cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
635
Views
0
Helpful
5
Replies

NAT from one VPN tunnel through 5510 over another VPN tunnel

kerryjcox
Level 1
Level 1

So, I have been presented with an interesting challenge. I would prefer using an internal Linux host to solve this, but my manager is convinced the ASA can do this. Hope this is the correct group. This is a NAT and routing question.

We have two VPN tunnels. One goes to Company X and connects to our internal network. Let's call the internal network 10.10.5.0 /24. That internal network can connect over the VPN tunnel to Company X, allowing only a single IP address in a /30 subnet on the inside of Company X that we can connect to (10.109.1.253). The kicker is that Company X will only allow a single VPN tunnel from our company.

The 2nd tunnel is coming from our Cloud provider (Company Y) and also connects internally and can reach IP addresses on the 10.10.5.0 /24 subnet.

Question is, can I set up a NAT on the ASA 5510 (9.1(3)) to allow translation from hosts coming from Company Y over their tunnel, say subnet 10.120.136.0 /24 to hit an internal IP here, say 10.10.5.145 and have that NAT to a destination IP on the Company X site or to the 10.109.1.253?

Or should I simply route requests coming from Company Y (10.120.136.0 /24 ) to the /30 subnet at Company X (10.109.1.253 /30) using a NAT'ed internal IP address, say 10.10.5.145?

Or would the best solution simply have users in 10.120.136.0 (Company Y) hit a Linux box at 10.10.5.145 (our internal network), and the ip forward all requests to 10.109.1.253 (the pingable host at Company X)?

Thoughts?

5 Replies 5

You can easily solve that with

  1. same-security-traffic permit intra-interface
  2. policy-nat for (outside,outside)

Karsten,

Thanks much for the response. I have the option "same-security-traffic permit intra-interface" already enabled.

I guess I am being daft about the policy NAT. Looking over the link I am not seeing a clear example of how to configure this. Would you be willing to provide one? 

Much thanks in advance.

 

I think I found an example that may work for my situation. Thanks. 

Will give it a shot.

---

no such luck. 

any examples would be appreciated on how to translate incoming IP addresses from the 10.120.139.0 /24 subnet to an internal 10.10.5.145 IP and have them them route or NAT over to the 10.109.1.253 /32 IP, so everything on the 10.109.1.253 address will see all traffic originating from 10.120.139.0 /24 as really coming from 10.10.5.145?

Thanks.

Tried the following but with no luck. From the IP of 10.120.139.12, I cannot ping 10.10.5.145 which should NAT over to the other VPN IP of 10.109.1.253.

I am certain I am just missing something:

 

object network COMPANY_A

    subnet 10.120.139.0 255.255.255.0

object network COMPANY_B

    host 10.109.1.253

object network INSIDE_MAP

     host 10.10.5.145

 

nat (outside,outside) source dynamic COMPANY_A INSIDE_MAP destination static COMPANY_B COMPANY_B

Based on above link, I am open to suggestions.

same-security-traffic permit intra-interface is already enabled.

 

The nat-rule looks fine, but is it in the right order? It's very likely that it has to be above other rules in NAT-section1.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card