05-31-2019 06:22 AM - edited 02-21-2020 09:11 AM
You must still use the natted IP not the real source IP in the access-rules correct?
05-31-2019 07:16 AM
05-31-2019 07:55 AM
05-31-2019 10:48 AM
06-03-2019 07:00 PM - edited 06-03-2019 07:13 PM
Yes sorry I should have clarified but awesome thanks!
Just created another post, but what if I want to NAT an internal IP address to another IP address that should be allowed to transverse an IPSEC tunnel on an ASA? Example, I have 160.1.1.10 address that I want to be Natted to 170.1.1.10 which is an source IP allowed to reach 200.1.1.10 destination IP of the IPSEC tunnel?
In addition to my NAT statement which is:
"Object-Nat" natting static 160.1.1.10 to 170.1.1.10 and choosing Inside interface as source interface (160.1.1.10 host is in the Inside interface) and Outside interface (IPSEC tunnel starts/exits Outside interface on both Local and Remote Tunnel/ASA devices,
Do I need to create another ACL rule which would be applied to the Crypto Map ACL or no since the Crypto Map ACL is already defining/allowing source address 170.1.1.10 to reach remote destination IP 200.1.1.10?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide