<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Allow only one host access to VPN site to site tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981869#M435461</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see any VPN configuration on this ASA. Are you terminating the VPN somewhere else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Jun 2012 04:35:00 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-06-01T04:35:00Z</dc:date>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981862#M435454</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a ASA 5510 that has multiple site to site VPNs. I need to create an additiona site to site VPN but only allow 1 host to access and traverse the tunnel. The network is on a 192.168.5.x but the host that will need to access this tunnel needs to be on a 172.16.33.x network. I dont want any other traffic allowed to access or traverse the VPN tunnel for this host.&amp;nbsp; How can I set this up? Any code examples would be great. Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981862#M435454</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2019-03-11T23:13:05Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981863#M435455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls share your existing configuration to understand your topology. Where is this 172.16.33.x network connected to?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 03:57:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981863#M435455</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-30T03:57:20Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981864#M435456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. Here is what I have, please excuse my rudimentray drawing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[HOST 172.16.33.x]---------VLAN------------[3750G]------------------------[ASA 5510]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The entire network is a 192.168.5.x network space. The vlan is the only subnet in the 172.16.33.x range with one host connected. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 14:29:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981864#M435456</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-05-30T14:29:18Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981865#M435457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From this diagram it looks like your 3750 is terminating the vlan and doing the routing between the two vlans?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 14:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981865#M435457</guid>
      <dc:creator>nikolamitev</dc:creator>
      <dc:date>2012-05-30T14:49:49Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981866#M435458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes that is correct. I currently do not have a vlan on the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 14:57:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981866#M435458</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-05-30T14:57:45Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981867#M435459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the ASA, you would need to have the following configured:&lt;/P&gt;&lt;P&gt;1) Route for 172.16.33.x towards the 3750G 192.168.5.x ip address.&lt;/P&gt;&lt;P&gt;2) VPN crypto ACL should include the 172.16.33.x host/network&lt;/P&gt;&lt;P&gt;3) NAT exemption also need to include the 172.16.33.x host/network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the remote end, you would need to have a mirror image crypto acl that include the 172.16.33.x as well. NAT exemption on the remote end should also include that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can share your config from both ends, I can assist to incorporate that into your existing configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 May 2012 21:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981867#M435459</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-30T21:22:58Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981868#M435460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the ASA config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname fw&lt;/P&gt;&lt;P&gt;domain-name xxxxx&lt;/P&gt;&lt;P&gt;enable password k4HlcGX2lC1ypFOm encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address xxx.xxx.xxx.xxx 255.255.255.248 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.75.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;shutdown&lt;/P&gt;&lt;P&gt;no nameif&lt;/P&gt;&lt;P&gt;no security-level&lt;/P&gt;&lt;P&gt;no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 192.168.75.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt;nameif management&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;management-only&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name xxxxxxxxxxxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host xxx.xxx.xxx.xxx eq www &lt;/P&gt;&lt;P&gt;access-list DMZtoInside extended permit tcp host 192.168.75.5 host 192.168.5.xx eq 1433 &lt;/P&gt;&lt;P&gt;access-list DMZtoInside extended deny ip any 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list DMZtoInside extended permit ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (management) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp xxx.xxx.xxx.xxx www 192.168.75.5 www netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (DMZ,outside) tcp xxx.xxx.xxx.xxx https 192.168.75.5 https netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,DMZ) 192.168.5.xx 192.168.5.xx netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZtoInside in interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;&lt;P&gt;route