12-08-2010 05:54 AM - edited 03-04-2019 10:43 AM
I have a need to configure Site 2 Site vpns to different clients. I have built the vpns under a single crypto map, but an issue has come up.
One of my Client requires me to NAT my inside network to my public address as he also had NAT his inside network to his public address.
How do I accomplish this? I basically need to NAT my inside 192.168.x.x network for Client to 110.44.x.x. My Client his inside network 10.225.x.x network for me to 203.32.x.x . In my side i have a Cisco IOS router and on my client side they have Cisco PIX.
My Tunnel is up but can't get reach to my inside network and same on remote side. My ipsec log shows " sh crypto ipsec sa peer 203.32.x.x" packet encrypted and decrypted.
I assume my NAT and ACL is working well, still not being able for tunnel traffic is there anyway to make this scenario up to my customer?
So i request if any one can provide me any suggest and support- will be the great help.
Thank You
Four Pros IT
12-08-2010 06:13 AM
Hi!
Unless there is a conflict between the 2 sites. (same private network existing on both sites) there is no need to do any NAT.
The other party should be able to add a NAT extemption for traffic going to your network.
Ofcourse it all depends on what your site 2 site vpns are to be used for and how. It might be a requirement for them.
As far as doing the NAT its no different than your regular NAT.
Just make sure that the interesting traffic ACL for the ipsec tunnel matches the NAT'ed source and destination not the real ones.
And the usual that both ends need acl's that are mirror images of each other.
HTH
12-08-2010 06:29 AM
HI Mathias!
Thanks for your quick response.
Well the private network are not same on both side, but can't say that on network should be scalable so do NAT will be better in that case.
Yes the interesting traffic ACL for ipsec tunnel matches the NATed source and destination not the real ones.
But not able to reach the private network.
Thank You
Four Pros IT
12-08-2010 06:47 AM
Hi,
You can do NAT but you have to exempt interesting IPsec traffic from being natted and they must do the same on their side.
12-08-2010 06:56 AM
HI
I hate to ask but could i bother you for a short config example? I am afraid i m a little out of my league with this. Thank You
Four Pros IT
12-08-2010 07:52 AM
Hi,
I hate to ask but could i bother you for a short config example? I am afraid i m a little out of my league with this. Thank You
no problem.
suppose you nat from inside to outside interface( PAT) -inside is 10.0.1.0/24(int f0/1) and outside interface is s1/0
you want to vpn from 10.0.1.0/24 to 192.168.1.0/24 for all ip traffic
here's config:
ip access-list extended 110 deny ip 10.0.1.0 0.0.0.255 192.168.1.0 0.0.0.255
ip access-list extended 110 permit ip 10.0.1.0 0.0.0.255 any
route-map PAT permit 10
match ip address 110
ip inside nat source route-map PAT interface s1/0 overload
on f0/1: nat inside
on s1/0: nat outside
ip access-list extended CRYPTO permit ip 10.0.1.0 0.0.0.255 192.168.1.0 0.0.0.255 is your crypto ACL
their crypto ACL must mirror yours and on Pix to do nat exemption they must do nat(inside) 0 access-list NO_NAT where NO_NAT is ACL permitting 192.168.1.0 to 10.0.1.0
12-08-2010 08:23 AM
Hi!
OK,
I got you up to PAT overload. That means port address translation but i think that the mentioned config is still not sufficient. I have included my cofig file if you wouldnt mind taking on look.
And you have applied an ACL -for crypto map the real ips, i am also confused on this section also. Hope i am not bothering with my issue.
Thank You
Four Pros IT
12-08-2010 06:48 AM
HI Mathias!
Thanks for your quick response.
Well the private network are not same on both side, but can't say that on network should be scalable so do NAT will be better in that case.
NAT my inside 192.168.0.0/24 network for Client to single IP 110.44.12.2. My Client his inside network 10.225.0.0/24 network for me to single IP 203.32.1.2 . In my side i have a Cisco IOS router and on my client side they have Cisco PIX.
Yes the interesting traffic ACL for ipsec tunnel matches the NATed source and destination not the real ones.
But not able to reach the private network.
Thank You
Four Pros IT
12-08-2010 07:08 AM
Have you verified the configuration on the other end? I know that sometimes you just have to trust that its been configured the way the other party is stating. But I always find it usefull to ask for the other partys matching configuration.
12-08-2010 07:44 AM
Hi!
As the other end says they had done as per the requirement and all are fine as from my end i can;t access that PIX due to security policy of remote end. I have here attached my configuration as that scenario define above. I request for your suggestion if i am wrong on my configuration.
Thank You.
Four Pros IT
12-08-2010 08:41 AM
12-08-2010 11:06 AM
Hi,
your tunnel went up and you have traffic going through but you should clear your tunnel and ask other side to do it also then ping dst LAN from src LAN
and do your sh crypto again.
Regards.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide