<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Site to Site IPSec VPN question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883753#M958834</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;George please post your running config &lt;/P&gt;&lt;P&gt;nat (inside) 6 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;global (outside) 6 5.5.5.5 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config may prevent your internet access. So please post your config and let me advise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Dec 2007 19:23:39 GMT</pubDate>
    <dc:creator>Alan Huseyin Kayahan</dc:creator>
    <dc:date>2007-12-14T19:23:39Z</dc:date>
    <item>
      <title>ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883745#M958826</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a question regarding IPSec site to site VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an internal network, say 10.1.1.0/24 which NATs to global address 5.5.5.5 on the Outside interface.  The remote network is 20.20.20.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to NAT to the global address then send that over the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should the crypto map statement map the inside network 10.1.1.0/24 to the remote network 20.20.20.0/24 or should it map from the global NAT address 5.5.5.5?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this is clear, thanks for any replies!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883745#M958826</guid>
      <dc:creator>george_daly</dc:creator>
      <dc:date>2019-03-11T11:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883746#M958827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cryptomap should include the global address (NATed), not inside network in your case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_100_cryptomap permit ip host 5.5.5.5 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 10:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883746#M958827</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T10:47:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883747#M958828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi George&lt;/P&gt;&lt;P&gt;  Feel free to ask dependent questions. For example how do you plan Conditional exempt NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 11:22:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883747#M958828</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T11:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883748#M958829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I need to enable the option to allow communication between VPN peers connected to the same interface because this is an Outside to Outside tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the NAT - I already have exemptions specified from the internal network to the other internal address spaces through a NAT 0 access list if thats what you mean?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 11:49:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883748#M958829</guid>
      <dc:creator>george_daly</dc:creator>
      <dc:date>2007-12-12T11:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883749#M958830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My typo, I didnt mean exempt. Here is what I mean&lt;/P&gt;&lt;P&gt; You have a nat statement like following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above statements wont let you NAT 10.1.1.0/24  to a 5.5.5.5 outside IP. You should have the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CNat permit ip 10.1.1.0 255.255.255.0 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list CNat&lt;/P&gt;&lt;P&gt;nat (inside) 2 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 5.5.5.5 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 2 interface&lt;/P&gt;&lt;P&gt;access-list outside_100_cryptomap permit ip host 5.5.5.5 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the statements in CNat and outside_100_cryptomap do not exist in your nat exempt rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"So I need to enable the option to allow communication between VPN peers connected to the same interface because this is an Outside to Outside tunnel"&lt;/P&gt;&lt;P&gt;   No. Your outside interface was peer for tunnel and still is. Your ASA outside to remote ASA outside. You should enable same security interface traffic, If you want to permit traffic from a VPN site, ends at outside interface, to a VPN site again which also ends at outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 13:02:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883749#M958830</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-12T13:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883750#M958831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your detailed reply, much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still not quite there, 10.1.1.0/24 doesn't NAT to 5.5.5.5 I think it just routes directly down the tunnel.  This is the config I have currently:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_cryptomap_20_1 permit ip host 5.5.5.5 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_nat0_inbound permit ip host 5.5.5.5 20.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 6 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list outside_nat0_inbound outside&lt;/P&gt;&lt;P&gt;global (outside) 6 5.5.5.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In which access-list do I need to permit 10.1.1.0/24 20.20.20.0/24, or is an additional access-list required?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2007 15:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883750#M958831</guid>
      <dc:creator>george_daly</dc:creator>
      <dc:date>2007-12-12T15:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883751#M958832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am also in the same boat. I need to setup a site-to-site VPN connection to a vendor.  Because of some addressing conflicts I need to both the hosts that reside on my network and the hosts on the remote side.  Is this something that is doable or should I have the vendor do part of the natting.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 18:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883751#M958832</guid>
      <dc:creator>pvaysberg</dc:creator>
      <dc:date>2007-12-13T18:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883752#M958833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found two great docs on this from cisco's site.  Finally got my stuff working.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800949f1.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800949f1.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 16:23:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883752#M958833</guid>
      <dc:creator>pvaysberg</dc:creator>
      <dc:date>2007-12-14T16:23:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883753#M958834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;George please post your running config &lt;/P&gt;&lt;P&gt;nat (inside) 6 10.1.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;global (outside) 6 5.5.5.5 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This config may prevent your internet access. So please post your config and let me advise&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 19:23:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883753#M958834</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-14T19:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Site to Site IPSec VPN question</title>
      <link>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883754#M958835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Paul&lt;/P&gt;&lt;P&gt;   Just leave a post if you need assistance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 19:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-site-to-site-ipsec-vpn-question/m-p/883754#M958835</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-14T19:26:07Z</dc:date>
    </item>
  </channel>
</rss>

