<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problems with VPN and NAT in ASA5520 8.3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat-in-asa5520-8-3/m-p/1554234#M602346</link>
    <description>&lt;P&gt;Hi there!,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure an ASA 5520 with 8.3 software and i have to configure a VPN IPSec site-to-site. Trying to capture the packets i see coming the ingress interface but not coming out. So the VPN is not coming up and NAT seems not to work.&lt;/P&gt;&lt;P&gt;This is the configuration i have (without IPs):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;interface GigabitEthernet0/0
 nameif outside
 security-level 0
 ip address x.x.x.122 255.255.255.248 

interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address y.y.y.y 255.255.255.0 
!
!
&lt;PRE&gt;object network NETWORK_OBJ_x.x.x.x
 subnet x.x.x.0 255.255.255.0
object network kpn1 
 host d.d.d.d
object network kpn2 
 host a.a.a.a
&lt;PRE&gt;object network Peer_KPN 
 host p.p.p.p
object-group network KPN
 description Lan remota KPN
 network-object object kpn1
 network-object object kpn2
object-group service DM_INLINE_UDP_1 udp
 port-object eq isakmp
 port-object eq secureid-udp
access-list outside_1_cryptomap extended permit ip object NETWORK_OBJ_x.x.x.x object-group KPN &lt;BR /&gt;access-list outside_access_in extended permit udp object Peer_KPN any object-group DM_INLINE_UDP_1 
access-list inside_access_in extended permit ip any any &lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;nat (inside,outside) source dynamic NETWORK_OBJ_x.x.x.x interface&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_x.x.x.x&amp;nbsp; destination static KPN &lt;BR /&gt;access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.121 1&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs 
crypto map outside_map 1 set peer p.p.p.p 
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;tunnel-group p.p.p.p&amp;nbsp; type ipsec-l2l
tunnel-group p.p.p.p ipsec-attributes
 pre-shared-key *****
&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I hope this will help.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks!!!!&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:46:56 GMT</pubDate>
    <dc:creator>nachete1979</dc:creator>
    <dc:date>2019-03-11T18:46:56Z</dc:date>
    <item>
      <title>Problems with VPN and NAT in ASA5520 8.3</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat-in-asa5520-8-3/m-p/1554234#M602346</link>
      <description>&lt;P&gt;Hi there!,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure an ASA 5520 with 8.3 software and i have to configure a VPN IPSec site-to-site. Trying to capture the packets i see coming the ingress interface but not coming out. So the VPN is not coming up and NAT seems not to work.&lt;/P&gt;&lt;P&gt;This is the configuration i have (without IPs):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;interface GigabitEthernet0/0
 nameif outside
 security-level 0
 ip address x.x.x.122 255.255.255.248 

interface GigabitEthernet0/1
 nameif inside
 security-level 100
 ip address y.y.y.y 255.255.255.0 
!
!
&lt;PRE&gt;object network NETWORK_OBJ_x.x.x.x
 subnet x.x.x.0 255.255.255.0
object network kpn1 
 host d.d.d.d
object network kpn2 
 host a.a.a.a
&lt;PRE&gt;object network Peer_KPN 
 host p.p.p.p
object-group network KPN
 description Lan remota KPN
 network-object object kpn1
 network-object object kpn2
object-group service DM_INLINE_UDP_1 udp
 port-object eq isakmp
 port-object eq secureid-udp
access-list outside_1_cryptomap extended permit ip object NETWORK_OBJ_x.x.x.x object-group KPN &lt;BR /&gt;access-list outside_access_in extended permit udp object Peer_KPN any object-group DM_INLINE_UDP_1 
access-list inside_access_in extended permit ip any any &lt;/PRE&gt;
&lt;/PRE&gt;
&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;nat (inside,outside) source dynamic NETWORK_OBJ_x.x.x.x interface&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_x.x.x.x&amp;nbsp; destination static KPN &lt;BR /&gt;access-group outside_access_in in interface outside
access-group inside_access_in in interface inside
route outside 0.0.0.0 0.0.0.0 x.x.x.121 1&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac 
crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac 
crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac 
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac 
crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac 
crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac 
crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac 
crypto ipsec security-association lifetime seconds 28800
crypto ipsec security-association lifetime kilobytes 4608000
crypto map outside_map 1 match address outside_1_cryptomap
crypto map outside_map 1 set pfs 
crypto map outside_map 1 set peer p.p.p.p 
crypto map outside_map 1 set transform-set ESP-3DES-SHA
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;PRE&gt;tunnel-group p.p.p.p&amp;nbsp; type ipsec-l2l
tunnel-group p.p.p.p ipsec-attributes
 pre-shared-key *****
&lt;/PRE&gt;&lt;/P&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;I hope this will help.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks!!!!&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat-in-asa5520-8-3/m-p/1554234#M602346</guid>
      <dc:creator>nachete1979</dc:creator>
      <dc:date>2019-03-11T18:46:56Z</dc:date>
    </item>
    <item>
      <title>Re: Problems with VPN and NAT in ASA5520 8.3</title>
      <link>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat-in-asa5520-8-3/m-p/1554235#M602349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The following static NAT should be changed:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;From&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;nat (inside,outside) source static NETWORK_OBJ_x.x.x.x&amp;nbsp; destination static KPN&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;To&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_x.x.x.x NETWORK_OBJ_x.x.x.x destination static KPN KPN &lt;/SPAN&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then a "clear xlate" after the changes above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that you are trying to trigger tra&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;ffic from x.x.x.0/24 network towards either d.d.d.d or a.a.a.a&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Sep 2010 02:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problems-with-vpn-and-nat-in-asa5520-8-3/m-p/1554235#M602349</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-09-29T02:07:51Z</dc:date>
    </item>
  </channel>
</rss>