inside 192.168.5.xx 255.255.255.255 172.16.75.253 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-reco&lt;/P&gt;&lt;P&gt;rd DfltAccessPolicy&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 management&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstartcrypto ipsec security-association lifetime seconds 28800&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;inspect ftp &lt;/P&gt;&lt;P&gt;inspect h323 h225 &lt;/P&gt;&lt;P&gt;inspect h323 ras &lt;/P&gt;&lt;P&gt;inspect rsh &lt;/P&gt;&lt;P&gt;inspect rtsp &lt;/P&gt;&lt;P&gt;inspect esmtp &lt;/P&gt;&lt;P&gt;inspect sqlnet &lt;/P&gt;&lt;P&gt;inspect skinny &lt;/P&gt;&lt;P&gt;inspect sunrpc &lt;/P&gt;&lt;P&gt;inspect xdmcp &lt;/P&gt;&lt;P&gt;inspect sip &lt;/P&gt;&lt;P&gt;inspect netbios &lt;/P&gt;&lt;P&gt;inspect tftp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;Cryptochecksum:e6f986d4427&lt;/P&gt;&lt;P&gt;504d675bb1&lt;/P&gt;&lt;P&gt;ca51a81534&lt;/P&gt;&lt;P&gt;5&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2012 03:53:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981868#M435460</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-01T03:53:14Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981869#M435461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't see any VPN configuration on this ASA. Are you terminating the VPN somewhere else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Jun 2012 04:35:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981869#M435461</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-01T04:35:00Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981870#M435462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies, I should have clarified. Currently there are no VPN configurations on this ASA. After I am done with this tunnel, I plan to migrate several other tunnels that now terminate on a old PIX 515 to this ASA. I don't have access to the other side but this is what they require:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IKE =&amp;gt;&amp;nbsp; 3DES/SHA/DH2&lt;BR /&gt;IPSEC =&amp;gt; 3DES/SHA - no PFS&lt;/P&gt;&lt;P&gt;Local network: 198.xx.xxx.xx&amp;nbsp;&amp;nbsp; (their svr address)&lt;BR /&gt;Remote network: 172.xx.xx.xx&amp;nbsp; (will need to translate into this&lt;BR /&gt;address.)&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2012 01:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981870#M435462</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-02T01:02:57Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981871#M435463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configuration on the ASA version 8.2.1 is the same as your PIX. The only difference is the pre-shared key is now configured under the tunnel-group configuration. Other than that, all the config is pretty much the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you actually have 172.16.33.x configured on your host/network? or you actually need to translate your internal subnet to 172.16.33.x when accessing the remote LAN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2012 03:14:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981871#M435463</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-02T03:14:35Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981872#M435464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I dont have a 172.16.33.x on my internal network, I would need to translate the host on my internal network to the 172.16.33.x when accessing the remote LAN. I also want only the one host to access the remote LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked at the PIX config for the site2site VPNs that I will have to migrate eventually and here is what I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 20 ipsec-isakmp&lt;BR /&gt;crypto map ch-vpn 20 match address encrypt-location&lt;BR /&gt;crypto map ch-vpn 20 set peer xx.xx.xx.xx&lt;BR /&gt;crypto map ch-vpn 20 set transform-set ch-strong&lt;/P&gt;&lt;P&gt;isakmp key ******** address xx.xx.xx.xx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;BR /&gt;isakmp policy 10 encryption aes&lt;BR /&gt;isakmp policy 10 hash sha&lt;BR /&gt;isakmp policy 10 group 2&lt;BR /&gt;isakmp policy 10 lifetime 86400&lt;BR /&gt;isakmp policy 20 authentication pre-share&lt;BR /&gt;isakmp policy 20 encryption 3des&lt;BR /&gt;isakmp policy 20 hash sha&lt;BR /&gt;isakmp policy 20 group 2&lt;BR /&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I need is an access-list and a route inside and outside to add to the above to migrate each one over. I have 6 site2site VPNs to migrate, so the crypto map starts at 10 and ends at 60, however the isakmp policy starts at 10 and ends at 20. Shouldn't I have a isakmp policy for each crypto map entry? Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2012 04:40:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981872#M435464</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-02T04:40:41Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981873#M435465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you don't need 1 isakmp policy for each crypto map entry. The isakmp policy needs to be listed so it can be negotiated with the remote end as long as there is a match policy. It will go down the list of isakmp policies configured until a match is found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to NAT your internal network to 172.16.33.x when going to the remote end, here is the NAT statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat-to-remote permit ip &lt;INTERNAL-LAN&gt; &lt;SUBNET&gt; &lt;REMOTE-LAN&gt; &lt;SUBNET&gt;&lt;/SUBNET&gt;&lt;/REMOTE-LAN&gt;&lt;/SUBNET&gt;&lt;/INTERNAL-LAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list nat-to-remote&lt;/P&gt;&lt;P&gt;global (outside) 5 172.16.33.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto ACL will say:&lt;/P&gt;&lt;P&gt;access-list crypto-acl permit ip host 172.16.33.x &lt;REMOTE-LAN&gt; &lt;SUBNET&gt;&lt;/SUBNET&gt;&lt;/REMOTE-LAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jun 2012 05:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981873#M435465</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-02T05:27:30Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981874#M435466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you think of this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat-to-remote permit ip &lt;INTERNAL-LAN&gt; &lt;SUBNET&gt; &lt;REMOTE-LAN&gt; &lt;SUBNET&gt;&lt;/SUBNET&gt;&lt;/REMOTE-LAN&gt;&lt;/SUBNET&gt;&lt;/INTERNAL-LAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list nat-to-remote&lt;/P&gt;&lt;P&gt;global (outside) 5 172.16.33.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside [Public IP of Remote Network] 255.255.255.255 {Public IP of my ASA] 1&lt;/P&gt;&lt;P&gt;route outside 172.XX.XX.XX 255.255.255.0 [ASA Default Gateway] 1&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 match address encrypt-tran&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 set peer xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 set transform-set ch-strongcrypto map ch-vpn 60 ipsec-isakmp&lt;BR /&gt;crypto map ch-vpn 60 match address encrypt-tran&lt;BR /&gt;crypto map ch-vpn 60 set peer xx.xx.xx.xx&lt;BR /&gt;crypto map ch-vpn 60 set transform-set ch-strong&lt;/P&gt;&lt;P&gt;isakmp key ******** address xx.xx.xx.xx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it be easier to place this host in its own subnet (172.16.33.xx) in a vlan off the switch and point it to the ASA as the default gateway for the remote network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help on this Jennifer!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:22:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981874#M435466</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-05T02:22:44Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981875#M435467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You don't need to configure the following 2 routes as it would just route via your ASA default gateway:&lt;/P&gt;&lt;P&gt;route outside [Public IP of Remote Network] 255.255.255.255 {Public IP of my ASA] 1&lt;/P&gt;&lt;P&gt;route outside 172.XX.XX.XX 255.255.255.0 [ASA Default Gateway] 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's probably easier to configure those NAT statement on the ASA because even if you place it on its own VLAN, you still need to configure:&lt;/P&gt;&lt;P&gt;1) route on the ASA to point the 172.x.x.x network back off your ASA inside interface&lt;/P&gt;&lt;P&gt;2) NAT exemption on your ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While with the NAT statement advised earlier, those are all you need, no need to configure static route on the ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:28:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981875#M435467</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T02:28:48Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981876#M435468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; So all I need then is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat-to-remote permit ip &lt;INTERNAL-LAN&gt; &lt;SUBNET&gt; &lt;REMOTE-LAN&gt; &lt;SUBNET&gt;&lt;/SUBNET&gt;&lt;/REMOTE-LAN&gt;&lt;/SUBNET&gt;&lt;/INTERNAL-LAN&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list nat-to-remote&lt;/P&gt;&lt;P&gt;global (outside) 5 172.16.33.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list crypto-acl permit ip host 172.16.33.x &lt;REMOTE-LAN&gt; &lt;SUBNET&gt;&lt;/SUBNET&gt;&lt;/REMOTE-LAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 match address encrypt-tran&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 set peer xx.xx.xx.xx&lt;/P&gt;&lt;P&gt;crypto map ch-vpn 60 set transform-set ch-strongcrypto map ch-vpn 60 ipsec-isakmp&lt;BR /&gt;crypto map ch-vpn 60 match address encrypt-tran&lt;BR /&gt;crypto map ch-vpn 60 set peer xx.xx.xx.xx&lt;BR /&gt;crypto map ch-vpn 60 set transform-set ch-strong&lt;/P&gt;&lt;P&gt;isakmp key ******** address xx.xx.xx.xx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that look right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981876#M435468</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-05T02:37:06Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981877#M435469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yup, looks good to me, except the crypto key should be configured under tunnel-group:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEER-ADDRESS-XX.XX.XX.XX&gt; type ipsec-l2l&lt;/PEER-ADDRESS-XX.XX.XX.XX&gt;&lt;/P&gt;&lt;P&gt;tunnel-group &lt;PEER-ADDRESS-XX.XX.XX.XX&gt; ipsec-attribute&lt;/PEER-ADDRESS-XX.XX.XX.XX&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; pre-shared-key &lt;ACTUAL-KEY&gt;&lt;/ACTUAL-KEY&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW, you've copied the crypto map section twice &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981877#M435469</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T02:41:45Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981878#M435470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; LOL yup, getting late here and I am at a security con and had a few brews &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" height="16" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif" width="16"&gt;&lt;/SPAN&gt;&amp;nbsp; I will let you know my results when I get back to the office. Thanks again I REALLY appreciate it!