04-20-2023 12:58 AM
Hello,
I have a problem with VPN communication from another end, they do not reach my local network in any way, I can reach the remote network at the other end. the VPN is up, can someone give me a hand.
thank you very much
04-20-2023 01:16 AM
@oelagy do you have the correct Access Control rules to allow the remote network to communicate with your network? Provide screenshots of your configuration.
Run packet-tracer from the CLI to simulate the traffic flow and provide the output for review.
I assume you already have NAT exemption rules in place to ensure the traffic is not unintentially translated.
04-20-2023 01:38 AM
04-20-2023 01:47 AM
@oelagy the problem appears to be NAT, traffic is matching the dynamic NAT rule and being translated behind the FTD's outside interface.
Your NAT rules #1 and #2 should be disabled/deleted and recreated as Auto NAT rules.
I assume NAT rules #3 and #4 are correct.
Once the new Auto NAT rules (natting used for internet access) are created they will be processed after the Manual NAT rules, so VPN traffic would match the Manual NAT rules and not translated. All other traffic not matching the Manual NAT rules would subsequently match the Auto NAT rules.
04-20-2023 02:22 AM
Hi,
I have disabled rule no. 1 and no. 2, on the other hand the rules that I have created by nate work correctly, from my network to the other end I reach all the hosts correctly
nat (inside_2,outside) source static |s2sAclSrcNwgV4|69b97ff6-cecf-11ed-8541-e3fc0f181972 |s2sAclSrcNwgV4|69b97ff6-cecf-11ed-8541-e3fc0f181972 destination static |s2sAclDestNwgV4|69b97ff6-cecf-11ed-8541-e3fc0f181972 |s2sAclDestNwgV4|69b97ff6-cecf-11ed-8541-e3fc0f181972 no-proxy-arp route-lookup
nat (inside_2,outside) source static |s2sAclSrcNwgV4|481533f2-cf91-11ed-8541-4bca6c5a3746 |s2sAclSrcNwgV4|481533f2-cf91-11ed-8541-4bca6c5a3746 destination static |s2sAclDestNwgV4|481533f2-cf91-11ed-8541-4bca6c5a3746 |s2sAclDestNwgV4|481533f2-cf91-11ed-8541-4bca6c5a3746 no-proxy-arp route-lookup
nat (inside_2,outside) source static |s2sAclSrcNwgV4|c8e6567b-d37b-11ed-8541-017d7fee41c6 |s2sAclSrcNwgV4|c8e6567b-d37b-11ed-8541-017d7fee41c6 destination static |s2sAclDestNwgV4|c8e6567b-d37b-11ed-8541-017d7fee41c6 |s2sAclDestNwgV4|c8e6567b-d37b-11ed-8541-017d7fee41c6 no-proxy-arp route-lookup
nat (inside_4,outside) source dynamic any-ipv4 interface inactive
nat (inside_3,outside) source dynamic any-ipv4 interface inactive
nat (inside_2,outside) source static local_net local_net_nat_telrad destination static remote_net_telrad remote_net_telrad
nat (inside_2,outside) source static local_net local_net_nat_ingesa destination static remote_net_ingesa remote_net_ingesa
!
object network any-ipv4
nat (inside_2,outside) dynamic interface
When you mean to create a new rule, do I have to create it for Inside2 ?
Thank you
04-20-2023 02:30 AM - edited 04-20-2023 02:30 AM
below is need after inactive the NAT dynamic
object network any-ipv4
nat (inside_3,outside) dynamic interface
object network any-ipv4
nat (inside_4,outside) dynamic interface
04-20-2023 02:42 AM - edited 04-20-2023 02:51 AM
@oelagy this is an example of a NAT Exemption rule, which is a Manual NAT rule, this ensures VPN traffic is not translated. This NAT rule is above the Auto NAT rule, which is used for internet access.
You need to create these rules to match your environment, for as many interfaces as you have.
04-20-2023 02:58 AM
I have created this rule, attached capture
04-20-2023 03:01 AM
@oelagy ok, that looks like it should work for networks behind interface inside_2, did you test this?
You'd need to replicate the rules for the other inside interfaces (if required).
04-20-2023 03:18 AM
Probamos y no funciona, no se me eestoy explicando yo puedo acceder a todas los host que tengo en otros extremos del tunel , pero desde otro extremo no pueden acceder, ni tienen comunicacion .
he probado montando otro equipo igual de la misma carcateristicas Firepower1010 y en este caso ni puedo enviar ping ni tampoco recibo en ambos exteremos
04-20-2023 03:28 AM - edited 04-20-2023 03:56 AM
I see your early post you already config it ACL for INbound
04-20-2023 02:38 AM
yes correct for dynamic NAT I have configured inside_2
object network any-ipv4
nat (inside_2,outside) dynamic interface
interface Ethernet1/2
nameif inside_2
cts manual
propagate sgt preserve-untag
policy static sgt disabled trusted
security-level 0
ip address 192.100.9.1 255.255.255.0
04-20-2023 02:53 AM - edited 04-20-2023 03:28 AM
again check this POINT please
you have thee IN interface
INside_2
INside_3
INside_4
the INside_2 have VPN so it need two NAT (static& dynamic) if you want host also to reach internet
INside_3/INside_4 need dynamic NAT only since it dont have VPN
04-20-2023 03:25 AM
I correctly reach another host that is at the other end of the tunnel, the problem is that the other end does not communicate with my network in any way.
the VPN is up and working correctly
04-20-2023 03:28 AM
@oelagy have you tried again since changing the NAT rules? Because in your packet-tracer output we can determine it was unintentially translated behind the outside interface.
object network any-ipv4
nat (inside_2,outside) dynamic interface
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide