09-25-2013 08:25 AM
Hello
I am looking for correct syntax to add a 1-to-1 NAT rule on my firewall VPN policy for a test ping connection to a server IP address in the remote data center network.
My local ip is loopback1 192.168.255.1
The remote server ip is 192.168.1.100
Which IP is added to the VPN policy?
Solved! Go to Solution.
09-30-2013 07:45 AM
Steve,
For version 8.2(3), a static NAT (1 to 1) would be the following.
static (inside,outside) 209.165.xxx.xxx 192.168.1.100 netmask 255.255.255.255
09-26-2013 06:56 AM
Can anyone provide some specific guidance on syntax and/or ASDM gui for this request?
09-26-2013 07:22 AM
Hi,
I dont think I know how the setup actually is.
Since you now mentioned ASDM I assume that you are using an ASA/PIX firewall. Though in the original post you mentiond loopback1 which is not something an ASA/PIX would have.
Also generally traffic incoming from VPN connection are allowed access to the actual internal IP address and there usually is no need for Static NAT.
Also if you are actually looking to configure Static NAT then the firewall software level might play a part in what the NAT configuration format is. There was a major change in the configuration format between 8.2 and 8.3 software versions.
- Jouni
09-26-2013 09:33 AM
JouniForss
Thank you for the reply
This is an ASA5520.
My goal is to create a rule in my VPN tunnel to my data center to test a fail over option
This loopback ip will be statically natted to a server ip address that I currently have at a remote data center.
When I ping the ip, the tunnel should come up.
My loopback ip is 192.168.255.1
The Server ip is 192.168.1.100
These servers are used for SAP applications
I have specific ranges of ports on my router QoS t oassure bandwidth for those apps
Will I need tpo specify those same port ranges in the VPN tunnel policy?
09-27-2013 10:39 AM
Can anyone verify this syntax?
Does this syntax look correct to accomplish the 1-1 nat on the ASA required to make this work?
object network My_VPNTest
host 192.168.255.1 (looback1)
nat (inside,outside) static 192.168.1.100
09-27-2013 06:48 PM
What iOS verison?
09-30-2013 07:13 AM
Rashid
Thank you for the reply
Cisco Adaptive Security Appliance Software Version 8.2(3)
Device Manager Version 6.3(3)
09-30-2013 07:45 AM
Steve,
For version 8.2(3), a static NAT (1 to 1) would be the following.
static (inside,outside) 209.165.xxx.xxx 192.168.1.100 netmask 255.255.255.255
09-30-2013 08:26 AM
Rashid
Thank you for your guidance.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide