05-30-2013 11:38 PM - edited 03-11-2019 06:51 PM
We currently have 3 networks - Support, Monitoring and Client where we are trying to allow our support network to access a server in the client network.Normally we would create VPN's between the client site and both our Support and Monitoring networks. In this case, our support network overlaps with a network connected to our client, so they were only able to set up a vpn between Client -> Monitoring. I am trying to figure a way to do source/destination nat to make it look like traffic from our Support network is coming from our monitoring network, and therefore get through to the client's server. Please see diagram below. I'm not to sure about where/how to configure this set up.
Solved! Go to Solution.
05-31-2013 03:59 AM
Hi,
I first presumed that the Monitor network had to reach the overlapping network at both Support and Client site.
That is why I added the NAT on the Support site to get around this problem.
Naturally if you only have the destination network 172.19.11.0/24 from the Monitor site then there probably is no need for NAT mentioned.
I wonder do you actually need anything else than the source Dynamic PAT for the traffic from Support to Client (at the Monitor site) + ofcourse the related additions to the L2L VPN connection between Support and Monitor.
- Jouni
05-30-2013 11:53 PM
Hi,
I dont see overlap in the picture networks atleast?
Or did I miss something?
- Jouni
05-30-2013 11:57 PM
If there is truly overlap between the Support and Client network I would suggest that you configure NAT on both sites and Tunnel the traffic between those NAT network between the sites with L2L VPN.
- Jouni
05-31-2013 12:00 AM
I am hoping to do it without modifying the client's GW if possible. Is there another way? I have full control over our own ASA devices, but none over the clients gear.
05-31-2013 12:58 AM
Doesnt the above information also mean that your Monitoring network cant communicate with some portion (or all) of your Support network? I mean if the Monitoring network is already forwarding all traffic towards 172.16.17.0/yy to the L2L VPN directly to the client?
I would have to say the simplest configuration in the long run would be to configure the L2L VPN directly between Support and Client and do NAT at both ends so neither site would see the real (overlapping) network from their side.
I cant quite wrap my head around a solution that would only involve your ASAs.
If I would have to guess without first testing/labbing the situation I would have to say what I would try (but probably wouldnt configure in a production environment myself)
But as I said this is not something I have tested and would not be something that I would wish to implement in a production environment since there is a much more simpler solution to this. Naturally the above setup would also load the Monitor sites bandwith as its now has to handle traffic that is not destined for its local networks.
I do have 3 ASA firewalls at home and might be able to lab this setup but that is not all that sure.
What I am most worried about is the Dynamic PAT + Static Policy NAT on the Monitor network ASA. Will it match the L2L VPN crypto ACLs or not.
To give a step by step description what I expected to happen
Well that was a long post :/
- Jouni
05-31-2013 03:44 AM
Hi Jouni, the client network in question is 172.19.11.0/24 and the Support network is 172.17.16.0/20, so they do not overlap. The VPN between support and monitor networks is up and communication is ok. I kind of followed your explanation, and I had something similar in mind. The one thing I'm not sure of is why we need any NAT on the Support ASA. Could we not just do source translation on the monitoring network's ASA? So lets say packet with source 172.17.16.30 gets routed through IPSEC tunnel to monitoring network. From there, the source IP is translated to an unused 192.168.250.x address and destination remains 172.19.11.189?.
05-31-2013 03:59 AM
Hi,
I first presumed that the Monitor network had to reach the overlapping network at both Support and Client site.
That is why I added the NAT on the Support site to get around this problem.
Naturally if you only have the destination network 172.19.11.0/24 from the Monitor site then there probably is no need for NAT mentioned.
I wonder do you actually need anything else than the source Dynamic PAT for the traffic from Support to Client (at the Monitor site) + ofcourse the related additions to the L2L VPN connection between Support and Monitor.
- Jouni
05-31-2013 04:03 AM
You are spot on! - I read through your comments and tried the Outside Dynamic NAT and bingo! - thanks so much for your help
05-31-2013 04:06 AM
Hi,
Great to hear
Thank you for marking the correct answer.
- Jouni
05-30-2013 11:58 PM
Thanks for the reply Jouni. I have simplified the network dramatically. The client uses that 172.17.16.0 network in other places (I don't know whether it is a local network, or they are VPN'ing to another network using that subnet through the same gateway)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide