03-10-2012 07:24 AM - edited 03-04-2019 03:37 PM
Hello,
I have an 881W with configuration posted below along with IOS version. The site has a local Exchange server and also a LAN-to-LAN IPSec. Exchange's internal IP is statically NAT'd. Problem is that when that when a static NAT for Exchange is in place, Exchage is not accessible thru tunnel. Scenarios is as below:
Please help.
Thanks,
Paresh
===================
boot-start-marker
boot system flash:c880data-universalk9-mz.152-1.T1.bin
boot-end-marker
!
!
logging buffered 50000 informational
!
no aaa new-model
memory-size iomem 10
clock timezone CT -6 0
clock summer-time CT recurring
crypto pki token default removal timeout 0
!
ip inspect max-incomplete high 20000000
ip inspect max-incomplete low 750
ip inspect one-minute low 750
ip inspect one-minute high 20000000
ip inspect tcp idle-time 14400
ip inspect tcp max-incomplete host 150 block-time 0
ip inspect name FIREWALL tcp timeout 7200
ip inspect name FIREWALL udp
ip inspect name FIREWALL ftp
ip inspect name FIREWALL icmp
ip inspect name FIREWALL smtp
ip cef
no ipv6 cef
!
!
track 10 ip sla 10 reachability
delay down 30 up 10
!
!
crypto isakmp policy 10
encr aes 256
authentication pre-share
group 5
crypto isakmp key *********** address 68.X.X.36 no-xauth
crypto isakmp aggressive-mode disable
!
!
crypto ipsec transform-set rtpset esp-aes 256 esp-sha-hmac
!
!
!
crypto map rtpset 100 ipsec-isakmp
set peer 68.7X.X.36
set security-association lifetime seconds 28800
set transform-set rtpset
set pfs group5
match address IPSEC-LIST
!
!
!
!
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
no ip address
!
interface FastEthernet2
no ip address
!
interface FastEthernet3
switchport access vlan 2
no ip address
shutdown
!
interface FastEthernet4
description PRIMARY WAN - CONNECTS TO PRIMARY CABLE
ip address 65.X.X.6 255.255.255.0
ip nat outside
ip inspect FIREWALL out
ip virtual-reassembly in
duplex auto
speed auto
crypto map rtpset
!
interface wlan-ap0
description Service module interface to manage the embedded AP
ip unnumbered Vlan1
arp timeout 0
!
interface Wlan-GigabitEthernet0
description Internal switch interface connecting to the embedded AP
no ip address
!
interface Vlan1
description CONNECTS LAN
ip address 10.50.80.250 255.255.255.0
ip nat inside
ip virtual-reassembly in
ip tcp adjust-mss 1360
!
interface Vlan2
description BACKUP WAN - CONNECTS TO BACKUP
ip address 166.X.X.168 255.255.255.0
ip nat outside
ip inspect FIREWALL out
ip virtual-reassembly in
shutdown
crypto map rtpset
!
ip local policy route-map BACKUP_RMAP_1
ip forward-protocol nd
!
ip nat inside source route-map BACKUP-NAT-MAP interface Vlan2 overload
ip nat inside static source 10.50.80.21 65.X.X.216
ip nat inside source route-map PRIMARY-NAT-MAP interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 65.X.X.1 track 10
ip route 0.0.0.0 0.0.0.0 166.X.X.254 250
!
ip access-list extended IPSEC-LIST
permit ip 10.50.80.0 0.0.0.255 192.168.189.0 0.0.0.255
ip access-list extended NAT-LIST
deny ip 10.50.80.0 0.0.0.255 192.168.189.0 0.0.0.255
permit ip 10.50.80.0 0.0.0.255 any
!
ip sla 10
icmp-echo 4.2.2.2 source-interface FastEthernet4
frequency 15
ip sla schedule 10 life forever start-time now
access-list 101 permit icmp any host 4.2.2.2 echo
no cdp run
!
!
!
!
route-map BACKUP-NAT-MAP permit 10
match ip address NAT-LIST
match interface Vlan2
!
route-map BACKUP_RMAP_1 permit 1
match ip address 101
set ip next-hop 65.X.X.1
set interface Null0
!
route-map PRIMARY-NAT-MAP permit 10
match ip address NAT-LIST
match interface FastEthernet4
!
!
line con 0
logging synchronous
login local
line aux 0
line 2
no activation-character
no exec
transport preferred none
transport input all
line vty 0 4
privilege level 15
logging synchronous
login local
transport input telnet ssh
!
Solved! Go to Solution.
03-11-2012 10:33 AM
The reason for this behavious is because when this static NAT is in place, then this server traffic is getting NATted even when its being sent out on tunnel. You need to deny that, so use the following commands:
ip access-list extended exchange
deny ip host 10.50.80.21 192.168.189.0 0.0.0.255
permit ip host 10.50.80.21 any
route-map exchange
match ip address exchange
no ip nat inside static source 10.50.80.21 65.X.X.216
ip nat inside static source 10.50.80.21 65.X.X.216 route-map exchange
Using the above commands, NAT will only happen for exchange server only if the destination is anything else than 192.168.189.0/24 subnet
Hope it helps.
Neeraj
03-11-2012 10:33 AM
The reason for this behavious is because when this static NAT is in place, then this server traffic is getting NATted even when its being sent out on tunnel. You need to deny that, so use the following commands:
ip access-list extended exchange
deny ip host 10.50.80.21 192.168.189.0 0.0.0.255
permit ip host 10.50.80.21 any
route-map exchange
match ip address exchange
no ip nat inside static source 10.50.80.21 65.X.X.216
ip nat inside static source 10.50.80.21 65.X.X.216 route-map exchange
Using the above commands, NAT will only happen for exchange server only if the destination is anything else than 192.168.189.0/24 subnet
Hope it helps.
Neeraj
03-12-2012 08:20 AM
That was it, Neeraj.
Thanks.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide