06-03-2019 07:09 PM - edited 02-21-2020 09:11 AM
What if I want to NAT an internal IP address to another IP address that should be allowed to transverse an IPSEC tunnel on an ASA? Example, I have 160.1.1.10 address that I want to be Natted to 170.1.1.10 which is an source IP allowed to reach 200.1.1.10 destination IP of the IPSEC tunnel?
In addition to my NAT statement which is:
"Object-Nat" natting static 160.1.1.10 to 170.1.1.10 and choosing Inside interface as source interface (160.1.1.10 host is in the Inside interface) and Outside interface (IPSEC tunnel starts/exits Outside interface on both Local and Remote Tunnel/ASA devices,
Do I need to create another ACL rule which would be applied to the Crypto Map ACL or no since the Crypto Map ACL is already defining/allowing source address 170.1.1.10 to reach remote destination IP 200.1.1.10?
Solved! Go to Solution.
06-04-2019 01:30 AM
06-04-2019 10:26 PM
The underlying syntax is:
nat (<source interface>,<destination interface>) source static <original source> <natted source> destination static <original destination> <natted destination>
Thus you need to specify the same destination twice when you are changing the destination address.
06-04-2019 01:30 AM
06-04-2019 09:26 AM
06-04-2019 10:20 AM
06-04-2019 05:57 PM
06-04-2019 10:26 PM
The underlying syntax is:
nat (<source interface>,<destination interface>) source static <original source> <natted source> destination static <original destination> <natted destination>
Thus you need to specify the same destination twice when you are changing the destination address.
06-06-2019 10:06 AM
06-06-2019 03:41 PM
06-06-2019 03:42 PM
Ok does adding nat statements (natting one or few object hosts to allowed source object) for IPSEC tunnel have any negative impacts meaning I could do it while tunnel is being used correct?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide