<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT/VPN traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137064#M393916</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to get my backup traffic from my Main office 172.28.0.18 Server to Remote office Server 192.168.100.3 via the Site-To-Site tunnel. My problem is it's getting drop by the NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet trace below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside1 tcp 208.124.202.44 135 192.168.100.3 135&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.100.0&amp;nbsp;&amp;nbsp; 255.255.255.240 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside1_access_in in interface outside1&lt;/P&gt;&lt;P&gt;access-list outside1_access_in extended permit object-group Veeam-Connection object-group DM_INLINE_NETWORK_3 host 192.168.100.3&lt;/P&gt;&lt;P&gt;object-group service Veeam-Connection&lt;/P&gt;&lt;P&gt; service-object object Veeam-Transport&lt;/P&gt;&lt;P&gt; service-object object Veeam-Vmware-Data&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object object Veeam-Transmission&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy1&lt;/P&gt;&lt;P&gt; service-object object Veeam-Installer&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy2&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object object Primus&lt;/P&gt;&lt;P&gt; network-object object Rogers&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt; nat (inside,outside1) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to add another NAT rule before "(inside) to (outside1) source dynamic INSIDE interface" with the specific services that I need, would that fix my problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:39:08 GMT</pubDate>
    <dc:creator>apptionadmin</dc:creator>
    <dc:date>2019-03-12T00:39:08Z</dc:date>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137064#M393916</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to get my backup traffic from my Main office 172.28.0.18 Server to Remote office Server 192.168.100.3 via the Site-To-Site tunnel. My problem is it's getting drop by the NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet trace below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside1 tcp 208.124.202.44 135 192.168.100.3 135&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.100.0&amp;nbsp;&amp;nbsp; 255.255.255.240 inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside1_access_in in interface outside1&lt;/P&gt;&lt;P&gt;access-list outside1_access_in extended permit object-group Veeam-Connection object-group DM_INLINE_NETWORK_3 host 192.168.100.3&lt;/P&gt;&lt;P&gt;object-group service Veeam-Connection&lt;/P&gt;&lt;P&gt; service-object object Veeam-Transport&lt;/P&gt;&lt;P&gt; service-object object Veeam-Vmware-Data&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object object Veeam-Transmission&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy1&lt;/P&gt;&lt;P&gt; service-object object Veeam-Installer&lt;/P&gt;&lt;P&gt; service-object object Veeam-Deploy2&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_3&lt;/P&gt;&lt;P&gt; network-object object Primus&lt;/P&gt;&lt;P&gt; network-object object Rogers&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: VPN&lt;/P&gt;&lt;P&gt;Subtype: ipsec-tunnel-flow&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt; nat (inside,outside1) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside1&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to add another NAT rule before "(inside) to (outside1) source dynamic INSIDE interface" with the specific services that I need, would that fix my problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137064#M393916</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2019-03-12T00:39:08Z</dc:date>
    </item>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137065#M393919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you copy/paste here the ACL that defines the tunneled traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should the hosts on each end form connection with eachother with the actual/local IP addresses or with some public IP addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually in L2L VPN (when possible) you configure NAT0/NAT Exempt type of NAT setup so that the local and remote networks can communicate with eachother through the L2L VPN without using any NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I don't think its possible to test L2L VPN traffic with "packet-tracer" command UNLESS you are testing the traffic originating from your local protected networks to the remote networks. In that case the "packet-tracer" command actually brings up the L2L VPN if its working properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2012 18:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137065#M393919</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-19T18:00:03Z</dc:date>
    </item>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137066#M393922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did try doing the NAT0 but it's depricated in my version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside1_cryptomap; 1 elements; name hash: &lt;/P&gt;&lt;P&gt;access-list outside1_cryptomap line 1 extended permit ip object LAN object Apptionlan1 &lt;/P&gt;&lt;P&gt;&amp;nbsp; access-list outside1_cryptomap line 1 extended permit ip 192.168.100.0 255.255.255.240 172.28.0.0 255.255.0.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2012 18:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137066#M393922</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2012-12-19T18:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137067#M393925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes the last time you have been able to use the old NAT0 configuration ( &lt;STRONG&gt;"nat (inside) 0 x.x.x.x y.y.y.y"&lt;/STRONG&gt; or &lt;STRONG&gt;"nat (inside) 0 access-list ACL"&lt;/STRONG&gt;) has been with 8.2 software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In software levels 8.3 and forward the NAT has changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at your configuration related to the L2L VPN it would seem you could configure the following NAT to allow connections using the real IP addresses of the local and remote hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LOCAL-LAN&lt;/P&gt;&lt;P&gt; subnet 192.168.100.0 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network REMOTE-LAN&lt;/P&gt;&lt;P&gt; subnet 172.28.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside1) source static LOCAL-LAN LOCAL-LAN destination static REMOTE-LAN REMOTE-LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above has/does the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First Object is to define your local LAN network&lt;/LI&gt;&lt;LI&gt;Second Object is to define the remote LAN behind the L2L VPN connection&lt;/LI&gt;&lt;LI&gt;The NAT command performs NAT between interfaces "inside" and "outside1" &lt;UL&gt;&lt;LI&gt;Specifically when the source network is your LAN and the destination network is REMOTE-LAN then &lt;STRONG&gt;NEITHER&lt;/STRONG&gt; of the LAN networks will be NATed. This is why you have the same Object configured twice in the NAT configuration.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also if you need to make ACL rules to allow some traffic, remember to use the actual LAN IP addresses in the ACL rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull. Ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2012 19:02:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137067#M393925</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-19T19:02:42Z</dc:date>
    </item>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137068#M393927</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is one very nice detail explanation and resolution. Much needed for a guy that as not touch Cisco firewall since version 6.x. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much for your help. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2012 20:00:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137068#M393927</guid>
      <dc:creator>apptionadmin</dc:creator>
      <dc:date>2012-12-19T20:00:36Z</dc:date>
    </item>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137069#M393929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I started out with 6.3 software myself and it was a shock (the command/configuration format) after only configuring Cisco switches and router before that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if the above configuration helped to solve your problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it did, please mark the question as answered &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Dec 2012 20:41:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137069#M393929</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-19T20:41:04Z</dc:date>
    </item>
    <item>
      <title>NAT/VPN traffic</title>
      <link>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137070#M393931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From 8.4 you should add route-lookup and no-proxy-arp to the NAT lines if you don't want strange errors.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Dec 2012 22:29:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-vpn-traffic/m-p/2137070#M393931</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-20T22:29:31Z</dc:date>
    </item>
  </channel>
</rss>