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:44:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981878#M435470</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-05T02:44:58Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981879#M435471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No worries, have fun!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jun 2012 02:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981879#M435471</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-05T02:50:58Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981880#M435472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I finally got a chance to work on this. I have the tunnel up if traffic is sent from the remote network, however if I try to send traffic from my internal lan to the remote network over the VPN the tunnel does not come up. I did notice one thing, I added the nat (inside) 5 172.18.13.x and a sh xlate showed that 192.168.5.40 was patted to this address, but then the nat statement disappeared. It could have happened when I deleted one of the acl's and reentered it. So the tunnel works but I cannot send any traffic, something is blocking me. Below is the current config: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname xxxx&lt;BR /&gt;domain-name xxxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;enable password k4HlcGX2lC1ypFOm encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 12.xxx.xxx.xx 255.255.255.xxx &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 172.16.xxx.xxx 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.75.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EST -5&lt;BR /&gt;clock summer-time EDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name xxxxxxxxxxxxxxxxxxxxx&lt;BR /&gt;access-list outside_access_in remark Permit traffic from Internet to web server&lt;BR /&gt;access-list outside_access_in extended permit tcp any host 12.xxx.xxx.xx eq www &lt;BR /&gt;access-list outside_access_in extended permit udp any host 12.xxx.xxx.xx eq 5008 &lt;BR /&gt;access-list DMZtoInside extended permit tcp host 192.168.75.5 host 192.168.5.15 eq 1433 &lt;BR /&gt;access-list DMZtoInside extended permit tcp host 192.168.75.5 host 192.168.5.15 eq www &lt;BR /&gt;access-list DMZtoInside extended deny ip any 192.168.0.0 255.255.255.0 log &lt;BR /&gt;access-list DMZtoInside extended permit tcp host 192.168.75.5 host 192.168.5.14 eq 8080 &lt;BR /&gt;access-list crypto-acl extended permit ip host 172.18.13.xx host 198.xx.xxx.xxx&lt;BR /&gt;access-list nat-to-remote extended permit ip host 192.168.5.40 host 198.xx.xxx.xxx &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu DMZ 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 5 172.18.13.xx&lt;BR /&gt;global (DMZ) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (management) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (DMZ,outside) tcp 12.xxx.xxx.xx www 192.168.75.5 www netmask 255.255.255.255 &lt;BR /&gt;static (DMZ,outside) tcp 12.xxx.xxx.xx https 192.168.75.5 https netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) udp 12.xxx.xxx.xx 5008 172.16.32.xxx 5008 netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) 192.168.5.15 192.168.5.15 netmask 255.255.255.255 &lt;BR /&gt;static (inside,DMZ) 192.168.5.14 192.168.5.14 netmask 255.255.255.255 &lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group DMZtoInside in interface DMZ&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 12.xxx.xxx.xx 1&lt;BR /&gt;route inside 172.16.32.0 255.255.255.0 172.16.85.253 1&lt;BR /&gt;route inside 192.168.5.14 255.255.255.255 172.16.85.253 1&lt;BR /&gt;route inside 192.168.5.15 255.255.255.255 172.16.85.253 1&lt;BR /&gt;route outside 198.xx.xxx.0 255.255.255.0 12.xxx.xxx.xx 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 1 set peer 198.xx.xxx.xx &lt;BR /&gt;crypto map outside_map 1 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server management 192.168.1.3 ASA5510_6182012&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt;tunnel-group 198.xx.xxx.xx type ipsec-l2l&lt;BR /&gt;tunnel-group 198.xx.xxx.xx ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map &lt;BR /&gt;inspect ftp &lt;BR /&gt;inspect h323 h225 &lt;BR /&gt;inspect h323 ras &lt;BR /&gt;inspect rsh &lt;BR /&gt;inspect rtsp &lt;BR /&gt;inspect esmtp &lt;BR /&gt;inspect sqlnet &lt;BR /&gt;inspect skinny &lt;BR /&gt;inspect sunrpc &lt;BR /&gt;inspect xdmcp &lt;BR /&gt;inspect sip &lt;BR /&gt;inspect netbios &lt;BR /&gt;inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:768046cea800ceb4700b9641a70cc380&lt;BR /&gt;: end&lt;BR /&gt;asdm location 192.168.5.0 255.255.255.0 inside&lt;BR /&gt;asdm location 172.18.13.xx 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 02:02:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981880#M435472</guid>
      <dc:creator>ubergeek1</dc:creator>
      <dc:date>2012-06-30T02:02:12Z</dc:date>
    </item>
    <item>
      <title>Allow only one host access to VPN site to site tunnel</title>
      <link>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981881#M435473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to initiate the tunnel from both end, then you need to configure static policy NAT instead.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Base on your latest config, here is to be added:&lt;/P&gt;&lt;P&gt;no global (outside) 5 172.18.13.xx&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.13.xx access-list nat-to-remote&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 02:59:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-only-one-host-access-to-vpn-site-to-site-tunnel/m-p/1981881#M435473</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-06-30T02:59:23Z</dc:date>
    </item>
  </channel>
</rss>

