09-23-2010 02:19 AM - edited 02-21-2020 04:52 PM
Hello guys
I've been trying to get VPN to work for a specific scenario where I need to do NAT for the VPN traffic to avoid subnet overlapping.
I've found several guides on cisco.com, but all of those that I've found does not allow for (or show how) NAT overload (for internet traffic), which I need for my setup.
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a00800b07ed.shtml
http://www.cisco.com/en/US/products/ps5855/products_configuration_example09186a0080a0ece4.shtml
I basically need to know how the configuration looks like when you do static NAT through a VPN tunnel as well as provide internet connectivity using NAT in the same router?
I've attached a drawing that should better explain my needs.
Does anyone have know of a guide that show how to do this?
Best regards
Jesper
Solved! Go to Solution.
09-23-2010 04:43 AM
You can use static policy NAT to NAT those traffic:
access-list 101 permit ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255
access-list 102 deny ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255
access-list 102 permit ip 10.0.0.0 0.0.0.255 any
route-map policy-NAT permit 10
match ip address 101
route-map internet-NAT permit 10
match ip address 102
ip nat inside source static network 10.0.0.0 10.30.10.0 /24 route-map policy-NAT
ip nat inside source route-map internet-NAT interface
Hope that helps.
09-23-2010 02:42 AM
Hello
This is my test config for my lab I can vpn from outside into network but cannot access internet after vpn, must activate spit tunnel
Hope this helps
!
hostname Inernet
!
boot-start-marker
boot-end-marker
!
!
aaa new-model
!
!
aaa authentication login default group tacacs+ local
aaa authentication login xauthen group tacacs+ local
aaa authorization network groupauthor local
!
aaa session-id common
clock timezone Harare 2
ip cef
!
!
ip auth-proxy max-nodata-conns 3
ip admission max-nodata-conns 3
!
!
!
!
!
quit
username xxx privilege 15 password 7 xxxxx
!
!
!
no crypto xauth FastEthernet0
!
crypto isakmp policy 5
encr aes 256
authentication pre-share
group 2
!
crypto isakmp client configuration group test
key cisco123
dns 10.10.100.10
domain xxxxxx
pool vpnpool
netmask 255.255.255.0
!
!
crypto ipsec transform-set myset esp-aes 256 esp-sha-hmac
!
crypto dynamic-map dynmap 5
set transform-set myset
!
!
crypto map test client authentication list xauthen
crypto map test isakmp authorization list groupauthor
crypto map test client configuration address respond
crypto map test 10 ipsec-isakmp dynamic dynmap
!
!
!
interface Loopback0
no ip address
!
interface Loopback1
ip address xxxxxx 255.255.255.248
!
interface Ethernet0
ip address xxxxxx 255.255.255.240
ip helper-address 168.210.2.2
ip nat outside
ip virtual-reassembly
full-duplex
crypto map test
!
interface FastEthernet0
ip address xxxxxx 255.255.255.252
ip nat inside
ip virtual-reassembly
speed auto
!
router eigrp 500
redistribute connected
redistribute static
passive-interface Ethernet0
network 10.30.100.0 0.0.0.3
network 10.60.100.0 0.0.0.7
no auto-summary
!
ip local pool vpnpool 10.60.100.10 10.60.100.20
ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 196.33.38.65
!
ip http server
ip http authentication local
ip http secure-server
ip nat inside source route-map vpn clients interface Ethernet0 overload
ip tacacs source-interface Loopback0
!
access-list 101 remark vpn clients=16
access-list 101 deny ip any host 10.60.100.10
access-list 101 deny ip any host 10.60.100.11
access-list 101 deny ip any host 10.60.100.12
access-list 101 deny ip any host 10.60.100.13
access-list 101 deny ip any host 10.60.100.14
access-list 101 deny ip any host 10.60.100.15
access-list 101 deny ip any host 10.60.100.16
access-list 101 deny ip any host 10.60.100.17
access-list 101 deny ip any host 10.60.100.18
access-list 101 deny ip any host 10.60.100.19
access-list 101 deny ip any host 10.60.100.20
access-list 101 permit ip 10.0.0.0 0.255.255.255 any
route-map vpn clients permit 1
match ip address 101
!
tacacs-server host 10.10.100.30 key 7 141A06070D06
!
control-plane
!
!
line con 0
line aux 0
line vty 0 4
login authentication xauthen
transport input telnet
!
09-23-2010 04:29 AM
Hi Theo
Thank you for your reply. Unfortunately it's not what I'm seeking. I'm seeking information on how to NAT through a LAN-to-LAN VPN connection - not a remote access VPN, as you're using.
But thanks for taking the time to reply
Best regards,
Jesper
09-23-2010 04:43 AM
You can use static policy NAT to NAT those traffic:
access-list 101 permit ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255
access-list 102 deny ip 10.0.0.0 0.0.0.255 10.30.10.0 0.0.0.0.255
access-list 102 permit ip 10.0.0.0 0.0.0.255 any
route-map policy-NAT permit 10
match ip address 101
route-map internet-NAT permit 10
match ip address 102
ip nat inside source static network 10.0.0.0 10.30.10.0 /24 route-map policy-NAT
ip nat inside source route-map internet-NAT interface
Hope that helps.
09-23-2010 06:14 AM
Hi halijenn
Ahh yes, of course. Still learning
I'm already in the process of trying it out, however i'm struggling with getting the router (ISR1812) to accept the command:
ip nat inside source static network 10.0.0.0 10.30.10.0 /24 route-map policy-NAT
It won't accept the route-map statement - could this be due to software or is it a hardware limitation?
The router is running:
Cisco IOS Software, C181X Software (C181X-ADVIPSERVICESK9-M), Version 12.4(20)T, RELEASE SOFTWARE (fc3)
----
SiteA(config)#ip nat inside source static network 10.0.0.0 10.30.10.0 /24 ?
extendable Extend this translation when used
mapping-id Associate a mapping id to this mapping
no-alias Do not create an alias for the global address
no-payload No translation of embedded address/port in the payload
redundancy NAT redundancy operation
vrf Specify vrf
Thx
09-23-2010 06:41 AM
Sorry to disappoint, but seems that the route-map option is only available for one to one static NAT:
ip nat inside source static 10.0.0.1 10.30.10.1 route-map policy-NAT
An option is to configure 254 lines of NAT statements with the route-map to cover the /24 subnet.
Sorry, didn't have any better way.
09-24-2010 02:18 AM
Hello again Halijenn
Ah yes, I can use that for now as it is only temporary.
Lets hope Cisco implements such a feature in the future
Thanks for all your help.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide