<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 501 VPN with NAT and same subnets in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218091#M349493</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, if I try to create a management connection the SSH session will fail.&amp;nbsp; The main reason I was wanting to use the tunnel was for SNMP so that I didn't sent it over the Internet.&amp;nbsp; However anything I try on the PIX even ping inside 172.16.1.230 fails.&amp;nbsp; If I ping the same from a workstation on the other end, it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 May 2013 17:36:25 GMT</pubDate>
    <dc:creator>ngthen</dc:creator>
    <dc:date>2013-05-22T17:36:25Z</dc:date>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218089#M349491</link>
      <description>&lt;P&gt;We just aquired a company and they have a older PIX 501 running 6.3(5).&amp;nbsp; This new company is using the same IP address scheme as one of my other VPN tunnels.&amp;nbsp; To make things easier I NAT'd the tunnel to appear to my main firewall as 10.10.12.0/24 rather than 192.168.1.0/24.&amp;nbsp; The VPN is working well and I can get to all of the resources on the other end and they can get into HQ.&amp;nbsp; The problem I am running into is that I cannot SSH, HTTP, Telnet, or ping the inside interface of the PIX.&amp;nbsp; Also from the PIX, I cannot ping an HQ address using ping inside x.x.x.x.&amp;nbsp; I am assuming it is due to the NAT.&amp;nbsp; We have another aquisition with a PIX but the difference with this one is that I can do the noNAT since the IP address scheme is different than anything else we have.&amp;nbsp; I have included my config to see if there is anything I am missing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;PIX Version 6.3(5)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;interface ethernet0 auto&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;interface ethernet1 100full&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;nameif ethernet0 outside security0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;nameif ethernet1 inside security100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;enable password ********** encrypted&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;passwd ********** encrypted&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;hostname pixfirewall&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;domain-name company.com&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;clock timezone EST -5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;clock summer-time EDT recurring&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol dns maximum-length 512&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol ftp 21&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol h323 h225 1720&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol h323 ras 1718-1719&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol http 80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol pptp 1723&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol rsh 514&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol rtsp 554&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol sip 5060&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol sip udp 5060&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol skinny 2000&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol smtp 25&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol sqlnet 1521&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;fixup protocol tftp 69&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;names&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 192.168.1.253 SYSTEM1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 192.168.1.222 SYSTEM2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 192.168.1.218 SYSTEM3&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 192.168.1.221 SYSTEM4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 208.68.91.10 Online_load_tracing&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;name 172.16.1.230 MANAGEMENT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;object-group network HQ-Encrypt &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;&amp;nbsp; network-object 10.50.1.0 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;&amp;nbsp; network-object 172.16.0.0 255.255.240.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;object-group network NewCompany-Encrypt &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;&amp;nbsp; network-object 10.10.12.0 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list outside_access_in permit tcp any any eq 3389 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list outside_access_in permit tcp any any eq pptp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list outside_access_in permit udp any any eq isakmp &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list outside_access_in permit gre any any &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list outside_access_in permit tcp any interface outside &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list site1 permit ip 192.168.1.0 255.255.255.0 172.16.0.0 255.255.240.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list site1 permit ip 192.168.1.0 255.255.255.0 10.50.1.0 255.255.255.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list IPSEC-TUN permit ip 10.10.12.0 255.255.255.0 172.16.0.0 255.255.240.0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-list IPSEC-TUN permit ip 10.10.12.0 255.255.255.0 10.50.1.0 255.255.25.0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pager lines 24&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;logging on&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;logging trap notifications&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;logging host inside SYSTEM2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;mtu outside 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;mtu inside 1500&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip address outside 216.110.239.22 255.255.255.252&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip address inside 192.168.1.254 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip verify reverse-path interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip audit info action alarm&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip audit attack action alarm&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ip local pool VPNpool 192.168.100.1-192.168.100.7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm location SYSTEM3 255.255.255.255 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm location SYSTEM1 255.255.255.255 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm location SYSTEM2 255.255.255.255 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm location SYSTEM4 255.255.255.255 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm location Online_load_tracing 255.255.255.255 outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm logging notifications 200&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;pdm history enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;arp timeout 14400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;global (outside) 1 interface&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;static (inside,outside) tcp interface 3389 SYSTEM1 3389 netmask 255.255.255.255 0 0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;static (inside,outside) tcp interface www SYSTEM4 www netmask 255.255.255.255 0 0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;static (inside,outside) 10.10.12.0 access-list site1 0 0 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;access-group outside_access_in in interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;route outside 0.0.0.0 0.0.0.0 216.110.239.21 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;timeout xlate 0:05:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;timeout uauth 0:05:00 absolute&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server TACACS+ protocol tacacs+ &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server TACACS+ max-failed-attempts 3 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server TACACS+ deadtime 10 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server RADIUS protocol radius &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server RADIUS max-failed-attempts 3 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server RADIUS deadtime 10 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa-server LOCAL protocol local &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa authentication enable console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa authentication http console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa authentication ssh console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa authentication telnet console LOCAL&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;aaa authorization command LOCAL &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;http server enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;http 192.168.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;snmp-server host inside MANAGEMENT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;snmp-server community HQ-SNMP&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;no snmp-server enable traps&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;floodguard enable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;sysopt connection permit-ipsec&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto ipsec transform-set HQ esp-aes-256 esp-sha-hmac &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ 50 ipsec-isakmp&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ 50 match address IPSEC-TUN&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ 50 set peer 1.2.3.4&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ 50 set transform-set HQ&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ 50 set security-association lifetime seconds 3600 kilobytes 65535&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;crypto map HQ interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp enable outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp key ********** address 1.2.3.4 netmask 255.255.255.255 &lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp identity address&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp policy 50 authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp policy 50 encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp policy 50 hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp policy 50 group 2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;isakmp policy 50 lifetime 86400&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;telnet timeout 15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ssh 1.2.3.4 255.255.255.0 outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;ssh timeout 15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;management-access inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;console timeout 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;dhcpd auto_config outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;username support password ********** encrypted privilege 15&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;terminal width 80&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: courier new,courier; color: #003300;"&gt;Cryptochecksum:6b81bcad601b2ea0bcd4d9966cc8d711&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:47:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218089#M349491</guid>
      <dc:creator>ngthen</dc:creator>
      <dc:date>2019-03-12T01:47:10Z</dc:date>
    </item>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218090#M349492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the PIX wont accept the management connection if you attempt it to the destination IP address 10.10.12.1 at the moment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could always use the "outside" interface to use the management connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you specifically want to run the management connections through the IPsec tunnel then you could consider adding the remote site PIX public IP address to the crypto map ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would naturally have to add this on both the main site and remote site as mirror images. Main site would also require a NAT0 rule addition that would tell the main site device to NOT NAT the internal hosts when they were attempting to connect to the remote PIX public IP Address and therefore that traffic would get tunneled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list IPSEC-TUN permit ip host 216.110.239.22 10.50.1.0 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list IPSEC-TUN permit ip host 216.110.239.22 172.16.0.0 255.255.240.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Main Site&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list IPSEC-TUN permit ip 10.50.1.0 255.255.255.0 host 216.110.239.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list IPSEC-TUN permit ip 172.16.0.0 255.255.240.0 host 216.110.239.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 10.50.1.0 255.255.255.0 host 216.110.239.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 172.16.0.0 255.255.240.0 host 216.110.239.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the configurations would be different on your actual devices since you have already existing NAT0 ACL and the interface used at the main site for LAN could be something else than "inside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 16:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218090#M349492</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T16:59:25Z</dc:date>
    </item>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218091#M349493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, if I try to create a management connection the SSH session will fail.&amp;nbsp; The main reason I was wanting to use the tunnel was for SNMP so that I didn't sent it over the Internet.&amp;nbsp; However anything I try on the PIX even ping inside 172.16.1.230 fails.&amp;nbsp; If I ping the same from a workstation on the other end, it works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 17:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218091#M349493</guid>
      <dc:creator>ngthen</dc:creator>
      <dc:date>2013-05-22T17:36:25Z</dc:date>
    </item>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218092#M349494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above changes in the Encryption Domain and the NAT configuration also apply to using SNMP to the PIX through the L2L VPN. This I have tested personally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could for example use SNMP and send Syslog from the PIX by simply stating in the configuration that "outside" interface was used. For example with the logging the PIX would then use the "outside" interface IP address as the source of the Syslogs sent to the server and if we had the previously suggest ACL configurations, then it should be possible to run all that traffic through the protected L2L VPN Connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 17:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218092#M349494</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T17:40:18Z</dc:date>
    </item>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218093#M349496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So you are suggesting that I add the following in addition to the existing lines in the IPSEC-TUN acl?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list IPSEC-TUN permit ip host 216.110.239.22 10.50.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list IPSEC-TUN permit ip host 216.110.239.22 172.16.0.0 255.255.240.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The remote site has WWW published using the 216.110.239.22.&amp;nbsp; Would this traffic now go through the tunnel as well?&amp;nbsp; No big deal, just checking.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 20:36:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218093#M349496</guid>
      <dc:creator>ngthen</dc:creator>
      <dc:date>2013-05-22T20:36:02Z</dc:date>
    </item>
    <item>
      <title>PIX 501 VPN with NAT and same subnets</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218094#M349498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding it would work so that when the 2 private networks at the main site would be connection to the host IP address of 216.110.239.22 THEN all traffic would be going through the L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would just have to mirror the mentioned VPN ACL rules jon the main site ust like the current existing VPN ACLs rules and on the main site you would need the NAT0 between the main site LAN networks and the remote site public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally this wouldnt affect any other traffic from the Internet to the mentioned public IP address and the WWW server using it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 21:24:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-vpn-with-nat-and-same-subnets/m-p/2218094#M349498</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T21:24:16Z</dc:date>
    </item>
  </channel>
</rss>

