<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access from outside to a service on a host connected through VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119937#M393192</link>
    <description>&lt;P&gt;Hi all, I got a ASA5510 and I'm trying to make public a service on a host reacheable through VPN IPSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN works well but not the NAT from outside interface.&lt;/P&gt;&lt;P&gt;I need to send packet into VPN with source IP: SRCNetworkGRIS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is published on IP address of outside interface&lt;/P&gt;&lt;P&gt;The remote server is 10.246.100.11&lt;/P&gt;&lt;P&gt;The service (HTTP) must to be published on port 8888 in the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here it's a part of my conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt;host 10.246.100.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (OUTSIDE,OUTSIDE) static interface service tcp www 8888&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRCNetworkGRIS&lt;/P&gt;&lt;P&gt;subnet 10.232.226.56 255.255.255.248&lt;/P&gt;&lt;P&gt;description SRC Network GRIS PRO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.246.0.0&lt;/P&gt;&lt;P&gt;subnet 10.246.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group access_in in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-list access_in extended permit tcp any object ServerVPN eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 match address OUTSIDE_cryptomap_1&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_cryptomap_1 extended permit ip object SRCNetworkGRIS 10.246.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone can help me to find the issue? from debug I see syn timeout, so maybe the remote host can't reply back to ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:44:54 GMT</pubDate>
    <dc:creator>epasqualotto</dc:creator>
    <dc:date>2019-03-12T00:44:54Z</dc:date>
    <item>
      <title>Access from outside to a service on a host connected through VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119937#M393192</link>
      <description>&lt;P&gt;Hi all, I got a ASA5510 and I'm trying to make public a service on a host reacheable through VPN IPSEC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN works well but not the NAT from outside interface.&lt;/P&gt;&lt;P&gt;I need to send packet into VPN with source IP: SRCNetworkGRIS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server is published on IP address of outside interface&lt;/P&gt;&lt;P&gt;The remote server is 10.246.100.11&lt;/P&gt;&lt;P&gt;The service (HTTP) must to be published on port 8888 in the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here it's a part of my conf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt;host 10.246.100.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (OUTSIDE,OUTSIDE) static interface service tcp www 8888&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRCNetworkGRIS&lt;/P&gt;&lt;P&gt;subnet 10.232.226.56 255.255.255.248&lt;/P&gt;&lt;P&gt;description SRC Network GRIS PRO&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.246.0.0&lt;/P&gt;&lt;P&gt;subnet 10.246.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group access_in in interface OUTSIDE&lt;/P&gt;&lt;P&gt;access-list access_in extended permit tcp any object ServerVPN eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 match address OUTSIDE_cryptomap_1&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_cryptomap_1 extended permit ip object SRCNetworkGRIS 10.246.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone can help me to find the issue? from debug I see syn timeout, so maybe the remote host can't reply back to ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:44:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119937#M393192</guid>
      <dc:creator>epasqualotto</dc:creator>
      <dc:date>2019-03-12T00:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: Access from outside to a service on a host connected through</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119938#M393194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that you have the following setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A L2L VPN between 2 sites&lt;/LI&gt;&lt;LI&gt;Remote site has the Web server&lt;/LI&gt;&lt;LI&gt;Local site wants to enable public access to the remote server through its Internet connection and public IP address space&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case I would imagine the problem is the return routing for the Web site connection and before that probably the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you consider that the source address to this public service can be nearly any public IP address it would mean that the remote site should tunnel all traffic for the Web server to the L2L VPN connection for the return traffic to be forwarded correctly. In the same way the local site should tunnel traffic with any source address to the remote site server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood the situation correctly this is probably what happens when attempting the connection&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Internet user initiates HTTP connection to the Web Server&lt;/LI&gt;&lt;LI&gt;Connection forms on the local Site Firewall&lt;/LI&gt;&lt;LI&gt;At this point I'm not totally sure without Labing the setup&amp;nbsp; &lt;UL&gt;&lt;LI&gt;Either the firewall forwards the connection back to public network where it gets lost immediately&lt;/LI&gt;&lt;LI&gt;Or the firewall forwards the connection to the L2L VPN where it gets lost (though I kind of doubt this option)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;If the connection actually gets forwarded to the Web Server though the L2L VPN (which I doubt) I assume the return traffic for the TCP connection forming gets lost at the remote site firewall. (It either forwards the return traffic straight to public network or something else)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm my original assumption of your network setup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also share the whole L2L VPN configuration and possibly the whole NAT configuration if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this we could look into an alternative configuration to establish this connectivity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 13:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119938#M393194</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T13:21:22Z</dc:date>
    </item>
    <item>
      <title>Access from outside to a service on a host connected through VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119939#M393195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes your assumption is correct.&lt;/P&gt;&lt;P&gt;I think the packet reach the remote server but cannot come back. Now I'm trying to install wireshark to check what's happen in the remote site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the config of the tunnel:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 match address OUTSIDE_cryptomap_1&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 set pfs&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 set peer remote_ip&lt;/P&gt;&lt;P&gt;crypto map LAN_map 4 set ikev1 transform-set ESP-AES-128-MD5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_cryptomap_1 extended permit ip object SRCNetworkGRIS 10.246.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group remote_ip type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group remote_ip general-attributes&lt;/P&gt;&lt;P&gt;default-group-policy GroupPolicy_remote_ip&lt;/P&gt;&lt;P&gt;tunnel-group remote_ip ipsec-attributes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (any,any) source static otherNetwork1 SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0 &lt;/P&gt;&lt;P&gt;nat (any,any) source static otherNetwork2 SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) static interface service tcp www 8888&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the only nat rules for this network.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 14:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119939#M393195</guid>
