<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stupid Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142063#M360267</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you attach the current configuration of the ASA as a reply for this post?&lt;/P&gt;&lt;P&gt;Also, please specify the IP address of the Sw.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Mar 2013 18:00:07 GMT</pubDate>
    <dc:creator>jocamare</dc:creator>
    <dc:date>2013-03-26T18:00:07Z</dc:date>
    <item>
      <title>Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142044#M360248</link>
      <description>&lt;P&gt;Hi, I have the senario below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.0/24 (192.168.1.5 log server) firewall(A) --------------tunnel -------switches-------- firewall(B) 192.168.2.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I send logs from the switches to the firewall B and then to the firewall(A) via the tunnel with some nating or port forwarding configuration in firewall(B)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142044#M360248</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2019-03-12T01:13:44Z</dc:date>
    </item>
    <item>
      <title>Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142045#M360249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Assuming a layer 3 switch, i would :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - configure the switch to route to&amp;nbsp; firewall B as a next hop to access the log server IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - configure some policy outside nat on the ASA for the the log traffic coming from the switch to be PATed (possibly to the interface IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - adding the natted IP to the interesting traffic of VPN tunnel at firewall B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; - ensuring that the natted IP is part of the interesting traffic at firwall A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mashal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 18:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142045#M360249</guid>
      <dc:creator>malshbou</dc:creator>
      <dc:date>2013-03-13T18:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142046#M360250</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They are layer 2 switches,&lt;/P&gt;&lt;P&gt;I configured the switches to send logs to (firewall b) public ip staticly nated to a private IP on the Firewall A but that doesn't work, I know the Idea but I don't know how to configure it!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Mar 2013 18:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142046#M360250</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-13T18:59:08Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142047#M360251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 03:37:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142047#M360251</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-14T03:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142048#M360252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can NAT from outside (real IP of the switch) to outside (inside the VPN tunnel)&lt;/P&gt;&lt;P&gt;you have to allow same-security-traffic permit intra-interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming your switch IP is 2.2.2.10 and you want to nat it to 192.168.2.10 (as if it was on the inside network), here's the config on firewall B:&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network VPN&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network SWITCH&lt;/P&gt;&lt;P&gt; host 2.2.2.10&lt;/P&gt;&lt;P&gt;object network SWITCH_NAT&lt;/P&gt;&lt;P&gt; host 192.168.2.10&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static INSIDE INSIDE destination static VPN VPN no-proxy-arp&lt;/P&gt;&lt;P&gt;nat (outside,outside) source static SWITCH SWITCH_NAT destination static VPN VPN no-proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first is nonat for normal VPN traffic and the second is NAT for switch.&lt;/P&gt;&lt;P&gt;All you need on firewall A is the equivalent nonat but the networks will be reversed (its inside as source and VPN as destination)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After a ping fron inside (B) to VPN and from switch to VPN, we have the following xlates and we get a reply:&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show xlate&lt;/P&gt;&lt;P&gt;2 in use, 2 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;NAT from outside:2.2.2.10 to outside:192.168.2.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags s idle 0:01:06 timeout 0:00:00&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.2.0/24 to outside:192.168.2.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sI idle 0:00:59 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope that helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 03:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142048#M360252</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-03-14T03:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142049#M360253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;I already enabled &lt;STRONG&gt;same-security-traffic permit intra-interface &lt;/STRONG&gt;but no luck below is my configuration (it has alot of unwanted configuration because its just a test firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also Do I need to do any configuraation in the firewall A, its a UDP syslog msg so its a one direction traffic??