I need to set up a site to site vpn between 2 ASA (1 5510 and a 5505). The 5505 internal network is also in use on the internal portion of the 5510 so I wanted to NAT the outbound traffic from Site A (5510) to Site B (5505) and vice versa. I was thinking of doing something along these lines:
To allow the traffic to flow through the tunnel when having the same addressing scheme on both ends, you should NAT the VPN traffic.
Site A LAN 10.0.0.0/24
Site B LAN 10.0.0.0.0/24
Site A config:
access-list NATtoSiteB permit ip 10.0.0.0 255.255.255.0 172.16.40.0 255.255.255.0
static (inside,outside) 172.16.45.0 access-list NATtoSiteB
access-list crypto permit ip 172.16.45.0 255.255.255.0 172.16.40.0 255.255.255.0
Site B config:
access-list NATtoSiteA permit ip 10.0.0.0 255.255.255.0 172.16.45.0 255.255.255.0
static (inside,outside) 172.16.40.0 access-list NATtoSiteA
access-list crypto permit ip 172.16.40.0 255.255.255.0 172.16.45.0 255.255.255.0
And then I would use the "crypto" acl for building the crypto map. Would that be the best approach?
This looks good, here is a document that you can use for reference:
*Please rate helpful posts*
Whatever you have made is correct. The concept behind this scenario is your crypto map acl should be between your NAT subnet to other site NAT subnet. Here you are making Site A nated to 172.16.45.0/24 to Site B Nated subnet 172.16.40.0/24.
Your nat cl should be from your real subnet to the NAted subnet @ the other site.
10.x.x.x to 172.16.40.0/24 - Site A
10.x.x.x to 172.16.45.0/24 - Site B
So present configuration fullfills that scenario. So it will work as it is.
Please do rate for the helpful posts.
Ok great. And to get to 10.0.0.100 in the remote site I would just use 172.16.45.100 correct? If only 1 side needed to be nat'ed would I basically do the same, just do the nating on 1 side and have my access for the crypto map on the other site reference the nated addresses?