<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TO nat public ip in vpn in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935230#M458595</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not&amp;nbsp; to public IP. Nat it to some private Ip range which is not used in your network or remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need nonat statement as you are natting the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Mar 2012 06:26:39 GMT</pubDate>
    <dc:creator>V S Narayana Chivukula</dc:creator>
    <dc:date>2012-03-02T06:26:39Z</dc:date>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935227#M458592</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to set up site to site tunnel as my&amp;nbsp; lan range is geeting conflict with far end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we usually do nonat while configuring vpn.Now i need to nat the lan &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assume my lan ip -10.10.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public ip -----202.x.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can anyone send me the docuemts&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935227#M458592</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2019-03-11T22:37:26Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935228#M458593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prashant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should nat your lan subnet to a unused IP range and then use that natted IP range in the crypto access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example :&amp;nbsp; If your lan is 10.10.10.0/24 and the remote subnet 20.20.20.0/24. 20.20.20.0/24 is again natted ip of the remote overlapping subnet (10.10.10.0/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat to a unsed subnet say 11.11.11.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 11.11.11.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;use the natted subnet in the crypto-accesslist&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list crypto-acl extended permit ip 11.11.11.0 255.255.255.0 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do the same at remote end as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this is helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 04:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935228#M458593</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-03-02T04:13:20Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935229#M458594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So i need to nat my lan with public ip and&amp;nbsp; used that public ip in interseting traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so what the nonat statement&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 06:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935229#M458594</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-02T06:12:01Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935230#M458595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not&amp;nbsp; to public IP. Nat it to some private Ip range which is not used in your network or remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need nonat statement as you are natting the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 06:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935230#M458595</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-03-02T06:26:39Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935231#M458596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Narayana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The think is all the private ip are geeting conflict so i need to nat with public ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 06:32:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935231#M458596</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-02T06:32:58Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935232#M458597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prashant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then try natting to some public IP range and use that in the crypto access-list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 06:40:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935232#M458597</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-03-02T06:40:00Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935233#M458598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the interseting traffic which we have configured with nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.x.x.x 255.255.255.128 10.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.x.x.x 255.255.255.128 192.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.x.x.x 255.255.255.128 192.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.x.x.x 255.255.255.128 10.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now due to some conflict i am natting my lan range with public ip as below and i will remove nonat statement does this config works&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 202.x.x.x 172.x.x.x netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.x.x.x 255.255.255.128 10.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 172.x.x.x 255.255.255.128 192.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp; outside_3_cryptomap in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 08:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935233#M458598</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-02T08:50:51Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935234#M458599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prashant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Please configure nat as below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat extended permit ip 172.x.x.x 255.255.255.128 192.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat extended permit ip 172.x.x.x 255.255.255.128 10.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 202.x.x.x access-list nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto map access-list should contain the natted IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 202.x.x.x 255.255.255.128 10.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_3_cryptomap extended permit ip 202.x.x.x 255.255.255.128 192.x.x.0 255.255.192.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto access-list is only to identify the traffic to be tunnelled through VPN and so you need not apply it on outside interface. So you do not need the following line :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp; outside_3_cryptomap in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And you should apply it in the crypto map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map &lt;NAME of="" the="" map=""&gt; &lt;NUMBER&gt; match address outside_3_cryptomap&lt;/NUMBER&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 15:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935234#M458599</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-03-02T15:27:02Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935235#M458600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 05:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935235#M458600</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-03T05:42:47Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935236#M458601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Narayana,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is access-group nat in interface outside is required or not ? Can u explain me&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Mar 2012 08:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935236#M458601</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-03T08:07:50Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935237#M458602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Prashant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not require access-group command in this VPN setup. Access-group command is used to apply access-list on an interface. And access-lists are for traffic that goes through the device. In VPN, as the traffic gets tunnelled, you do not need that statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So access-group nat command is not required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Narayana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 01:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935237#M458602</guid>
      <dc:creator>V S Narayana Chivukula</dc:creator>
      <dc:date>2012-03-05T01:49:35Z</dc:date>
    </item>
    <item>
      <title>TO nat public ip in vpn</title>
      <link>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935238#M458603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 04:44:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/to-nat-public-ip-in-vpn/m-p/1935238#M458603</guid>
      <dc:creator>prashantrecon</dc:creator>
      <dc:date>2012-03-05T04:44:37Z</dc:date>
    </item>
  </channel>
</rss>