      <dc:creator>epasqualotto</dc:creator>
      <dc:date>2013-01-09T14:03:09Z</dc:date>
    </item>
    <item>
      <title>Access from outside to a service on a host connected through VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119940#M393196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wireshark say that I don't come to the remote server.&lt;/P&gt;&lt;P&gt;Maybe the packet is dropped by the remote VPN peer.&lt;/P&gt;&lt;P&gt;I know that I can go only with these IP 10.232.226.56 255.255.255.248 so maybe the NAT don't translate the IP before tunnel it on the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestion?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 14:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119940#M393196</guid>
      <dc:creator>epasqualotto</dc:creator>
      <dc:date>2013-01-09T14:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Access from outside to a service on a host connected through</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119941#M393197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think I finally got it but cant confirm it without creating an actual L2L VPN for my current lab setup (which I will only do if you cant get this working with the below steps)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So heres what I did&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configured with a single NAT statement a NAT that does the following or fills the following criteria&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;Traffic from any source address from WAN will be NATed to a Private IP address NAT Pool WHEN the destination IP address is the local ASA WAN interface IP address and Destination Port is TCP/8888&lt;/LI&gt;&lt;LI&gt;For the above Traffic the WAN Interface IP address will be translated to a Private IP address on the remote site&lt;/LI&gt;&lt;LI&gt;The Destination port of TCP/8888 will be translated to the real port of TCP/80&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Configured a L2L VPN configuration (Just to see if the traffic generated will try to initiate the negotiation for the L2L VPN also)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;Traffic Source is the NAT Pool configured in the above NAT configurations&lt;/LI&gt;&lt;LI&gt;Traffic Destination is the whole remote site network&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So here are my configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base Information&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;WAN&lt;/STRONG&gt; = my "outside" interface&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;L2L-VPN-POOL&lt;/STRONG&gt; = defines the NAT pool towards the L2L VPN&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;L2L-REMOTE&lt;/STRONG&gt; = defines the remote site LAN&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-SERVER-LOCAL&lt;/STRONG&gt; = defines the remote web servers local IP address&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-REAL &lt;/STRONG&gt;= defines the actual port used on the web server&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-NAT&lt;/STRONG&gt; = defines the NATed / Mapped port used for the web server on the local firewall&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network L2L-VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; range 10.10.200.1 10.10.200.200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network L2L-REMOTE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEB-SERVER-LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.10.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WEB-REAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp destination eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WEB-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp destination eq 8888&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above are network and service objects configured for the purpose of the L2L VPN and NAT configurations&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (WAN,WAN) 1 source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above is the NAT configuration to handle both the Source hosts and the Destination Web Server&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;(WAN,WAN)&lt;/STRONG&gt; = defines that the NAT is done for traffic both entering and leaving the same interface&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;source dynamic&lt;/STRONG&gt; = defines that Dynamic NAT will be done for the Source addresses&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;any&lt;/STRONG&gt; = source address for the NAT can be any&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;L2L-POOL&lt;/STRONG&gt; = contains the IP addresses to be used for induvidual users from the Internet&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;destination static&lt;/STRONG&gt; = defines that Static NAT will be done for the Destination addresses&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;interface&lt;/STRONG&gt; = defines that the WAN interface IP address will be used as the NAT address for the remote site server&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-SERVER-LOCAL &lt;/STRONG&gt;= defines the Web Server Local IP address at the remote site&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-NAT&lt;/STRONG&gt; = defines Mapped Web service port&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WEB-REAL&lt;/STRONG&gt; = defines Real Web service port&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list TEST-L2L-CRYPTO extended permit ip object L2L-VPN-POOL object L2L-REMOTE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Encryption Domain for the L2L VPN configured below&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ipsec ikev1 transform-set AES-256 esp-aes-256 esp-sha-hmac&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map CRYPTOMAP 10 match address TEST-L2L-CRYPTO&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map CRYPTOMAP 10 set peer 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map CRYPTOMAP 10 set ikev1 transform-set AES-256&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto map CRYPTOMAP interface WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto isakmp identity address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 enable WAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;crypto ikev1 policy 10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; authentication pre-share&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; encryption aes-256&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; hash sha&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; group 2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; lifetime 28800&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 1.1.1.1 type ipsec-l2l&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;tunnel-group 1.1.1.1 ipsec-attributes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ikev1 pre-shared-key *****&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above is a very basic L2L VPN configuration to catch the above NAT configurations traffic