<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPsec tunnel without a private network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198799#M358313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be good to see the configurations you have inserted for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It shouldnt really matter what IP addresses you use for the NAT. The main thing is that the NAT is configured correctly and the ACL defining the tunneled traffic match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I manage a customer firewall where the customer wanted to use the whole connected /24 network as source address for a L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Apr 2013 21:05:18 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-04-12T21:05:18Z</dc:date>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198798#M358311</link>
      <description>&lt;P&gt;I'm trying to achieve a site-to-site ipsec tunnel to a Cisco ASA 5520.&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;Most examples feature the ASA with a public interface that terminates the tuennel and a private network on another interface that the tunnel interacts with.&amp;nbsp; Where my scenario differs is that the interface that accepts the tunnel is part of a public &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;/29 network where I want the remaining hosts on that subnet to be able to route thrugh to the other end of the tunnel.&amp;nbsp; My tunnel gets established, but any attempts to route via the IP assigned to that one interface result in the ASA rejecting traffic.&amp;nbsp; Is this scenario even possible?&amp;nbsp; If so, what configuration options should I consider?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198798#M358311</guid>
      <dc:creator>stmsystems</dc:creator>
      <dc:date>2019-03-12T01:27:45Z</dc:date>
    </item>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198799#M358313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be good to see the configurations you have inserted for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It shouldnt really matter what IP addresses you use for the NAT. The main thing is that the NAT is configured correctly and the ACL defining the tunneled traffic match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I manage a customer firewall where the customer wanted to use the whole connected /24 network as source address for a L2L VPN connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:05:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198799#M358313</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T21:05:18Z</dc:date>
    </item>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198800#M358315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now that I read your question again it seems to me that I might have missunderstood you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that you only have an "outside" interface and all hosts are connected on that network? If so it sound quite strange.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198800#M358315</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T21:11:51Z</dc:date>
    </item>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198801#M358317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Indeed, I've only attached the 'outside' interface as all of my hosts are on that /29.&amp;nbsp; A main router/firewall on that same network controlls access to that vlan and the rule I have in place on it allows the ipsec connection to the ASA from another location on the internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:37:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198801#M358317</guid>
      <dc:creator>stmsystems</dc:creator>
      <dc:date>2013-04-12T21:37:24Z</dc:date>
    </item>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198802#M358318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got to say I have never tried this or had any situation where I would want to use the ASA like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would be something I would have to test as I can't say for sure if its possible or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For one I would atleast make sure the following things&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Make sure you have the configuration "same-security-traffic permit intra-interface&lt;UL&gt;&lt;LI&gt;This will permit the traffic to enter and leave the same interface which in this case is "outside"&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;That the host default route points to the ASA&lt;/LI&gt;&lt;LI&gt;Consider configuring NAT0 for the "outside" /29 network on the "outside" interface when the destination network is the remote site network&lt;/LI&gt;&lt;LI&gt;Use the command "packet-tracer" command to simulate a packet coming from the "outside" host towards the remote site and see what the output is&lt;UL&gt;&lt;LI&gt;packet-tracer input outside tcp &lt;OUTSIDE host="" ip=""&gt; &lt;RANDOM source="" port=""&gt; &lt;REMOTE network="" ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/REMOTE&gt;&lt;/RANDOM&gt;&lt;/OUTSIDE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do you confirm the ASA is rejecting the traffic? Do you see some log message?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you seen any traffic get encapsulated/encrypted at this site OR is there only traffic incoming from the remote site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 23:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198802#M358318</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T23:05:00Z</dc:date>
    </item>
    <item>
      <title>IPsec tunnel without a private network</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198803#M358319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess one might also ask why the main firewall isnt performing the VPN connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or perhaps moving the public network segment behind the ASA and using some other network/link network between the 2 firewalls. Though I am not sure what the current network setup is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 23:08:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-tunnel-without-a-private-network/m-p/2198803#M358319</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-12T23:08:34Z</dc:date>
    </item>
  </channel>
</rss>

