<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Several VPN tunnels in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584816#M604848</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806a5cea.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806a5cea.shtml&lt;/A&gt; - I found this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration looks OK, expect I need to do NAT for traffic which is going to DMZ. Right now my setup does not do NAT for DMZ traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Dec 2010 14:46:11 GMT</pubDate>
    <dc:creator>tarmo</dc:creator>
    <dc:date>2010-12-16T14:46:11Z</dc:date>
    <item>
      <title>Site to site VPN tunnel, remote site access to networks behind DMZ interface</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584813#M604845</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to seach, but I did not find correct solution to my problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have&lt;/P&gt;&lt;P&gt;Cisco ASA SEC PLUS running in Main office A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside interface- default ISP Internet&lt;/P&gt;&lt;P&gt;Inside interface - default local lan. 192.168.1.0/24&lt;/P&gt;&lt;P&gt;DMZ interface - other external network, using static routes. Working in the main office from the Inside network. If inside network is accessing to it then I do NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I have other office (smaller) lets call it office B&lt;/P&gt;&lt;P&gt;Outside interface (ISP Internet)&lt;/P&gt;&lt;P&gt;inside interface local lan 192.168.31.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have created VPN site to site tunnel between A-B office working fine (all services are online). Now I need to give office B inside computers access to Office A networks behind DMZ interface. Traffic is allowed in the VPN tunnels.&lt;/P&gt;&lt;P&gt;I can see from Cisco that Office B network 192.168.31.0/24 is trying to get to DMZ interface, but error is no translation group outside:192.168.31.5 DMZ:......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must NAT that 192.168.31.0/24 network before it will access to the DMZ interface, but I do not understand what I miss.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: tarmo&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:22:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584813#M604845</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2019-03-11T19:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584814#M604846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Without seeing your configuration, it's hard to tell why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general, in VPN setup, we use "nat 0" to exclude the vpn traffic from NAT.&lt;/P&gt;&lt;P&gt;If you can access inside network in office A from office B, do you have something like "nat (inside) 0 access-list xxxx" in your configuration.&lt;/P&gt;&lt;P&gt;If yes, you need the same for dmz, "nat (dmz) 0 access-list yyyyy"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Dec 2010 20:44:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584814#M604846</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2010-12-15T20:44:46Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584815#M604847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Changed as you told me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error is same&lt;/P&gt;&lt;P&gt;3 Dec 16 2010 16:06:21 305005 x.x.x. 80&amp;nbsp;&amp;nbsp; No translation group found for tcp src outside:192.168.31.4/55320 dst dmz:x.x.x.x/80&lt;/P&gt;&lt;P&gt;x.x.x.x = one computer inside the DMZ network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (dmz) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 0 access-list inside_nat0_outbound / added this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.31.0255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tarmo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 14:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584815#M604847</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2010-12-16T14:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584816#M604848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806a5cea.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806a5cea.shtml&lt;/A&gt; - I found this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration looks OK, expect I need to do NAT for traffic which is going to DMZ. Right now my setup does not do NAT for DMZ traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 14:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584816#M604848</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2010-12-16T14:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584817#M604849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (dmz) 0 access-list inside_nat0_outbound / added this.&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 192.168.31.0255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is not correct. You should use a different ACL for DMZ.&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list DMZ_nat0_outbound / added this.&lt;/P&gt;&lt;P&gt;access-list DMZ_nat0_outbound extended permit ip &lt;DMZ_IP&gt; 255.255.255.0 192.168.31.0255.255.255.0&lt;/DMZ_IP&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Dec 2010 16:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584817#M604849</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2010-12-16T16:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584818#M604850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried that, does not help.&lt;/P&gt;&lt;P&gt;At least I am not getting that error, but from network 192.168.31.0 I do not have still access to networks behind the DMZ.&lt;/P&gt;&lt;P&gt;192.168.1.0 inside network can access networks behind the DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 06:30:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584818#M604850</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2010-12-17T06:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584819#M604851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you please provide the following info&lt;/P&gt;&lt;P&gt;1. config&lt;/P&gt;&lt;P&gt;2. bring up the tunnel and check if encrypt/decrypted count incrementing in "show cry ipsec sa" when issuing a ping between remote and dmz hosts.&lt;/P&gt;&lt;P&gt;3. the log when you do the step 2.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Dec 2010 18:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584819#M604851</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2010-12-17T18:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584820#M604852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Result of the command: "sh run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname firewall&lt;BR /&gt;domain-name bt.int&lt;BR /&gt;enable password ******** encrypted&lt;BR /&gt;passwd *************** encrypted&lt;BR /&gt;names&lt;BR /&gt;name 195.222.6.126 A-GW-FIN description A-GW-FIN&lt;BR /&gt;name 192.168.33.0 TARTU-LAN description TARTU LAN&lt;BR /&gt;name 192.168.31.0 TTY-LOCAL-LAN description TTY-LAN / from there I need right now access to DMZ network&lt;BR /&gt;name 192.49.X.140 A-192.49.x.140 description A&lt;/P&gt;&lt;P&gt;name 192.168.32.0 RIIA-LOCAL-LAN description RIIA-LOCAL-LAN&lt;BR /&gt;name 192.168.1.9 LORD description LORD&lt;BR /&gt;name 172.16.x.10 NG&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;description MAIN ISP&lt;/P&gt;&lt;P&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 62.65.X.162 255.255.255.240 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan5&lt;BR /&gt;description ISP NR 1 // network 192.168.1.0/24 has access there, but network 192.168.31.0/24 needs also access and later some more&lt;/P&gt;&lt;P&gt;nameif dmz&lt;BR /&gt;security-level 25 &lt;BR /&gt;ip address 195.222.X.110 255.255.255.192 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone EET 2&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name zbt.int&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;port-object eq imap4&lt;BR /&gt;port-object eq pop3&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt;service-object icmp &lt;BR /&gt;service-object tcp eq 10000 &lt;BR /&gt;service-object tcp eq imap4 &lt;BR /&gt;service-object tcp eq smtp &lt;BR /&gt;service-object tcp eq ssh &lt;BR /&gt;service-object icmp echo&lt;BR /&gt;service-object icmp echo-reply&lt;BR /&gt;service-object icmp time-exceeded&lt;BR /&gt;service-object icmp traceroute&lt;BR /&gt;object-group service DM_INLINE_SERVICE_2&lt;BR /&gt;service-object tcp eq pptp &lt;BR /&gt;service-object udp eq isakmp &lt;BR /&gt;service-object gre &lt;BR /&gt;service-object icmp &lt;BR /&gt;object-group network TLL-LINX-VPN-LANS&lt;BR /&gt;description to ISP NR 2 networks over VPN&lt;/P&gt;&lt;P&gt;network-object 192.168.1.0 255.255.255.0&lt;BR /&gt;network-object host A-192.49.229.140&lt;BR /&gt;object-group service DM_INLINE_SERVICE_3&lt;BR /&gt;service-object icmp &lt;BR /&gt;service-object tcp eq 10000 &lt;BR /&gt;service-object tcp eq smtp &lt;BR /&gt;service-object tcp eq ssh &lt;BR /&gt;object-group icmp-type DM_INLINE_ICMP_1&lt;BR /&gt;icmp-object echo-reply&lt;BR /&gt;icmp-object time-exceeded&lt;BR /&gt;icmp-object traceroute&lt;BR /&gt;icmp-object echo&lt;BR /&gt;access-list INTERNET_access_in extended permit tcp any any eq 3389 &lt;BR /&gt;access-list INTERNET_access_in extended permit object-group DM_INLINE_SERVICE_2 any host 62.65.33.165 &lt;BR /&gt;access-list INTERNET_access_in extended permit tcp any any eq 6666 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.1.0 255.255.255.0 TTY-LOCAL-LAN 255.255.255.0 &lt;BR /&gt;access-list outside_2_cryptomap extended permit ip object-group TLL-LINX-VPN-LANS TTY-LOCAL-LAN 255.255.255.0 &lt;BR /&gt;access-list AMADEUS extended permit ip 195.222.x.64 255.255.255.192 TTY-LOCAL-LAN 255.255.255.0 &lt;BR /&gt;access-list dmz_access_in extended permit ip any TTY-LOCAL-LAN 255.255.255.0 &lt;BR /&gt;access-list dmz_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_nat0_outbound extended permit ip TTY-LOCAL-LAN 255.255.255.0 host A-192.49.229.140 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging list vpn level debugging class ip&lt;BR /&gt;logging list vpn level debugging class vpn&lt;BR /&gt;logging list vpn level debugging class vpnfo&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu dmz 1500&lt;BR /&gt;ip verify reverse-path interface outside&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any dmz&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (outside) 2 62.65.x.164 netmask 255.255.255.255&lt;BR /&gt;global (outside) 3 62.65.x.163 netmask 255.255.255.255&lt;BR /&gt;global (outside) 4 62.65.x.165 netmask 255.255.255.255&lt;BR /&gt;global (dmz) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 3 192.168.1.245 255.255.255.255&lt;BR /&gt;nat (inside) 2 192.168.1.244 255.255.255.255&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.1.8 3389 netmask 255.255.255.255 &lt;BR /&gt;access-group INTERNET_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;!&lt;BR /&gt;route-map SPAM-LATTI permit 10&lt;BR /&gt;match ip address 100&lt;BR /&gt;!&lt;BR /&gt;route-map LATI-VPN permit 10&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 62.65.33.161 1&lt;BR /&gt;route dmz 82.150.x.135 255.255.255.255 A-GW-FIN 1 / A-GW-FIN located behind the DMZ interface&lt;BR /&gt;route dmz 82.150.x.10 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 84.50.x.196 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 157.200.x.148 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz A-192.49.x.140 255.255.255.255 A-GW-FIN 1 / this is the most important from other offices.&lt;BR /&gt;route dmz 194.145.x.59 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 194.145.x.62 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 194.145.x.73 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 194.145.x.71 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 194.204.x.0 255.255.255.0 A-GW-FIN 1&lt;BR /&gt;route dmz 195.27.x.31 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 212.47.x.57 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;route dmz 212.47.x.58 255.255.255.255 A-GW-FIN 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;snmp-server host inside 192.168.1.8 community public version 2c&lt;BR /&gt;snmp-server location Serverroom, 7 th&lt;BR /&gt;snmp-server contact &lt;BR /&gt;snmp-server community *****&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;snmp-server enable traps ipsec start stop&lt;BR /&gt;snmp-server enable traps remote-access session-threshold-exceeded&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map outside_map 2 match address outside_2_cryptomap&lt;BR /&gt;crypto map outside_map 2 set peer 80.235.x.106 &lt;BR /&gt;crypto map outside_map 2 set transform-set ESP-3DES-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.12-192.168.1.150 inside&lt;BR /&gt;dhcpd dns 192.168.1.8 192.168.1.10 interface inside&lt;BR /&gt;dhcpd domain bt.int interface inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics port&lt;BR /&gt;threat-detection statistics protocol&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics host number-of-rate 2&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;tunnel-group 80.235.x.106 type ipsec-l2l&lt;BR /&gt;tunnel-group 80.235.x.106 ipsec-attributes&lt;BR /&gt;pre-shared-key *&lt;BR /&gt;!&lt;BR /&gt;class-map global-class&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;class-map outside-class&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect http BT&lt;BR /&gt;parameters&lt;BR /&gt;&amp;nbsp; protocol-violation action log&lt;BR /&gt;policy-map outside-policy&lt;BR /&gt;class outside-class&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;policy-map global-policy&lt;BR /&gt;class global-class&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;&amp;nbsp; inspect ipsec-pass-thru &lt;BR /&gt;&amp;nbsp; inspect http BT &lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect pptp &lt;BR /&gt;!&lt;BR /&gt;service-policy global-policy global&lt;BR /&gt;service-policy outside-policy interface outside&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:xxxxxxxxxxxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A: I need that traffic from the network 192.168.31.0/24 will access to Main office when they are asking host 192.49.x.140 255.255.255.255&amp;nbsp; - currently that traffic is going to the ASA as it should over VPN tunnel.&lt;/P&gt;&lt;P&gt;B: in ASA that traffic should go to DMZ interface (NAT must be active), but right now it does not work. Network 192.168.1.0/24 can access to DMZ interface (networks behind it).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jan 2011 14:50:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584820#M604852</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2011-01-04T14:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584821#M604853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still having issues&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have manged to fix error "no translation group found", but still remote site does not get access to sites behind the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 dns&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list dmz_nat0_outbound_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound_2 extended permit ip host 192.49.x.140 any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound_2 extended permit ip 195.222.x.64 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host is behind the dmz interface and network is the DMZ network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think I am missing very small thing, but I dot not understand what it is. Something with NAT, as inside network can access networks behind the DMZ, but remote offices cannot access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think problem is not with NAT anymore but with VPN traffic. As other side is using Juniper firewall, then I think issue is between Cisco ASA and Juniper.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jan 2011 16:07:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584821#M604853</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2011-01-09T16:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584822#M604855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you initiate the traffic between 192.168.31.x (Site B) and 195.222.x.64 such as ping to bring up the tunnel and then capture "show crypto ipsec sa" multiple times when issuing the ping? We need check encry/decry count to see which one is not incrementing to know in which direction there is an issue. Also please provide "show logging" output when you do the above ping testing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jan 2011 06:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584822#M604855</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-01-10T06:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584823#M604858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;That ping is other issue.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I cannot ping DMZ interface (from inside network too), but I can ping host behind the DMZ interface. I can ping outside interface and inside (also traceroute is working) but DMZ I cannot ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made more testes. Looks like i need destination nat or something. I removed NAT 0 command from the DMZ interface, because all traffic must be NAT'd. Inside is working correctly, I just need to tell ASA in the main office to do NAT for other networks too when they are access to DMZ.&lt;/P&gt;&lt;P&gt;No I am getting again no translation group found, which is OK because I have issue somewhere in NAT rules. Somekind on static NAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from the remote office&lt;/P&gt;&lt;P&gt;3 Jan 11 2011 16:40:33 305005 A-GW-FIN&amp;nbsp;&amp;nbsp;&amp;nbsp; No translation group found for icmp src outside:192.168.31.4 dst dmz:A-GW-FIN (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A-GW-FIn = behind the DMZ interface .126. I can ping that from inside. I added picture too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2011 15:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584823#M604858</guid>
      <dc:creator>tarmo</dc:creator>
      <dc:date>2011-01-11T15:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Several VPN tunnels</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584824#M604860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I asked you to add NAT 0 rule for DMZ like following in my previous post.&lt;/P&gt;&lt;P&gt;access-list DMZ_nat0_outbound extended permit ip &lt;DMZ_IP&gt; 255.255.255.0 192.168.31.0255.255.255.0&lt;/DMZ_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you added it as following,&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound_2 extended permit ip host 192.49.x.140 any&lt;/P&gt;&lt;P&gt;access-list dmz_nat0_outbound_2 extended permit ip 195.222.x.64 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using "any", all traffic to the above DMZ IP will bypass the NAT. Please replace any with site B network 192.168.31.x so that only VPN traffic to DMZ will bypass NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can not ping DMZ interface IP from inside, that's normal behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you make the above change, initiate a ping from site B to the host in DMZ to bring up the VPN tunnel. And then check "sh crypto ipsec sa" to see if decry/encry count is incrementing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jan 2011 16:13:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-tunnel-remote-site-access-to-networks-behind/m-p/1584824#M604860</guid>
      <dc:creator>Yudong Wu</dc:creator>
      <dc:date>2011-01-11T16:13:18Z</dc:date>
    </item>
  </channel>
</rss>