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname test-asa5520-fw&lt;/P&gt;&lt;P&gt;domain-name XXXXXXXXXX&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 192.168.18.0 ISP1VPN&lt;/P&gt;&lt;P&gt;name 192.168.19.0 ISP2VPN&lt;/P&gt;&lt;P&gt;name 172.25.3.0 firewalla_Private&lt;/P&gt;&lt;P&gt;name 172.25.100.5 File-Server&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.25.100.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt;description ISP1&lt;/P&gt;&lt;P&gt;nameif ISP1&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address X.x.x.6 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt;description ISP2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;nameif ISP2&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif wguest&lt;/P&gt;&lt;P&gt;security-level 90&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa824-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock summer-time CDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;name-server File-Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt;service-object icmp echo&lt;/P&gt;&lt;P&gt;service-object icmp echo-reply&lt;/P&gt;&lt;P&gt;service-object icmp time-exceeded&lt;/P&gt;&lt;P&gt;service-object icmp unreachable&lt;/P&gt;&lt;P&gt;service-object tcp eq www &lt;/P&gt;&lt;P&gt;service-object tcp eq https &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_2&lt;/P&gt;&lt;P&gt;service-object icmp echo&lt;/P&gt;&lt;P&gt;service-object icmp echo-reply&lt;/P&gt;&lt;P&gt;service-object icmp time-exceeded&lt;/P&gt;&lt;P&gt;service-object icmp unreachable&lt;/P&gt;&lt;P&gt;service-object tcp eq www &lt;/P&gt;&lt;P&gt;service-object tcp eq https &lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_3&lt;/P&gt;&lt;P&gt;service-object ip &lt;/P&gt;&lt;P&gt;service-object icmp echo&lt;/P&gt;&lt;P&gt;service-object icmp echo-reply&lt;/P&gt;&lt;P&gt;!!access-list XXXXX-vpn-isp1_splitTunnelAcl standard permit 172.25.18.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 ISP1VPN 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 ISP2VPN 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 firewalla_Private 255.255.255.0 &lt;/P&gt;&lt;P&gt;! access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 192.168.5.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.25.100.0 255.255.255.0 192.168.5.0 255.255.255.240 &lt;/P&gt;&lt;P&gt;access-list xxxxx-vpn-isp2_splitTunnelAcl standard permit 172.25.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ISP1_access_in remark permit ping over ISP1 network&lt;/P&gt;&lt;P&gt;access-list ISP1_access_in extended permit object-group DM_INLINE_SERVICE_2 any x.x.x.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list ISP1_access_in remark permit ping over ISP1 network&lt;/P&gt;&lt;P&gt;! access-list ISP1_access_in extended permit ip 192.168.3.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list ISP1_access_in extended permit object-group DM_INLINE_SERVICE_3 any interface ISP1 &lt;/P&gt;&lt;P&gt;access-list ISP1_access_in remark permit ping over ISP1 network&lt;/P&gt;&lt;P&gt;access-list ISP1_3_cryptomap extended permit ip 172.25.100.0 255.255.255.0 Firewalla_Private 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list wguest_nat_outbound extended permit ip 192.168.1.0 255.255.255.0 any &lt;/P&gt;&lt;P&gt;access-list ISP1_1_cryptomap extended permit ip 172.25.100.0 255.255.255.0 Firewalla_Private 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list inside_mpc extended permit ip host y.y.y.y host 172.25.100.21 inactive &lt;/P&gt;&lt;P&gt;access-list global_mpc extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl standard permit 172.25.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DefaultRAGroup_splitTunnelAcl_1 standard permit 172.25.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list cisco_splitTunnelAcl standard permit 172.25.100.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging trap notifications&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging facility 16&lt;/P&gt;&lt;P&gt;logging host inside 172.25.3.213&lt;/P&gt;&lt;P&gt;logging message 305013 level informational&lt;/P&gt;&lt;P&gt;logging message 733100 level informational&lt;/P&gt;&lt;P&gt;flow-export destination inside 172.25.3.53 9996&lt;/P&gt;&lt;P&gt;flow-export template timeout-rate 1&lt;/P&gt;&lt;P&gt;flow-export delay flow-create 60&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu ISP1 1500&lt;/P&gt;&lt;P&gt;mtu ISP2 1500&lt;/P&gt;&lt;P&gt;mtu wguest 1500&lt;/P&gt;&lt;P&gt;ip local pool cisco 192.168.5.5-192.168.5.10 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover lan unit primary&lt;/P&gt;&lt;P&gt;failover lan interface failover+stateful GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover polltime unit 1 holdtime 10&lt;/P&gt;&lt;P&gt;failover key *****&lt;/P&gt;&lt;P&gt;failover link failover+stateful GigabitEthernet0/3&lt;/P&gt;&lt;P&gt;failover interface ip failover+stateful 1.1.1.1 255.255.255.252 standby 1.1.1.2&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-711-52.