Hello,
I have cisco ASA with v9.0 which resides between LAN and Internet. ASA terminates number of L2L VPNs. One of the VPN is interesting which I would need a help.
This L2L VPN looks like:
(MyLAN) 192.168.0.0/16, 10.8.0.0/16 >>>dynamic PAT >>>> Public IP ============ VPN tunnel ========== 10.183.0.0/16 (remote site LAN)
Setup is that communication is always initiated from MyLAN towards Remote LAN. Dynamic PAT is in use because in the Remote LAN there is a same private space, but its smaller than the MyLAN.
Dynamic NAT on ASA at MyNET is done like:
nat (inside,outside) source dynamic MyNET Public_IP destination static Remote_LAN Remote_LAN
Everything works fine. So far so good.
Request now is that specific hosts on Remote LAN have to communicate to specific hosts and ports in MyLAN. Communication will be initiated from Remote LAN. Looking at the ASA configuration guide 9.0 I conclude that I would need to set on ASA at MyLAN policy NAT as follows
nat (inside,outside) source static Remote_HOSTS Remote_HOSTS destination static MyLAN_Server1 Public_IP service MyLAN_Server1_7501 Public_IP_27503
I am looking for this because I want static PAT at MyLAN to happen if the source is from this RemoteLAN and to not mess with the other VPNs on the same ASA. In the documentation for ASA 9.0 is stated:
Twice NAT—A single rule translates both the source and destination. A matching packet only matches the one rule, and further rules are not checked. Even if you do not configure the optional destination address for twice NAT, a matching packet still only matches one twice NAT rule. The source and destination are tied together, so you can enforce different translations depending on the source/destination combination. For example, sourceA/destinationA can have a different translation than sourceA/destinationB.
Could you please advice me whether this will work and is good approach or what should I consider also?