I am seeking some clarification on the correct NAT configuration for l2l tunnel.
We have an FTP server that users access direct through outside interface and then a VPN l2l tunnel that also terminates on the outside interface and tunneled traffic/users accesses the same FTP server.
Pre 8.3
Scenario: Two 5520 ASA running L2L tunnel. Host side has a private IP server using a static one-to-one NAT so that non tunneled traffic can reach it (FTP server).
*****8.2 one-to-one static******
static (DMZ,outside) <Public IP> 192.168.10.1 netmask 255.255.255.255
*****8.2******
Then for the tunneled traffic we use the nat exempt statement with an access list:
*****8.2 NAT exempt******
access-list no_nat extended permit ip host <Public IP> host <Remote Server IP>
nat (DMZ) 0 access-list no_nat
*****8.2******
After 8.3+ migration the tunnel is broken because the NAT statements did not migrate cleanly. The question I have is that every example that I have seen for l2l tunnel uses NAT exempt via access list and then uses a nat statement post 8.3 (see below):
*****8.3+ version of nat exempt*****
nat (DMZ,any) source static obj-192.168.0.1 obj-<PUBLIC IP> destination static obj-<REMOTE IP> obj-<REMOTE IP> no-proxy-arp route-lookup
*************
*****8.3+ static NAT*****
object network obj-192.168.0.1
nat (DMZ,outside) static <PUBLIC IP>
*****8.3+ static NAT*****
What I have found is that since we are using a static one-to-one statement to allow non-tunnel traffic to FTP server, it seems that the nat exempt statement statements are no longer needed and the tunnel still works.
Can anyone clarify this for me? For 8.3+ which NAT is the correct one to use in this scenario?