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (ISP1) 1 interface&lt;/P&gt;&lt;P&gt;!global (ISP2) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.25.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (wguest) 1 access-list wguest_nat_outbound&lt;/P&gt;&lt;P&gt;static (inside,ISP1) udp interface syslog 172.25.3.213 syslog netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group ISP1_access_in in interface ISP1&lt;/P&gt;&lt;P&gt;route ISP1 0.0.0.0 0.0.0.0 x.x.x.1 250&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa-server vpn protocol radius&lt;/P&gt;&lt;P&gt;aaa-server vpn (inside) host File-Server&lt;/P&gt;&lt;P&gt;key *****&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 wguest&lt;/P&gt;&lt;P&gt;http 172.25.100.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.25.3.52 poll community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.25.100.31 poll community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.25.3.213 community ***** version 2c&lt;/P&gt;&lt;P&gt;snmp-server host inside 172.25.3.53 poll community *****&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community *****&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;snmp-server enable traps ipsec start stop&lt;/P&gt;&lt;P&gt;snmp-server enable traps entity config-change fru-remove&lt;/P&gt;&lt;P&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;/P&gt;&lt;P&gt;service resetoutside&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set tans esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set tans mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set test esp-3des esp-md5-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set test mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set TRANS_ESP_3DES_SHA mode transport&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;/P&gt;&lt;P&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set test tans ESP-AES-128-SHA ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;/P&gt;&lt;P&gt;crypto map ISP1_map 1 match address ISP1_1_cryptomap&lt;/P&gt;&lt;P&gt;crypto map ISP1_map 1 set pfs group1&lt;/P&gt;&lt;P&gt;crypto map ISP1_map 1 set peer z.z.z.130 &lt;/P&gt;&lt;P&gt;crypto map ISP1_map 1 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;!crypto map ISP1_map 3 match address ISP1_3_cryptomap&lt;/P&gt;&lt;P&gt;!crypto map ISP1_map 3 set pfs group1&lt;/P&gt;&lt;P&gt;!crypto map ISP1_map 3 set peer z.z.z.132 &lt;/P&gt;&lt;P&gt;!crypto map ISP1_map 3 set transform-set ESP-3DES-SHA&lt;/P&gt;&lt;P&gt;crypto map ISP1_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;crypto map ISP1_map interface ISP1&lt;/P&gt;&lt;P&gt;!crypto map ISP2_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;/P&gt;&lt;P&gt;!crypto map ISP2_map interface ISP2&lt;/P&gt;&lt;P&gt;crypto ca trustpoint LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt;keypair LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt;crl configure&lt;/P&gt;&lt;P&gt;crypto ca server &lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;crypto ca certificate chain LOCAL-CA-SERVER&lt;/P&gt;&lt;P&gt;certificate ca 01&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3082022b 30820194 a0030201 02020101 300d0609 2a864886 f70d0101 05050030 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 29312730 25060355 0403131e 74657374 2d617361 35353230 2d66772e 61676e65 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 742e7461 6d752e65 6475301e 170d3132 31323230 32313330 31355a17 0d313531 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 32323032 31333031 355a3029 31273025 06035504 03131e74 6573742d 61736135 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3532302d 66772e61 676e6574 2e74616d 752e6564 7530819f 300d0609 2a864886 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f70d0101 01050003 818d0030 81890281 8100ad7f 9f33a786 98cf927b d2a56eac &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31501ab4 8d1f9be1 b3fb0b7b 8e6f09a0 ae267fd4 9e2b7124 72f0eeae b1d02ec0 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8ecd3e23 7afdf508 193ee122 024d389b c61b5be3 a300f122 f948608d 362ce9b1 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 697499ba 90b89e41 162d5958 6e97beac 5d75451b e045acd0 d918daa5 14b90ec8 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; e46d20ab 122f3a4e d9c4b1c1 b19194d3 268b0203 010001a3 63306130 0f060355 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1d130101 ff040530 030101ff 300e0603 551d0f01 01ff0404 03020186 301f0603 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 551d2304 18301680 14230c55 9cf92cec f4e9aead 11ba6aac e077949b 6a301d06 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03551d0e 04160414 230c559c f92cecf4 e9aead11 ba6aace0 77949b6a 300d0609 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2a864886 f70d0101 05050003 8181002c f07ae7f8 a7740215 8f819622 f3a8e8a3 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c0b9fb50 ef8d7472 606d1186 4cc686b7 9414bb35 7871c188 42c75eff 5fe05673 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c2f8db46 7575f6a1 4a4f6419 a454fb3c 5069d284 34c5a7da acc8a784 0f1da7ba &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f26df6b5 da08c1a9 67d09ddb c97b10ea 8641e345 01990efc 889051a6 a6d249b4 &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4b4d842b 5dd281a6 8ec8ef5c