In your nat acl you need to deny your VPN traffic before you allow the subnet to any. Just put all the deny statements before the permit statements.Sent from Cisco Technical Support iPhone App
Make sure your not NATing the RA IP's. the reason is the traffic leaves the firewall to get to the other IP. If you don't have a no-nat rule it will be NATed as it go's out the fire wall to the other person.Sent from Cisco Technical Support iPhone Ap...
Make sure your are NATing as you go out to the other side. If you post a copy of your config ill help you out.Sent from Cisco Technical Support iPhone App
This should help you out:global (outside) 1 interfacenat (inside) 1 0.0.0.0 0.0.0.0access-list inside_nat0_outbound extended permit ip 10.79.1.0 255.255.255.0 x.x.x.x 255.255.255.0access-list outside_1_cryptomap extended permit ip 10.79.1.0 255.255....