<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix515 VPN with specific internal IP (NAT?) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959043#M938435</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatinside line 1 permit ip host 192.168.0.45 host 10.1.5.12 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 2 permit ip host 192.168.0.43 host 10.112.249.58 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 3 permit ip host 192.168.0.43 host 10.118.1.10 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 4 permit ip host 192.168.0.43 host 10.118.1.13 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 5 deny ip host 192.168.0.41 host 10.3.1.133 (hitcnt=1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This show the other three vpn connections I have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does now seem to be trying, in that the deny line has a hit count. But I have debugging on and nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 May 2008 13:32:59 GMT</pubDate>
    <dc:creator>bertie_uk</dc:creator>
    <dc:date>2008-05-01T13:32:59Z</dc:date>
    <item>
      <title>Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959035#M938427</link>
      <description>&lt;P&gt;I have a PIX 515E with three VPN tunnels already set up and working fine. They are all configured with no nat (i.e nat (dmz) 0 access-list nonatinside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a fourth VPN to set up, but they already use the same internal IP address (192.168.0.x) and request that my internal host appears as 192.168.20.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I set this up without breaking my existing tunnels? I followed the overlapping configuration example, but not exactly what I'm trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatinside permit ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;access-list vpn4 permit ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set vpn4-set esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 match address vpn4&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set peer x.x.x.x&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set transform-set vpn4-set&lt;/P&gt;&lt;P&gt;crypto map vpnmap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp nat-traversal 20&lt;/P&gt;&lt;P&gt;isakmp key ******** address x.x.x.x netmask 255.255.255.255 no-xauth no-config-mode&lt;/P&gt;&lt;P&gt;isakmp policy 20 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 20 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 20 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 20 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 20 lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My host is 192.168.0.41 but as I say, I need it to appear at the other end as 192.168.20.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Huge thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bertie&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959035#M938427</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2019-03-11T12:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959036#M938428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something like this should do the trick....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn_nat permit ip host 192.168.0.41 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn5 permit ip host 192.168.20.1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.20.1 access-list vpn_nat&lt;/P&gt;&lt;P&gt;crypto map vpnmap 60 match address vpn5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Apr 2008 15:05:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959036#M938428</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-30T15:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959037#M938429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;acomiskey &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, am still struggling...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the lines:&lt;/P&gt;&lt;P&gt;access-list nonatinside permit ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;access-list vpn4 permit ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 ipsec-isakmp&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 match address vpn4&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set peer x.x.x.x&lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set transform-set vpn4-set&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And replaced with your suggestion, completing the crypto map section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just now the vpn tunnel doesn't seem to be starting when I access 10.3.1.133 from 192.168.0.41 server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 08:54:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959037#M938429</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2008-05-01T08:54:58Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959038#M938430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, thought the other end of the tunnel was 192.168.0.0. Try this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn_nat permit ip host 192.168.0.41 host 10.3.1.133 &lt;/P&gt;&lt;P&gt;access-list vpn4 permit ip host 192.168.20.1 host 10.3.1.133&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.20.1 access-list vpn_nat &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 match address vpn4 &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set peer x.x.x.x &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set transform-set vpn4-set &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 12:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959038#M938430</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-01T12:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959039#M938431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Made those changes but the tunnel is still not being kicked off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should say, my software version is PIX Version 6.3(4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 12:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959039#M938431</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2008-05-01T12:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959040#M938432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you verify with a show xlate that the inside host is translating to 192.168.20.1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 12:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959040#M938432</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-01T12:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959041#M938433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the only translation is to an external address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only difference is I'm using a dmz interfance, not inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could these lines be conflicting?:&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nonatinside&lt;/P&gt;&lt;P&gt;nat (dmz) 1 192.168.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But these are required for the other VPN connections and local access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 13:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959041#M938433</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2008-05-01T13:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959042#M938434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so what does your nonatinside acl look like? You should be able to do something like this...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatinside deny ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;access-list nonatinside permit ip .(whatever your existing acl is)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn_nat permit ip host 192.168.0.41 host 10.3.1.133 &lt;/P&gt;&lt;P&gt;access-list vpn4 permit ip host 192.168.20.1 host 10.3.1.133 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.1 access-list vpn_nat &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 ipsec-isakmp &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 match address vpn4 &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set peer x.x.x.x &lt;/P&gt;&lt;P&gt;crypto map vpnmap 40 set transform-set vpn4-set &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 13:12:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959042#M938434</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-01T13:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959043#M938435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonatinside line 1 permit ip host 192.168.0.45 host 10.1.5.12 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 2 permit ip host 192.168.0.43 host 10.112.249.58 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 3 permit ip host 192.168.0.43 host 10.118.1.10 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 4 permit ip host 192.168.0.43 host 10.118.1.13 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list nonatinside line 5 deny ip host 192.168.0.41 host 10.3.1.133 (hitcnt=1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This show the other three vpn connections I have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does now seem to be trying, in that the deny line has a hit count. But I have debugging on and nothing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 13:32:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959043#M938435</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2008-05-01T13:32:59Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959044#M938436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you post a more complete config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 13:35:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959044#M938436</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-01T13:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959045#M938437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;email me at &lt;A href="mailto:richard@teamnetsol.com"&gt;richard@teamnetsol.com&lt;/A&gt; and i'll reply with the full config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the assistance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 13:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959045#M938437</guid>
      <dc:creator>bertie_uk</dc:creator>
      <dc:date>2008-05-01T13:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Pix515 VPN with specific internal IP (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959046#M938438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list vpn4_nat permit ip host 192.168.0.41 host 10.3.1.133&lt;/P&gt;&lt;P&gt;access-list policy_nat permit ip host 192.168.0.41 any&lt;/P&gt;&lt;P&gt;no static (dmz,outside) 85.x.x.x 192.168.0.41 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.1 access-list vpn4_nat&lt;/P&gt;&lt;P&gt;static (dmz,outside) 85.x.x.x access-list policy_nat&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what this does is create 2 policy nat statements. If 192.168.0.41&lt;/P&gt;&lt;P&gt;accesses 10.3.1.133 it will be translated to 192.168.20.1. If 192.168.0.41&lt;/P&gt;&lt;P&gt;goes anywhere else, it will be translated to 85.x.x.x. When you do a "show&lt;/P&gt;&lt;P&gt;xlate" you should see both translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure if this is best practice or the only way to accomplish this,&lt;/P&gt;&lt;P&gt;but I think it will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 May 2008 14:58:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix515-vpn-with-specific-internal-ip-nat/m-p/959046#M938438</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-01T14:58:37Z</dc:date>
    </item>
  </channel>
</rss>