fa5fb1&lt;/P&gt;&lt;P&gt;&amp;nbsp; quit&lt;/P&gt;&lt;P&gt;crypto isakmp enable ISP1&lt;/P&gt;&lt;P&gt;crypto isakmp policy 10&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp policy 65535&lt;/P&gt;&lt;P&gt;authentication pre-share&lt;/P&gt;&lt;P&gt;encryption 3des&lt;/P&gt;&lt;P&gt;hash sha&lt;/P&gt;&lt;P&gt;group 2&lt;/P&gt;&lt;P&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;crypto isakmp am-disable&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh scopy enable&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;management-access inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics port&lt;/P&gt;&lt;P&gt;threat-detection statistics protocol&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;enable ISP1&lt;/P&gt;&lt;P&gt;svc enable&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.25.100.5&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol l2tp-ipsec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value XXXXXXXX&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup_1 internal&lt;/P&gt;&lt;P&gt;group-policy DefaultRAGroup_1 attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.25.100.5&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value DefaultRAGroup_splitTunnelAcl_1&lt;/P&gt;&lt;P&gt;default-domain value xxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;group-policy DfltGrpPolicy attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.25.100.5&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;/P&gt;&lt;P&gt;default-domain value xxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;group-policy cisco internal&lt;/P&gt;&lt;P&gt;group-policy cisco attributes&lt;/P&gt;&lt;P&gt;dns-server value 172.25.100.5&lt;/P&gt;&lt;P&gt;vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt;split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt;split-tunnel-network-list value cisco_splitTunnelAcl&lt;/P&gt;&lt;P&gt;default-domain value Xxxxxxxx&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup general-attributes&lt;/P&gt;&lt;P&gt;address-pool cisco&lt;/P&gt;&lt;P&gt;authentication-server-group vpn&lt;/P&gt;&lt;P&gt;default-group-policy DefaultRAGroup_1&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group DefaultRAGroup ppp-attributes&lt;/P&gt;&lt;P&gt;no authentication chap&lt;/P&gt;&lt;P&gt;authentication ms-chap-v2&lt;/P&gt;&lt;P&gt;tunnel-group z.z.z.130 type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group z.z.z.130 ipsec-attributes&lt;/P&gt;&lt;P&gt;pre-shared-key *****&lt;/P&gt;&lt;P&gt;tunnel-group cisco type remote-access&lt;/P&gt;&lt;P&gt;tunnel-group cisco general-attributes&lt;/P&gt;&lt;P&gt;address-pool cisco&lt;/P&gt;&lt;P&gt;authentication-server-group vpn LOCAL&lt;/P&gt;&lt;P&gt;default-group-policy cisco&lt;/P&gt;&lt;P&gt;tunnel-group cisco ipsec-attributes&lt;/P&gt;&lt;P&gt;trust-point test&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt;match access-list global_mpc&lt;/P&gt;&lt;P&gt;class-map inside-class&lt;/P&gt;&lt;P&gt;match access-list inside_mpc&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;class-map type inspect http match-all htp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 4096&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ils &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect pptp &lt;/P&gt;&lt;P&gt;class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; flow-export event-type all destination 172.25.3.53&lt;/P&gt;&lt;P&gt;policy-map inside-policy&lt;/P&gt;&lt;P&gt;class inside-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; police output 50000 1500&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;service-policy inside-policy interface inside&lt;/P&gt;&lt;P&gt;prompt priority state hostname &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 14:02:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142049#M360253</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-14T14:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142050#M360254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on firewall A, you have to allow syslog (udp 514) from outside to the inside syslog server.&lt;/P&gt;&lt;P&gt;you also have to NAT the inside syslog server to a public IP (you can instead PAT the syslog UDP port if you don't have free IP addresses...)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 15:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142050#M360254</guid>
      <dc:creator>Patrick Moubarak</dc:creator>
      <dc:date>2013-03-14T15:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142051#M360255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; my both private networkx via S2S tunnel are full access no restriction at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 15:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142051#M360255</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-14T15:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142052#M360256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my case the IPsec tunnel is between the firewalls, so I use identity NAT and just send the switch (and other host) syslog messages over the tunnel directly to the "real" (on-link) address of the final syslog server.