<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASDM through IPsec-Tunnel with Nat? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855396#M490377</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check you are not double natting it, so once you have performed the desintation nat - the resulting new IP must be part of the no-nat before it is encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 22 Dec 2011 09:41:27 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2011-12-22T09:41:27Z</dc:date>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855393#M490374</link>
      <description>&lt;P&gt;Hello together, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;perhaps somebody had the same problem and found a way to solve it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We access our customer-networks over IPsec-Tunnel with D-Nat:&lt;/P&gt;&lt;P&gt;Our Site is hidden behind a single Address (Service-Pat), the remote sites are accessed over /27 networks, &lt;/P&gt;&lt;P&gt;which host-addresses (D-Nat1, ...) are translated to the servers (Server1,...) we need to access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Nat on customer ASA (8.3):&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;&lt;STRONG&gt;&lt;EM&gt;nat (any,any) source static Service-Pat Service-PAT destination static D-NAT1 Server1 unidirectional&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, i can´t access the ASA on the customer site using this NAT.&lt;/P&gt;&lt;P&gt;Regardless on which address the NAT is used (ASA Inteface-Adresses, Loopback) it´s not possible to use CLI or ASDM. &lt;/P&gt;&lt;P&gt;The Log show´s only the normal NAT-Translation like when i access one of the Servers behind the ASA, no error - but the Session is refused. &lt;/P&gt;&lt;P&gt;It´s only possible to access the firewall from an inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to access to ASDM/CLI using the destination nat?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:05:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855393#M490374</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2019-03-11T22:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855394#M490375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The remote end needs "management access inside" configured, if you want to access from over the VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 07:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855394#M490375</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-22T07:41:18Z</dc:date>
    </item>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855395#M490376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your answer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "management-access inside" statement is used.&lt;/P&gt;&lt;P&gt;Perhaps the statement only works without nat? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 08:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855395#M490376</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2011-12-22T08:46:51Z</dc:date>
    </item>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855396#M490377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check you are not double natting it, so once you have performed the desintation nat - the resulting new IP must be part of the no-nat before it is encrypted.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 09:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855396#M490377</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-22T09:41:27Z</dc:date>
    </item>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855397#M490378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´m not sure what you mean. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are no AccessList that could block the traffic. Log shows only the Tearup/Teardown. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Service-PAT:&amp;nbsp;&amp;nbsp; 192.168.255.1/32&lt;/P&gt;&lt;P&gt;Transit-Net :&amp;nbsp;&amp;nbsp; 10.0.5.0/27&lt;/P&gt;&lt;P&gt;D-NAT2&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&amp;nbsp;&amp;nbsp; 10.0.5.2/32&lt;/P&gt;&lt;P&gt;ASA-Local :&amp;nbsp;&amp;nbsp; 172.16.128.71/24 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip object Transit-Net object Service-PAT &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip object Service-PAT any &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list outside_1_cryptomap extended permit ip object Service-PAT interface inside &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (any,any) source static Service-PAT Service-Pat destination static D-NAT2 ASA-Local unidirectional&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;management-access inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ssh 192.168.255.1 255.255.255.255 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;telnet 192.168.255.1 255.255.255.255 inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides the destination nat, there is only the default Pat to the outside&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (any,outside) source dynamic any interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the NAT is done, the Asa should only see a packet from 192.168.255.1 to its local interface. &lt;/P&gt;&lt;P&gt;ACL and management rules doesnt deny this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please explain your comment about the double natting and no-nat? &lt;/P&gt;&lt;P&gt;Is there a mistake in the NAT statements?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 10:38:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855397#M490378</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2011-12-22T10:38:39Z</dc:date>
    </item>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855398#M490379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the remote end is say 1.1.1.1 but I need to nat that to 2.2.2.2 and use that to connect to, then it gets encrypted, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I need to nat 1.1.1.1 to 2.2.2.2&lt;/P&gt;&lt;P&gt;2) I need to define the interesting VPN traffic destination as 2.2.2.2&lt;/P&gt;&lt;P&gt;3) as I have general NAT in place, and the VPN endpoint is out the outside interface, I need to make sure that I do not nat it again, before it leaves the interface for encryption so "access-list no-nat permit x.x.x.x x.x.x.x host 2.2.2.2"&lt;/P&gt;&lt;P&gt;4) 2.2.2.2 as a desitnation must no &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememer the flow is NAT&amp;gt;Route&amp;gt;Encrypt.&amp;nbsp; Use your favorite search engine and look for "identity nat" and "double nat"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 10:51:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855398#M490379</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2011-12-22T10:51:56Z</dc:date>
    </item>
    <item>
      <title>ASDM through IPsec-Tunnel with Nat?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855399#M490380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I´m sure the Nat is ok. It works fine when the sessions are build up through the ASA, the connection&amp;nbsp; into the ASA doesn´t work with any tested nat statement.&lt;/P&gt;&lt;P&gt;I was wrong when i said that the log only show´s the normal NAT Sessions - the Teardown shows allways "flow terminated by tcp intercept" &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Dec 2011 07:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-through-ipsec-tunnel-with-nat/m-p/1855399#M490380</guid>
      <dc:creator>frederic_hohn</dc:creator>
      <dc:date>2011-12-23T07:34:19Z</dc:date>
    </item>
  </channel>
</rss>

