<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site To Site VPN Issue (NAT?) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987708#M939010</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip object-group GRP-INSIDE object-group GRP-OUTSIDE &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the subnet on the vender side part of GRP-OUTSIDE and the 10.9.220.29 host part of the GRP-INSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 18 Apr 2008 14:45:25 GMT</pubDate>
    <dc:creator>ldehmer</dc:creator>
    <dc:date>2008-04-18T14:45:25Z</dc:date>
    <item>
      <title>Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987704#M939006</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been reading some of the post about Site to Site VPN with overlapping subnets. I could use a little guidance or further explanation to understand this a bit more. To start off here is the scenario. We have a VPN established with a vender of ours and they need access to several different hosts on several different subnets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;140.x.x.x&lt;/P&gt;&lt;P&gt;141.x.x.x&lt;/P&gt;&lt;P&gt;10.10.20.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our vender already has another VPN established with another customer that uses the 10.10.20.x subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As it stands the vender only needs to access two different host (10.10.20.28 &amp;amp; 10.10.20.29)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I setup a NAT for each:&lt;/P&gt;&lt;P&gt;10.10.20.28 =&amp;gt; 10.9.220.28&lt;/P&gt;&lt;P&gt;10.10.20.29 =&amp;gt; 10.9.220.29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When they go to access this via the VPN I see the following show up when doing a debug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IPSEC(validate_proposal_request): proposal part #1,&lt;/P&gt;&lt;P&gt;  (key eng. msg.) dest= 10.10.8.10, src= 12.129.5.3,&lt;/P&gt;&lt;P&gt;    dest_proxy= 10.9.220.28/255.255.255.255/0/0 (type=1),&lt;/P&gt;&lt;P&gt;    src_proxy= 172.17.1.91/255.255.255.255/0/0 (type=1),&lt;/P&gt;&lt;P&gt;    protocol= ESP, transform= esp-3des esp-md5-hmac ,&lt;/P&gt;&lt;P&gt;    lifedur= 0s and 0kb,&lt;/P&gt;&lt;P&gt;    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4&lt;/P&gt;&lt;P&gt;IPSEC(validate_transform_proposal): proxy identities not supported&lt;/P&gt;&lt;P&gt;IPSEC(validate_proposal_request): proposal part #1,&lt;/P&gt;&lt;P&gt;  (key eng. msg.) dest= 10.10.8.10, src= 12.129.5.3,&lt;/P&gt;&lt;P&gt;    dest_proxy= 172.17.1.91/255.255.255.255/0/0 (type=1),&lt;/P&gt;&lt;P&gt;    src_proxy= 10.9.220.28/255.255.255.255/0/0 (type=1),&lt;/P&gt;&lt;P&gt;    protocol= ESP, transform= esp-3des esp-md5-hmac ,&lt;/P&gt;&lt;P&gt;    lifedur= 0s and 0kb,&lt;/P&gt;&lt;P&gt;    spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4&lt;/P&gt;&lt;P&gt;IPSEC(validate_transform_proposal): proxy identities not supported&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note access to the other host on the other subnets works with out issues, it is just access to the two host in the overlapping - any help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987704#M939006</guid>
      <dc:creator>ldehmer</dc:creator>
      <dc:date>2019-03-11T12:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987705#M939007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Before I answer your question, keep in mind that I am not an expert in this&lt;/P&gt;&lt;P&gt;but I've worked quite a bit with NAT, double-NAT on Checkpoint firewall platform.&lt;/P&gt;&lt;P&gt;I am also familiar with Cisco platforms but not as well compared to Checkpoint&lt;/P&gt;&lt;P&gt;firewall platforms.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vendors needs to put 10.9.220.28 and 10.9.220.29 in his remote encryption&lt;/P&gt;&lt;P&gt;domain.  He knows nothing about your 10.10.20.28 and 10.10.20.29 on your end&lt;/P&gt;&lt;P&gt;nor should he care.  When he initiates traffics from his end from host x.x.x.x&lt;/P&gt;&lt;P&gt;going to the destination of 10.9.220.28 10.9.220.29.  So far, so good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the traffics get to your destination, after the traffics get &lt;/P&gt;&lt;P&gt;decrypted, your vpn device is responsibe for "de-nat" the destination&lt;/P&gt;&lt;P&gt;from 10.9.220.28 to 10.10.20.28 and 10.9.220.29 to 10.10.20.29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the return traffics from 10.10.20.28 and .29 going back to vendor x.x.x.x&lt;/P&gt;&lt;P&gt;will be natted to 10.9.220.28 and .29, repsectively.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In summary, it will look like this, I will use Checkpoint terminology because&lt;/P&gt;&lt;P&gt;it is so much easier than checkpoint&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source            Destination          Translated-source    Translated-dest.&lt;/P&gt;&lt;P&gt;x.x.x.x           10.9.220.28 &amp;amp; .29    original             10.10.20.28 &amp;amp; .29&lt;/P&gt;&lt;P&gt;10.10.20.28 &amp;amp; .29 x.x.x.x              10.9.220.28 &amp;amp;  .29   original&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a very simple process, if you think about this.  What makes it hard&lt;/P&gt;&lt;P&gt;is all the stupid security level that cisco put on the interface.  Because&lt;/P&gt;&lt;P&gt;of this, you have to takes into account policy NAT which is a pain in the ass&lt;/P&gt;&lt;P&gt;to configure.  If you're not careful, you can cause a network outtage.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that help?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2008 13:46:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987705#M939007</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-04-18T13:46:18Z</dc:date>
    </item>
    <item>
      <title>Re: Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987706#M939008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, it just so happens the vender we have the VPN with is using checkpointâ&amp;#128;¦&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will see what we can puzzle out from here and come backâ&amp;#128;¦&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2008 13:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987706#M939008</guid>
      <dc:creator>ldehmer</dc:creator>
      <dc:date>2008-04-18T13:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987707#M939009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David is spot on with this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"IPSEC(validate_transform_proposal): proxy identities not supported"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This basically means that the remote and local subnets that your pix thinks it is using do not agree with the local and remote subnets that your vendor thinks they should be using &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so preusmably you have a crypto map access-list that says &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpntraffic permit ip host 10.9.220.28 host 172.17.1.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vendor must have the exact same local and remote network (host) entries on his checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2008 14:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987707#M939009</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-04-18T14:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987708#M939010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list outside_cryptomap_20 permit ip object-group GRP-INSIDE object-group GRP-OUTSIDE &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the subnet on the vender side part of GRP-OUTSIDE and the 10.9.220.29 host part of the GRP-INSIDE&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2008 14:45:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987708#M939010</guid>
      <dc:creator>ldehmer</dc:creator>
      <dc:date>2008-04-18T14:45:25Z</dc:date>
    </item>
    <item>
      <title>Re: Site To Site VPN Issue (NAT?)</title>
      <link>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987709#M939011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The complexity comes in play when you have to&lt;/P&gt;&lt;P&gt;configure VPN and NAT/double-NAT on the same&lt;/P&gt;&lt;P&gt;device.  This is a really bad design.  It will&lt;/P&gt;&lt;P&gt;make troubleshooting and support very difficult.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The sensible approach is to separate VPN and&lt;/P&gt;&lt;P&gt;Firewall into two different components.  That &lt;/P&gt;&lt;P&gt;will make life much easier in term of support&lt;/P&gt;&lt;P&gt;and troubleshooting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my 2c &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Apr 2008 16:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/site-to-site-vpn-issue-nat/m-p/987709#M939011</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-04-18T16:23:35Z</dc:date>
    </item>
  </channel>
</rss>