and try to direct it to the L2L VPN tunnel&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;UL&gt;&lt;LI&gt;Source address for the Tunnel is the NAT Pool configured above&lt;/LI&gt;&lt;LI&gt;Destination address for the Tunnel is the remote site network and therefore also the Real IP address of the remote site Web Server&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only means to test this configuration at the moment was to use the "packet-tracer" command to show what the Firewall would do to a packet arriving from WAN to the WAN Interface IP address using port TCP/8888&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base Information&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt; = My WAN interface IP address&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;y.y.y.y&lt;/STRONG&gt; = Random Public source IP address for the Web Server connection&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;WAN-IN&lt;/STRONG&gt; = My WAN interface ACL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# packet-tracer input WAN tcp y.y.y.y 2054 x.x.x.x 8888&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Phase: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Subtype: static&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;nat (WAN,WAN) source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;NAT divert to egress interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #00ff00;"&gt;Untranslate x.x.x.x/8888 to 10.10.1.100/80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above shows that the "packet-tracer" test is hitting the configured NAT rule and is correctly translation the WAN interface IP address to the real IP address of the remote site web server&lt;/LI&gt;&lt;LI&gt;It also shows that the TCP destination port is correctly translated from mapped to real&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Phase: 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Type: ACCESS-LIST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Subtype: log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;access-group WAN-IN in interface WAN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;access-list WAN-IN extended permit ip host y.y.y.y any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above shows that the traffic is hitting my WAN-IN ACLs rule allowing the traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Phase: 5&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Type: NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Subtype:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;nat (WAN,WAN) source dynamic any L2L-VPN-POOL destination static interface WEB-SERVER-LOCAL service WEB-NAT WEB-REAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #00ff00;"&gt;Dynamic translate y.y.y.y/2054 to 10.10.200.120/2054&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above shows that the random Public Source address is correctly translated to a random NAT Pool IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Phase: 7&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Type: VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Subtype: encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Result: DROP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Config:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above shows that the above packet has also hit a configured L2L VPN rule.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;NOTE!&lt;/STRONG&gt; The result is DROP because my L2L VPN configuration isnt valid to bring up any L2L VPN connection. The L2L VPN configuration is only there to see if my configurations still forward the traffic to the L2L VPN from the public network&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with the above you might be able to test your setup. Just define the configurations to use your own "object" or "object-group" and IP addresses or networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some things I would take into consideration judging by your above configurations&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I would avoid using NAT configurations with "any,any" interfaces. They might at some point mess things up&lt;/LI&gt;&lt;LI&gt;Consider configuring the above NAT configuration as the First NAT rule so that no other rule will apply before it and therefore make it useless.&lt;UL&gt;&lt;LI&gt;This would be done with adding line number "1" after the (WAN,WAN) configuration of the NAT&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;You will need "same-security-traffic permit intra-interface" configuration for this to work.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally also take precaution if you are going to test this in a production environment. Have a plan to fall back to the old configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rate the answers if you have found the information helpfull and if it does solve your problem please mark the questions as answered. Naturally also ask more if either the configuration doesnt work or if there is something more related to this setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 16:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119941#M393197</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-09T16:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access from outside to a service on a host connected through</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119942#M393198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni, thanks for the posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll fix the issue (before your mail) by not using the NAT on the object network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ServerVPN&lt;/P&gt;&lt;P&gt; host 10.246.100.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service Private_G&lt;/P&gt;&lt;P&gt; service tcp destination eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SRCNetworkG&lt;/P&gt;&lt;P&gt; subnet 10.232.226.56 255.255.255.248&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Public2&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #00ff00;"&gt;nat (OUTSIDE,OUTSIDE) source static any SRCNetworkG destination static Public2 ServerVPN service Private_G Private_G&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and not &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;object network ServerVPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;nat (OUTSIDE,OUTSIDE) static interface service tcp www www&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;nat (OUTSIDE,OUTSIDE) source static any SRCNetworkGRIS destination static obj-10.246.0.0 obj-10.246.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I don't understand why.&lt;/P&gt;&lt;P&gt;I'll check tomorrow your last post better to see what change from my last config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pasqu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jan 2013 17:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119942#M393198</guid>
      <dc:creator>epasqualotto</dc:creator>
      <dc:date>2013-01-09T17:21:45Z</dc:date>
    </item>
    <item>
      <title>Access from outside to a service on a host connected through VPN</title>
      <link>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119943#M393199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you been able to test the above setup I mentioned?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 07:20:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/access-from-outside-to-a-service-on-a-host-connected-through-vpn/m-p/2119943#M393199</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-11T07:20:40Z</dc:date>
    </item>
  </channel>
</rss>