&amp;nbsp; Unix syslog servers can do fowarding; Cisco firewalls so far as I know will not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 17:17:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142052#M360256</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-03-14T17:17:20Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142053#M360257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,ISP1) udp interface syslog 172.25.3.213 syslog netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that the statement that is suppoused to take the traffic from the SWITCH and send it to the other side of the tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, that's incorrect, we are natting the external IP of the ASA not the SW's IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it should look something like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,ISP1) udp &amp;lt;&lt;/STRONG&gt;Sw's IP&lt;STRONG&gt;&amp;gt;syslog &amp;lt;&lt;/STRONG&gt;an IP on the inside, not the server's IP&lt;STRONG&gt;&amp;gt; syslog netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, change this too:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging host inside 172.25.3.213&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Point it to the syslog server on the other side of the VPN tunnel. Also use the syslog's server IP on the SWITCH configuration to indicate where to send the traffic.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Mar 2013 23:35:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142053#M360257</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-14T23:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142054#M360258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for long responds but I was so busy &lt;/P&gt;&lt;P&gt;That it does not work!, so how is the packet should forward to 172.25.3.213 if I natted it to IP inside (ex. 172.25.100.250) ??&lt;/P&gt;&lt;P&gt; switches send packets to the firewall public IP address and then I need that pack is forward to 172.25.3.213.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 16:18:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142054#M360258</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-20T16:18:10Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142055#M360259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The idea was to statically translate the source IP of the packet, from the sw's IP to an internal one, then the traffic will be sent to the server based on the dst IP in the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you want to do it differently, try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (ISP1,ISP1) udp interface syslog 172.25.3.213 syslog netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (ISP1) 1 &amp;lt;&lt;/STRONG&gt;sw's IP&lt;STRONG&gt;&amp;gt; 255.255.255.255&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no logging host inside 172.25.3.213&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging host ISP1 172.25.3.213&lt;/STRONG&gt;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 19:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142055#M360259</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-20T19:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142056#M360260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Either I don't understand you or you don't understand me LoL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why do I need to change logging host, and why do I need to translate switch IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is UDP and I care about one direction only from the switch to log server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log&amp;nbsp; (172.25.3.213) ---- Firewall ---- tunnel --switch A (IP x.x.x.x ) (firewall public IP z.z.z.z)----- (172.25.100.0/24) network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need&amp;nbsp; switch&amp;nbsp; A IP x.x.x.x to send a log packet to log server, so the firewall should translate the destination from the firewall public IP&amp;nbsp; (z.z.z.z) to 172.25.3.213 and send it after the firewall look for routing table for log server and route it via the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I configured the switch log server is the firewall IP (z.z.z.z) because the switch has the default gateway router not the firewall. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 20:32:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142056#M360260</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-20T20:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142057#M360261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just upgraded the firewal to 8.4.5, I did a small progress, that I can send the log to the log server but on private IP after twice nat. can I do it as its public IP, is the VPN tunnel forward the traffic if it is a public IP I tried to add my public subnet to crypto protected access list but that did not work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Mar 2013 13:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142057#M360261</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-22T13:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142058#M360262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Running 8.4, makes this easier.