ā07-12-2021 11:44 PM
Dear Team,
We have received on requirement as below:
We have one Any connect VPN which we want to use to communicate with our one IPSEC VPN.
How can we achieve this? Please find attached topology.
Any connect VPN subnet 192.168.40.0/24 want communicate with IPSEC VPN with source NATING
LAN and DMZ are working fine with IPSEC with source Public IP NATING but unable to work with Any connect VPN.
Solved! Go to Solution.
ā07-13-2021 12:57 AM
You'll need to enable the traffic to hairpin back out the same interface traffic came in on and configure a NAT rule.
Example:-
same-security-traffic permit intra-interface
nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp
You'll obviously need to ensure that the source nat address is included in the crypto ACL for the L2L VPN to the peer.
ā07-13-2021 12:57 AM
You'll need to enable the traffic to hairpin back out the same interface traffic came in on and configure a NAT rule.
Example:-
same-security-traffic permit intra-interface
nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp
You'll obviously need to ensure that the source nat address is included in the crypto ACL for the L2L VPN to the peer.
ā07-13-2021 01:31 AM
ā07-13-2021 01:35 AM
If you use "any" you could cause other issues from traffic inside the network. For this communication it's not going to be "any" if the traffic is source from an AnyConnect client it would be from the "outside" interface.
You are translating the RAVPN traffic to the "outside" interface IP address, so therefore the crypto ACL includes the IP address of the "outside" interface? Has this been mirror on the remote peer?
Is an IPSec SA pair created for this communication?
Run packet-tracer and provide the output.
ā07-14-2021 08:50 PM
Phase: 9
Type: WEBVPN-SVC
Subtype: in
Result: DROP
Config:
Additional Information:
Result:
input-interface: Outside
input-status: up
input-line-status: up
output-interface: Outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
ONEEARTH-SCADA-FPR2130-FW01#
ā07-14-2021 08:53 PM
We are getting above error, We have added RAVPN subnet in ACL.
And all three subnet like LAN, DMZ & RAVPN are NATED with subnet and that NATED subnet allowed by peer end for IPSEC.
ā07-15-2021 12:18 AM
Have you run that packet-tracer using an IP address already assigned to a connect client? Re-try using a free IP address
If still a problem provide the full output for review and the configuration,
ā07-16-2021 02:41 AM
Hello Rob,
Thank you.
It is working with above command.
nat (OUTSIDE,OUTSIDE) source static RAVPN_REAL RAVPN_NAT destination static REMOTE_NET REMOTE_NET no-proxy-arp
That ping drop was coming due incorrect ACL. after changing ACL it works fine.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide