cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
898
Views
5
Helpful
10
Replies

IPSec and NAT on an ASA

liv2bldcisco
Level 1
Level 1

I have been trying real hard to figure this out but now I am wondering if it is possible at all. We have a customer who wants to setup an IPSec vpn tunnel with them to securely transfer files. The configuration is below

Customer's

server

| CheckPoint

FW (Tunnel endpoint)

|

Internet

|

ASA (Tunnel endpoint)-----Server (Private IP)

The tunnel is created fine but I can't pass any traffic to them and my

suspicion is that it is due to NAT. We are NATing the private IP from

our server to a public IP (static NAT) , but the customer only will

allow public IPs for our encryption domain, not the private IP that is

actually in use. At the heart of this I believe this to be a routing

problem (the customer's server doesn't know how to get back to our

network and/or if it does come back, it isn't getting back to the

correct private IP. I have tried exempting this traffic from NAT policies but can't seem to get any farther in having traffic flow.

So my basic question here is: is this possible to do with this

setup through the ASA and if so how?

Thanks for your input,

Ted

10 Replies 10

andrew.prince
Level 10
Level 10

Ted,

Sounds to me like a classic case of policy based NAT for your IPSEC tunnel. As you pointed out, can be tricky and both sides need to understand what they need to do.

What you want to do - from the point of the ASA is possible, and from the Checkpoint side also. Happy to help with the config of the ASA, post it and lets see where we can improve it.

HTH>

Thanks for the reply. Attached is my cfg for the ASA.

Thanks,

ted

I found this documentation on Cisco's site

(http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/

products_configuration_example09186a00808c9950.shtml) which best

depicts my situation and found out that I indeed was configuring it

like this already but it still doesn't work. As I have some example to

go by, I have contacted the other company in an effort to try and see

if they can see any traffic trying to go across the tunnel. Having so many different variables and not being in control of

the other side of the tunnel is making me a bit crazy. The other

company gave me an IP to ftp to through the tunnel for test, but I am

now even questioning if that is right, as that too would explain why

the traffic isn't going across.

Thanks,

Ted

I am familiar with both Checkpoint and ASA.

Can you repost your ASA configuration so

that I may be able to help you.

The configuration on the Checkpoint side

is very straight forward. The checkpoint

only needs to know the Public IP addresses

of the NAT'ed private network on your end

so that when it creates an Interoperable

Device, it includes that in the remote

encryption domain. Post your config and

I may be able to help you.

Thanks for the help. Attached is the config for the ASA.

Thanks,

Ted

Looking at your configuration, I am assuming this:

1- access-list policy-nat extended permit ip host 10.10.12.39 19.0.0.0 255.0.0.0

static (delta,outside) 68.72.236.39 access-list policy-nat

access-list outside_cryptomap_20 extended permit ip host 68.72.236.39 19.0.0.0 255.0.0.0

access-list outside_cryptomap_20 extended permit tcp host 68.72.236.39 19.0.0.0 255.0.0.0

access-list outside_cryptomap_20 extended permit udp host 68.72.236.39 19.0.0.0 255.0.0.0

access-list outside_cryptomap_20 extended permit icmp host 68.72.236.39 19.0.0.0 255.0.0.0

2- the network behind the CP side is 19.0.0.0/8,

3- VPN traffics will be from host 68.72.236.39 going to 19.0.0.0/8

Here is the solution:

1- on the Checkpoint side, the local encryption domain will be 19.0.0.0/8. This network will go under the Checkpoint,

2- create an Interoperable device for the

ASA, and put host 68.72.236.39 in the ASA

encryption domain,

3- create a VPN community, make sure you

disable NAT inside VPN community. This

is important because the CP knows nothing

about NAT on your end. CP only knows

about the host 68.72.236.39 network,

4- run tcpdump and "debug vpn ikeon" and

look at the debug information.

Your configuration looks ok.

Thanks a bunch for looking this over and sharing your knowledge with regard to the checkpoint cfg. You are correct in all your assumptions from my ASA cfg.I know for a fact that they set the encryption domain on the checkpoint side to 68.72.236.0/24. Could this be where the problem comes from since the tunnel endpoint is listed as being a part of the encryption domain on the checkpoint?

Thanks,

Ted

Please only put host 68.72.236.39 under

Checkpoint local encryption domain. You

must NOT put the whole /24 under the

Checkpoint local encryption domain. That

explained why you has the issue, IMHO.

Furthermore, please select "exchange key

per hosts" under the CP VPN community,

if you use VPN simplified mode.

Let me know if you still have issues.

Thanks again for your insight. I have made the request to have the encryption domain changed but that will most likely take a couple days before they get it done. I will post back the result.

Thanks,

Ted

They finally made the change to the encryption domain to the one ip address and I can successfully pass traffic through. Thanks again for all the help.

Thanks,

Ted

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: