<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RA VPN pool nating in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ra-vpn-pool-nating/m-p/1254459#M787433</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to do the NATing for VPN client pool as inside servers are accepting only some allowed ip subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My vpn client pool is using 172.16.1.x/24 and inside users are allow to access only from 141.146.130.x/28 as source subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that I did the following ACS and NATing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 140.85.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 144.23.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 141.146.128.0 255.255.128.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 140.85.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 144.23.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 141.146.128.0 255.255.128.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130  140.85.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130 144.23.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130 141.146.128.0 255.255.128.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list policy_nat&lt;/P&gt;&lt;P&gt;nat (outside) 5 141.146.130.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I'm connected to VPN and getting IP from 172.16.1.x/24 subnet I'm not able to access trust subnet (ie. 140.85.0.0/16.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the running-config with some show commands after connecting VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I check VPN Client statics I could not see any subnet under secure routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help me on this?,&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 16:27:21 GMT</pubDate>
    <dc:creator>pemasirid</dc:creator>
    <dc:date>2019-03-11T16:27:21Z</dc:date>
    <item>
      <title>RA VPN pool nating</title>
      <link>https://community.cisco.com/t5/network-security/ra-vpn-pool-nating/m-p/1254459#M787433</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to do the NATing for VPN client pool as inside servers are accepting only some allowed ip subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My vpn client pool is using 172.16.1.x/24 and inside users are allow to access only from 141.146.130.x/28 as source subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For that I did the following ACS and NATing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 140.85.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 144.23.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip host 141.146.130.130 141.146.128.0 255.255.128.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 140.85.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 144.23.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list policy_nat extended permit ip 141.146.128.0 255.255.128.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130  140.85.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130 144.23.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list Oracle_OnDemand extended permit ip host 141.146.130.130 141.146.128.0 255.255.128.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list policy_nat&lt;/P&gt;&lt;P&gt;nat (outside) 5 141.146.130.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although I'm connected to VPN and getting IP from 172.16.1.x/24 subnet I'm not able to access trust subnet (ie. 140.85.0.0/16.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the running-config with some show commands after connecting VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I check VPN Client statics I could not see any subnet under secure routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone help me on this?,&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:27:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ra-vpn-pool-nating/m-p/1254459#M787433</guid>
      <dc:creator>pemasirid</dc:creator>
      <dc:date>2019-03-11T16:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: RA VPN pool nating</title>
      <link>https://community.cisco.com/t5/network-security/ra-vpn-pool-nating/m-p/1254460#M787438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm confused as to why you want to use policy nat here. As you show in your screenshot, the VPN client is not using split tunneling, so it should be able to reach all networks known to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you have no "global" statement to match your nat statement used for policy nat. To use policy nat, here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 5 access-list policy_nat&lt;/P&gt;&lt;P&gt;global (outside) 5 141.146.130.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only thing you need is a "no nat" rule for traffic going back to the VPN clients.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can add this line to your nonat ACL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 140.85.0.0 255.255.0.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise you could use this line to make all networks available to the VPN clients:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Oct 2009 10:42:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ra-vpn-pool-nating/m-p/1254460#M787438</guid>
      <dc:creator>Erik Ingeberg</dc:creator>
      <dc:date>2009-10-19T10:42:53Z</dc:date>
    </item>
  </channel>
</rss>

