<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASDM/SSH access through IPsec with NAT? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949468#M5133</link>
    <description>&lt;P&gt;I think what you trying to&amp;nbsp;achieve is not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ideally, you could connect to your ASA2 in tunnel between ASA1 and ASA2. from ASA1 connected as anyconnect client, prior to this you need to define a standard access list giving your ASA2 ip address. also other point you have a site-to-site vpn between two boxes and you applied an identity nat on both boxes. you can not distinguish by saying if the destin 192.168.254.254 use public ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want to access the ASA2 from public ip addresses you can create ssh version 2 and define the public ip addresses you want the ASA2 to answer them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh 8.8.8.8 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin password cisco priv 15&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Oct 2019 20:52:44 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-10-28T20:52:44Z</dc:date>
    <item>
      <title>ASDM/SSH access through IPsec with NAT?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949051#M5129</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I think i have a simple question but can't find a solution for it yet.&lt;BR /&gt;Consider the following topology:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VuyYsVz" style="width: 863px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/48121i78287B79DBD89603/image-size/large?v=v2&amp;amp;px=999" role="button" title="VuyYsVz" alt="VuyYsVz" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We have a IPsec tunnel between ASA1 and ASA2. The traffic through the tunnel is the AnyConnect Subnet (192.168.10.0/24) and the LAN behind ASA2 (192.168.254.0/24).&lt;/P&gt;&lt;P&gt;Now i want to manage ASA2&amp;nbsp;&lt;U&gt;&lt;STRONG&gt;only&lt;/STRONG&gt;&lt;/U&gt; through the VPN tunnel. So i tried making a static NAT entry on ASA2, but when i run packet-tracer it's getting dropped with:&amp;nbsp;&lt;EM&gt;No valid adjacency&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the NAT entry i tried on ASA2:&lt;/P&gt;&lt;PRE&gt;nat (OUTSIDE,OUTSIDE) source static AnyConnect_Subnet AnyConnect_Subnet destination static ASA_NAT_IP ASA_WAN_IP unidirectional no-proxy-arp&lt;/PRE&gt;&lt;P&gt;So, what i wanted to do was sending the traffic from AnyConnect from ASA1 through the tunnel like it was destined for the 192.168.254.0/24 subnet behind ASA2. But on ASA2, if the destination was 192.168.254.254 it would be NAT'ed to the Public IP on ASA2 so i could manage it with ASDM/SSH. This is not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What would be the best practice for this? In this case it's a Firewall in Azure, and i need to disable public ASDM/SSH access while still being able to manage it from our own AnyConnect entry.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:38:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949051#M5129</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2020-02-21T17:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM/SSH access through IPsec with NAT?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949468#M5133</link>
      <description>&lt;P&gt;I think what you trying to&amp;nbsp;achieve is not possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ideally, you could connect to your ASA2 in tunnel between ASA1 and ASA2. from ASA1 connected as anyconnect client, prior to this you need to define a standard access list giving your ASA2 ip address. also other point you have a site-to-site vpn between two boxes and you applied an identity nat on both boxes. you can not distinguish by saying if the destin 192.168.254.254 use public ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you want to access the ASA2 from public ip addresses you can create ssh version 2 and define the public ip addresses you want the ASA2 to answer them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;ssh 8.8.8.8 255.255.255.255 outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;username admin password cisco priv 15&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2019 20:52:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949468#M5133</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-10-28T20:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASDM/SSH access through IPsec with NAT?</title>
      <link>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949630#M5135</link>
      <description>&lt;P&gt;Hi Sheraz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I couldn't get it to work to manage it on the outside interface only through the VPN tunnel. I did get it working with the same NAT rule but on one of the inside interfaces with "management-access &amp;lt;INSIDE_INTERFACE&amp;gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2019 06:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-ssh-access-through-ipsec-with-nat/m-p/3949630#M5135</guid>
      <dc:creator>Eric Snijders</dc:creator>
      <dc:date>2019-10-29T06:11:58Z</dc:date>
    </item>
  </channel>
</rss>

