cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1829
Views
0
Helpful
5
Replies

Ezvpn Remote, not allowed to NAT Exempt inside

stevjarbeck
Level 1
Level 1

I am a bit baffled as to why I am not allowed to have this NAT exemption rule in place while the EZVPN Remote is enabled.


Here is my topology:
Home Topology.jpg

I created a DHCP pool reservation based off of the MAC address of my laptop; this receives the reservation address.  I then created a NAT exemption to allow my laptop to communicate with 172.16.16.x network.  Below is the config:

access-list inside_nat0_outbound extended permit ip 172.16.16.0 255.255.255.0 host 172.16.17.175

global (inside) 1 interface
global (outside) 1 interface
global (guest) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1 0.0.0.0 0.0.0.0
nat (guest) 1 0.0.0.0 0.0.0.0

This works great, but I am unable to enable the EZVPN Remote that I have configured on the ASA.  Below is the error:

Result of the command: "vpnclient enable"

* Remove "nat (inside) 0 inside_nat0_outbound"

CONFIG CONFLICT: Configuration that would prevent successful Cisco Easy VPN Remote
operation has been detected, and is listed above. Please resolve the
above configuration conflict(s) and re-enable.

I am looking for two things an explanation as to why this is and why this is not allowed and help configuring a work around so that both can be enabled.  Any help would be appreciated.

Thanks,

Steve

1 Accepted Solution

Accepted Solutions

OK, makes sense now.

So NAT exemption is out of the game as per my post earlier (can't configure NAT exemption and Easy VPN remote on the same ASA).

Second option, i haven't tested this myself, so just my theory that you can test:

no nat-control

Since you don't have nat statement on your outside interface, it should allow you access.

Or third option, also never tested:

access-list static-nonat permit ip 172.16.16.0 255.255.255.0 172.16.17.0 255.255.255.0

static (inside,outside) 172.16.16.0 access-list static-nonat

Unfortunately there is limitation once the ASA is configured as Easy VPN remote as it is meant to be used just to access HQ site.

View solution in original post

5 Replies 5

Jennifer Halim
Cisco Employee
Cisco Employee

You do not have to configure and you can't configuire NAT exemption on Easy VPN remote as it is already automatically allowed when you enable

the ASA as an Easy VPN remote device. So it will exempt 172.16.16.0/24 from being NATed when accessing LAN behind Easy VPN server.

Here is a sample configuration that you can check out for Easy VPN remote on ASA:

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808a61f4.shtml

Hope that answers your question.

I'm sorry, I should have specified that the EZVPN Remote is connecting to a completely different network.  The

Topology map is how the devices are connected in my office.  From the LAN to WAN (Switch)-->(ASA)-->(871w)--Internet.  The ASA is configured in routed mode, the outside interface is 172.16.17.254, the inside interface is 172.16.16.254, the 871w is 172.16.17.1.  My laptop connects to the 871w, receives a DHCP reservation.  I modified my "outside" ACL to permit 172.16.17.175 to access 172.16.16.0/24.  I then had to create a NAT exemption to allow access from that IP address to the 172.16.16.x network.

OK, makes sense now.

So NAT exemption is out of the game as per my post earlier (can't configure NAT exemption and Easy VPN remote on the same ASA).

Second option, i haven't tested this myself, so just my theory that you can test:

no nat-control

Since you don't have nat statement on your outside interface, it should allow you access.

Or third option, also never tested:

access-list static-nonat permit ip 172.16.16.0 255.255.255.0 172.16.17.0 255.255.255.0

static (inside,outside) 172.16.16.0 access-list static-nonat

Unfortunately there is limitation once the ASA is configured as Easy VPN remote as it is meant to be used just to access HQ site.

OK I followed your advice and read up on "no nat-control"

I entered the command and seen via the ASDM I was receiving this error:

5    Mar 03 2011    11:11:48    305013    PC    3389            Asymmetric

NAT rules matched for forward and reverse flows; Connection for tcp src outside:PCx/49600

dst inside:Server/3389 denied due to NAT reverse path failure

I then enabled "nat-control" and added your third option.  I received the following errors.

Result of the command: "access-list static-nonat permit ip 172.16.16.0 255.255.255.0

172.16.17.0 255.255.255.0"

The command has been sent to the device


Result of the command: "static (inside,outside) 172.16.16.0 access-list static-nonat"

WARNING: real-address conflict with existing static
  UDP inside:PC/69 to outside:172.16.17.254/69 netmask 255.255.255.255
WARNING: real-address conflict with existing static
  TCP inside:Server/21 to outside:172.16.17.254/21 netmask 255.255.255.255
WARNING: real-address conflict with existing static
  TCP inside:Server/20 to outside:172.16.17.254/20 netmask 255.255.255.255
...

This did allow me to access the inside resources from my laptop.  Additionally, it allowed me to enable the VPN Client.

I then tested my other static entries, I was able to copy the running-config via tftp from a remote router.  The previous static entries don't seem affected by the static command. I also tested a few other services that I have static entries for and everything is working.  Whenever I add or remove a static entry I still receive a warning but beyond that it works.

I wonder what future problems if any I will have?

Also, would this issue be resolved if I upgraded to 8.4.1?

Thank you again for your help.

Steve

The warning messages are OK, as it just tells you that you have use the same internal ip for other static translation. But since you have configured ACL to have a more specific destination subnet, it will be no issue.

Typically easy vpn remote is not used in how you configure it at the moment, so it's a little bit of a funky setup.