cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1034
Views
25
Helpful
8
Replies

NAT issue with IPSEC Failover

NETAD
Level 4
Level 4

Hello, how can I get the static nat statements to dynamically shift when an IPsec tunnel is down and let the ASA not use it?  

1 Accepted Solution

Accepted Solutions

try adding the route-lookup keyword to the end of your NAT statements.  This will force the NAT statements to follow the routing table and not override the routing table.

--
Please remember to select a correct answer and rate helpful posts

View solution in original post

8 Replies 8

Marvin Rhoads
Hall of Fame
Hall of Fame

They won't dynamically shift.

 

Generally speaking static NAT statements would implement NAT exemption for VPN tunnels. If the tunnel is down (either its primary peer address or a backup) then you should not be able to reach the remote networks. So the fact that the original NAT statement is still applied is moot.

 

If you're using it differently, please explain and perhaps we can offer a more precise explanation.

so here's the nat statements. The ASA is directly connected to the mpls and internet circuit. When the mpls circuit goes down(tracked by IP SLA and Tracking), the ASA uses its default route to create an ipsec tunnel over the internet circuit but the first nat statement keep getting hit and so the tunnel won't get established. 

 

nat (Inside,Mpls) source static LOCAL LOCAL destination static REMOTE REMOTE
nat (Inside,Outside) source static LOCAL LOCAL destination static REMOTE REMOTE

 

 

 

The way you have it should work if your routing and the tracking is all correctly in place.

 

Have you confirmed that the path to the remote subnets is using the default route? If it is, and when that default flips to the alternate path, routing in the ASA should tell it to use the alternate egress interface and thus the alternate NAT statement would be in effect. 

 

I’ve setup several using that logic and they work just fine. 

Yes routing is getting updated once the tracking is down but for some reason not the NAT. Isn’t NAT processed first before routing on a ASA? On a side note, I am doing thing on ASAv before applying the config to my client’s ASA. Would it behave differently on a virtual appliance?  

While NAT is, in general, processed before routing there is a partial routing step to lookup the destination interface when checking the NAT rule. 

 

This is should be the same on ASAv as on a physical appliance. 

try adding the route-lookup keyword to the end of your NAT statements.  This will force the NAT statements to follow the routing table and not override the routing table.

--
Please remember to select a correct answer and rate helpful posts

That's a good suggestion Marius. I agree.

Worked like magic!! Thanks Marius.
Review Cisco Networking for a $25 gift card