<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site VPN NATTING Destination Address in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210485#M349535</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the solution is you configure your VPN as if the destination network is &lt;SPAN style="font-size: 10pt;"&gt;192.168.3.x/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;then you ask the other side to do a policy NAT only for the traffic through this VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;say your network is 172.16.1.0/24:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The far side policy would be for all traffic from his internal network (&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;10.1.2.x/24) to your internal network (172.16.1.0/24) perform a static 1-to-1 nat to the 192.168.3.x/24 network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This way your firewall will not know that there is an IP address conflict for 2 VPNs; otherwise the configuration will not work to have both VPN tunnels established to different peers that have the same subnets at the same time!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ex asa &amp;lt;= 8.2.x&lt;/P&gt;&lt;P&gt;access-list special-nat extended permit ip 10.1.2.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.3.0 access-list special-nat netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;show nat:&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.1.2.0 255.255.255.0 outside 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.3.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex asa &amp;gt;= 8.3&lt;/P&gt;&lt;P&gt;object network internal-net&lt;/P&gt;&lt;P&gt; subnet 10.1.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network special-NAT&lt;/P&gt;&lt;P&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network remote-net&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) source static internal-net &lt;SPAN style="font-size: 10pt;"&gt;special-NAT &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;destination static remote-net remote-net no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;show nat detail:&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static internal-net special-NAT&amp;nbsp;&amp;nbsp; destination static remote-net remote-net&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.1.2.0/24, Translated: 192.168.3.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination - Origin: 172.16.1.0/24, Translated: 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hope that helps,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 May 2013 03:41:05 GMT</pubDate>
    <dc:creator>Patrick Moubarak</dc:creator>
    <dc:date>2013-05-22T03:41:05Z</dc:date>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210482#M349531</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to establish a site to site VPN with a far side. However, what i would like to do is to NAT the destination address. So let say the destination address is 10.1.2.x/24, I would like to nat it to 192.168.3.x/24. The reason being that i already have a site to site vpn using 10.1.2.0/24 as destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210482#M349531</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2019-03-12T01:46:48Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210483#M349532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to confirm, do you want to nat the destination IP for the remote network or for the peer device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version do you have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Felipe. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 May 2013 21:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210483#M349532</guid>
      <dc:creator>lcambron</dc:creator>
      <dc:date>2013-05-21T21:32:35Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210484#M349534</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine there are 2 remote sites where there is overlapping networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this shouldnt be possible even playing around with the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt it be that in both cases the ASA would have to forward the traffic to the same destination network after the UN-NAT and couldnt really differentiate between the 2 L2L connections?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way the typical approach to this is to do the NAT at the remote site and not try to achieve any special NAT configurations on your side. It should be pretty basic for the remote site to do to get around this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 May 2013 21:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210484#M349534</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-21T21:37:41Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210485#M349535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the solution is you configure your VPN as if the destination network is &lt;SPAN style="font-size: 10pt;"&gt;192.168.3.x/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;then you ask the other side to do a policy NAT only for the traffic through this VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;say your network is 172.16.1.0/24:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The far side policy would be for all traffic from his internal network (&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;10.1.2.x/24) to your internal network (172.16.1.0/24) perform a static 1-to-1 nat to the 192.168.3.x/24 network.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;This way your firewall will not know that there is an IP address conflict for 2 VPNs; otherwise the configuration will not work to have both VPN tunnels established to different peers that have the same subnets at the same time!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ex asa &amp;lt;= 8.2.x&lt;/P&gt;&lt;P&gt;access-list special-nat extended permit ip 10.1.2.0 255.255.255.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.3.0 access-list special-nat netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;show nat:&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 10.1.2.0 255.255.255.0 outside 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 192.168.3.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ex asa &amp;gt;= 8.3&lt;/P&gt;&lt;P&gt;object network internal-net&lt;/P&gt;&lt;P&gt; subnet 10.1.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network special-NAT&lt;/P&gt;&lt;P&gt; subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;object network remote-net&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) source static internal-net &lt;SPAN style="font-size: 10pt;"&gt;special-NAT &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;destination static remote-net remote-net no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;show nat detail:&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static internal-net special-NAT&amp;nbsp;&amp;nbsp; destination static remote-net remote-net&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.1.2.0/24, Translated: 192.168.3.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Destination - Origin: 172.16.1.0/24, Translated: 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hope that helps,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 03:41:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210485#M349535</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-05-22T03:41:05Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210486#M349536</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Jouni...my thoughts exactly but the remote refuses to NAT their side...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 12:13:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210486#M349536</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2013-05-22T12:13:42Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210487#M349537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Felipe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying to NAT the remote subnet as it is overlapping with an existing site to site VPN...We are running 8.2.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 12:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210487#M349537</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2013-05-22T12:15:12Z</dc:date>
    </item>
    <item>
      <title>Site to Site VPN NATTING Destination Address</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210488#M349538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Patrick...I will find out if they are willing to do this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 12:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-natting-destination-address/m-p/2210488#M349538</guid>
      <dc:creator>Tshi M</dc:creator>
      <dc:date>2013-05-22T12:20:15Z</dc:date>
    </item>
  </channel>
</rss>

