<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Setting up NAT on VPN Tunnel in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754949#M530580</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN tunnel is passing traffic successfully already, so I believe that crypto map ACL is correctly set up. However it is just not natting the source address properly. The other side is seeing my address of 10.10.1.x instead of 192.168.42.1. is the ACL as listed above set up incorrectly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 17 Sep 2011 14:58:09 GMT</pubDate>
    <dc:creator>russgunther</dc:creator>
    <dc:date>2011-09-17T14:58:09Z</dc:date>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754945#M530576</link>
      <description>&lt;P&gt;I have an ASA 5505 with a tunnel to a third party network. The tunnel connection comes up fine but I can't get the NAT to work. They are requiring that I send them a specific IP address as the source IP. Here are the specifics:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Network: 10.10.1.0/24&lt;/P&gt;&lt;P&gt;Destination Hosts: 172.16.1.171 and 172.16.1.172&lt;/P&gt;&lt;P&gt;NAT IP: 192.168.42.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I disable NAT I can get through the tunnel but the admin sees me coming through as 10.10.1.x If I enable NAT I can't hit the tunnel at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DM_INLINE_NETWORK_1&lt;/P&gt;&lt;P&gt; network-object host 172.16.1.171&lt;/P&gt;&lt;P&gt; network-object host 172.16.1.172&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip 10.10.1.0 255.255.255.0 172.16.1.168 255.255.255.248 log debugging &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any &lt;/P&gt;&lt;P&gt;access-list split-tunnel standard permit 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_nat_static_1 extended permit ip host 172.168.1.172 host 192.168.42.1 &lt;/P&gt;&lt;P&gt;access-list outside_nat_static_1 extended permit ip host 172.168.1.171 host 192.168.42.1 &lt;/P&gt;&lt;P&gt;access-list inside_nat_static extended permit ip 10.10.1.0 255.255.255.0 172.168.1.168 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 10.10.1.0 255.255.255.0 172.16.1.168 255.255.255.248 &lt;/P&gt;&lt;P&gt;access-list inside_nat_static_1 extended permit ip 10.10.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 3 192.168.42.1&lt;/P&gt;&lt;P&gt;nat (inside) 3 access-list inside_nat_static_1&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I just missing something?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754945#M530576</guid>
      <dc:creator>russgunther</dc:creator>
      <dc:date>2019-03-11T21:26:08Z</dc:date>
    </item>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754946#M530577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Russ Gunther,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand the interesting traffic is going to be between 10.10.1.0&amp;nbsp; going to 172.16.1.171 and 172.16.1.172&lt;/P&gt;&lt;P&gt;Would you mind to try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.42.1 access-list inside_nat_static_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this and let me know if it helps you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Sep 2011 22:38:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754946#M530577</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-16T22:38:28Z</dc:date>
    </item>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754947#M530578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P id="yui_3_2_0_27_131604165491348" style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"&gt;Hi Julio,&lt;/P&gt;&lt;P id="yui_3_2_0_27_131604165491348" style="font-family: arial, helvetica, sans-serif; font-size: 12pt;"&gt;&lt;BR id="yui_3_2_0_27_1316041654913138" /&gt;&lt;/P&gt;&lt;P id="yui_3_2_0_27_131604165491348"&gt;&lt;SPAN style="font-size: 12pt;"&gt;I cannot apply that command. I receive a "&lt;/SPAN&gt;global address overlaps with mask error".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Russ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 13:39:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754947#M530578</guid>
      <dc:creator>russgunther</dc:creator>
      <dc:date>2011-09-17T13:39:44Z</dc:date>
    </item>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754948#M530579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just change the crypto map ACL to specify interesting traffic coming from natted address. But they'll have to do the same mirrored ACL on the other side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 14:19:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754948#M530579</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-17T14:19:13Z</dc:date>
    </item>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754949#M530580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN tunnel is passing traffic successfully already, so I believe that crypto map ACL is correctly set up. However it is just not natting the source address properly. The other side is seeing my address of 10.10.1.x instead of 192.168.42.1. is the ACL as listed above set up incorrectly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 14:58:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754949#M530580</guid>
      <dc:creator>russgunther</dc:creator>
      <dc:date>2011-09-17T14:58:09Z</dc:date>
    </item>
    <item>
      <title>Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754950#M530581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you want to NAT when doing a VPN tunnel then you must make the natted traffic the interesting traffic that will bring up the tunnel and get transported over it.So in your crypto ACL you must specify src IP as the natted one not the original one.That's the way I think it should be done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 18:11:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754950#M530581</guid>
      <dc:creator>cadet alain</dc:creator>
      <dc:date>2011-09-17T18:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754951#M530582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again Russ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at this VPN configuration example, this is going to show you what to do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is exactly what you got to do.&lt;/P&gt;&lt;P&gt;As you can see on this document they want to nat the inside source when it goes to the VPN Tunnel, so it is the same scenario.&lt;/P&gt;&lt;P&gt;I thinked you did not remove the previous commands, that is why the command I sent you was not allowed by the ASA CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have any questions regarding this document, I will be more than glad to help you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Sep 2011 22:20:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754951#M530582</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-17T22:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754952#M530583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct. I had conflicting commands. I removed all the entries relating to this tunnel from my config and started fresh with the link you provided and everything came up perfectly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your help and support.&lt;/P&gt;&lt;P&gt;Russ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2011 13:42:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754952#M530583</guid>
      <dc:creator>russgunther</dc:creator>
      <dc:date>2011-09-19T13:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Setting up NAT on VPN Tunnel</title>
      <link>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754953#M530584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Russ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad that everything is working fine now. If you have any other question related to this issue please let me know otherwise please mark the question as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a great day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Sep 2011 16:45:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/setting-up-nat-on-vpn-tunnel/m-p/1754953#M530584</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-19T16:45:23Z</dc:date>
    </item>
  </channel>
</rss>

