01-20-2020 10:26 AM
I have come across a conflict situation. And given the limitation that we cannot apply an NAT to remote environment.
Tunnel 1
Local Firewall IP : x.x.x.x
Peer Firewall IP : y.y.y.y
Local Subnet : 10.252.100.0/24
Remote Subnet : 192.168.100.0/24
Tunnel 2
Local Firewall IP : x.x.x.x
Peer Firewall IP : z.z.z.z
Local Subnet : 10.252.100.0/24
Remote Subnet : 192.168.100.0/24
Please advise how can this be solved using ASA5515 firewalls.
Solved! Go to Solution.
01-21-2020 07:21 AM
yes you can mitigate with differege IP address one of the site to NAT at your end.
make sure they allow your New IP address far end ACL.
01-20-2020 11:42 AM
You have to NAT somewhere to mitigate the Same subnet in the environment.
what device remote end ?
01-21-2020 06:01 AM
Palo Alto
I am okay with doing NAT at our end (Cisco ASA). We cannot do NAT at remote ends.
Thank You.
01-21-2020 07:21 AM
yes you can mitigate with differege IP address one of the site to NAT at your end.
make sure they allow your New IP address far end ACL.
01-21-2020 01:02 PM
The solution is brief that I realized after Balaji's comment and looking at the packet flow of Cisco ASA.
ASA performs XLATE functionality which can act as Pseudo address for destination, similarly i have to NAT my source to different address. So following this when a route for tunnel is established it knows the forward (Pseudo Address) and reverse path (NATed Source).
I don't have environment to test but definitely feel it will working knowing ASA creates policy based tunnel.
Original thought was identifying solution for such cases using PA, Checkpoint, ASA and Fortigate.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide