B 20.1.1.0/24&lt;/LI&gt;&lt;LI&gt;Site A PAT IP 1.1.1.1&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When Site A connects to Site B then Site A should be visible to the Site B with the IP address 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is true then the configuration should be (basically your configuration with some corrected typos)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list test permit ip 10.1.1.0 255.255.255.0 20.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat(inside) 10 access-list test&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global(outside) 10 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list crypto_map permit ip host 1.1.1.1 20.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list crypto_map permit ip 1.1.1.0&amp;nbsp; 255.255.255.0 20.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont need any statements in some NONAT/NAT0 ACL since we specifically WANT to NAT the LAN network instead of doing NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 11:30:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247793#M346723</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-09T11:30:10Z</dc:date>
    </item>
    <item>
      <title>Policy nat with site to site vpn on firewall</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247794#M346732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I am doing pat i donot require nat statement right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what about &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; 1.1.1.0/24 is not assigned to any interface to firewall nor on router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Thus it work&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 11:54:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247794#M346732</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2013-07-09T11:54:10Z</dc:date>
    </item>
    <item>
      <title>Policy nat with site to site vpn on firewall</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247795#M346739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you are using the 1.1.1.0/24 only for the L2L VPN connection and NAT purposes it doesnt have to be configured on any interface or be routed on any upstream router. Its visible to the remote site through the L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 11:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247795#M346739</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-09T11:59:37Z</dc:date>
    </item>
    <item>
      <title>Policy nat with site to site vpn on firewall</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247796#M346745</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks that clears the doubt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i Can use any ip not mandatory to use public ip .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 12:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-with-site-to-site-vpn-on-firewall/m-p/2247796#M346745</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2013-07-09T12:53:32Z</dc:date>
    </item>
  </channel>
</rss>