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We can change the source IP address to make the traffic look like it's coming from the inside, and change the destination IP address to forward to traffic that goes to the ASA's public IP to the syslog server on the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;network service syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service udp destination eq syslog&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) source static&lt;/STRONG&gt; &lt;SW&gt; &lt;INTERNAL ip=""&gt; &lt;STRONG&gt;destination static&lt;/STRONG&gt; &lt;ASA&gt; &lt;SYSLOG server=""&gt; &lt;STRONG&gt;service syslog syslog&lt;/STRONG&gt;&lt;/SYSLOG&gt;&lt;/ASA&gt;&lt;/INTERNAL&gt;&lt;/SW&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using that command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;src:&lt;/STRONG&gt;sw&amp;nbsp; &lt;STRONG&gt;dst:&lt;/STRONG&gt; ASA's public&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;becomes this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;src:&lt;/STRONG&gt;int IP&amp;nbsp; &lt;STRONG&gt;dst: &lt;/STRONG&gt;syslog server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Mar 2013 00:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142058#M360262</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-23T00:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142059#M360263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes I was able to send the log to the log server but the problem I faced that all the switches using the same internal IP. I tried to send it but not changing the source ip to internal one but that's not work. So I will keep trying or if you can think something help. if that does not work my only solution is to nat each switch to an unique internal ip and send the log to the log server and Identify them by internal IP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Mar 2013 13:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142059#M360263</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-25T13:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142060#M360264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have configured the "&lt;STRONG&gt;hostname XXX"&lt;/STRONG&gt; on the switches that name should be included in the syslog messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Mar 2013 18:49:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142060#M360264</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2013-03-25T18:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142061#M360265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try it this way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside,outside) source static&lt;/STRONG&gt; &lt;SW&gt; &lt;SW&gt; &lt;STRONG&gt;destination static&lt;/STRONG&gt; &lt;ASA&gt; &lt;SYSLOG server=""&gt; &lt;STRONG&gt;service syslog syslog&lt;/STRONG&gt;&lt;/SYSLOG&gt;&lt;/ASA&gt;&lt;/SW&gt;&lt;/SW&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will keep the source IP intact, but you have to make sure to include the addresses of the switches in the Access-lists that define the VPN's interesting traffic, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ISP1_3_cryptomap extended permit ip&lt;/STRONG&gt; &lt;SW&gt; &lt;NETMASK&gt; &lt;STRONG&gt;Firewalla_Private 255.255.255.0 &lt;/STRONG&gt;&lt;/NETMASK&gt;&lt;/SW&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Mar 2013 19:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142061#M360265</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-25T19:28:39Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142062#M360266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; it doesn't work looks the packet not passing the VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,outside) source static mypc mypc destination static interface server service syslog syslog&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface outside&lt;BR /&gt;Untranslate firewallip/514 to logserver/514&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit object syslog object mypc object server&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type:&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (outside,outside) source static sw sw destination static interface logserver service syslog syslog&lt;/P&gt;&lt;P&gt;Additional Information:&lt;BR /&gt;Static translate sw ip/1065 to firewalla ip/1065&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 7&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: VPN&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: encrypt&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 17:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142062#M360266</guid>
      <dc:creator>majedalanni</dc:creator>
      <dc:date>2013-03-26T17:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Stupid Question</title>
      <link>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142063#M360267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you attach the current configuration of the ASA as a reply for this post?&lt;/P&gt;&lt;P&gt;Also, please specify the IP address of the Sw.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 18:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/stupid-question/m-p/2142063#M360267</guid>
      <dc:creator>jocamare</dc:creator>
      <dc:date>2013-03-26T18:00:07Z</dc:date>
    </item>
  </channel>
</rss>

