01-06-2023 06:54 AM
Hello.
I am new to ASA OS configuration. I am troubleshooting the failing code below...
#object network VENDOR1
#host 1.1.1.1
#object-group network VPN-Vendor-IP
#network-object object VENDOR1
#access-list Split-Tunnel extended permit ip host 1.1.1.1 object VPN-Pool
... My goal with this code is for the erected split tunnel to include 1.1.1.1 within the tunnel, so that Anyconnect clients can communicate with the server at 1.1.1.1 . I expect I need a NAT statement.
1. What is the code of NAT statement I need?
2. Why do I need this NAT statement / What is the logic within this NAT statement?
Thank you!
Solved! Go to Solution.
01-10-2023 05:56 AM
@MicJameson1 this is an example of a NAT exemption rule. Traffic between OBJECT-1 and OBJECT-2 is translated to itself, in other words the original source and original destination IP addresses are maintained.
Without this NAT rule traffic from a network within OBJECT-1 on the inside interface destined to OBJECT-2 network might be translated to the outside interface IP address if another dynamic (auto) NAT rule existed.
01-10-2023 06:37 AM - edited 01-10-2023 06:42 AM
@MicJameson1 bear this in mind - "nat (inside interface, outside interface) source static ORIGINAL-SRC TRANSLATED-SRC destination static ORIGINAL-DST TRANSLATED-DST".
So no you'd never use "nat (Inside, Outside) source static OBJECT-1 OBJECT-2 destination static OBJECT-1 OBJECT-2" as that would translate OBJECT-1 as the original source to OBJECT-2 as the translated source.
The ASA doesn't allow you to configure - "nat (Inside, Outside) source static OBJECT-1 destination static OBJECT-2"
It would expect the translated source and translated destination.
01-06-2023 07:24 AM
@MicJameson1 obviously 1.1.1.1 is not the real IP address. Is the real IP address a host inside the network or is it on the internet, so the RAVPN user is tunnelled back to the ASA and hairpin? You'd probably need a NAT exemption rule.
01-06-2023 07:44 AM
1.1.1.1 is a public IP address of the vendor.
Thank you.
01-06-2023 07:59 AM
@MicJameson1 so it's routed back out the outside interface?
Therefore you need the NAT rule as per your post yesterday...
object network VPN-Pool
nat (Outside,Outside) dynamic interface
And to allow the traffic to hairpin (ingress/egress out the same interface) use the following command (if not already configured) - same-security-traffic permit intra-interface
01-06-2023 08:07 AM
"same-security-traffic permit intra-interface"
Where do I place this command?
Thank you Rob!
01-06-2023 08:12 AM - edited 01-06-2023 08:12 AM
@MicJameson1 its a global CLI command, just copy and paste.
01-06-2023 08:14 AM
Thank you Rob!
I must execute this after hours. I will reply with an update.
01-06-2023 11:39 AM
Do I need the below NAT statement as well?
#nat (Inside,Outside) source static VPN-Vendor-IP VPN-Vendor-IP destination static VPN-Pool VPN-Pool
Thank you.
01-06-2023 11:42 AM
@MicJameson1 possibly not, it depends where is this vendor connected to, the inside or outside interface? When you said public IP address, I assumed it would reside on the outside interface. Hence the I suggested the first NAT rule.
01-06-2023 11:45 AM
This is an outside public IP address. After hours, I will try with and without, whichever yields success.
Thank you.
01-06-2023 11:51 AM
@MicJameson1 if the destination is definately outside then - "nat (Inside,Outside) source static VPN-Vendor-IP VPN-Vendor-IP destination static VPN-Pool VPN-Pool" is not going to apply (in this scenario), because the source interface in this rule is "inside" but traffic from anyconnect users will always be sourced on the outside.
It depends on the other networks in the group "VPN-Vendor-IP" whether the NAT rule it is required or not. From the CLI run "show nat detail" and check to see if traffic has been translated/untranslated on this NAT rule, which would indicate whether it's in use or not.
01-06-2023 12:00 PM
This new config with VENDOR1 and 1.1.1.1 is not in the current config. The other details are already in the config.
"show nat detail" reveals 29 Manual NAT, and 32 Auto NAT
What concerns me is that, without a new NAT statement, the existing config was already tried and it didn't work.
01-06-2023 12:05 PM
@MicJameson1 well like I said the existing rule would not work when accessing 1.1.1.1 from an anyconnect user.
01-06-2023 12:21 PM - edited 01-06-2023 12:23 PM
I found a strong hint:
Within the config, there exists a maximally similar instance of code with a different IP address ( I don't know the details of that IP address, but it is a public address. It shows evidence of being translated with "nat (Inside,Outside) source static VPN-Vendor-IP VPN-Vendor-IP destination static VPN-Pool VPN-Pool"
But that code is already in the config. Is there anything else I should try here?
01-06-2023 12:24 PM - edited 01-06-2023 12:27 PM
@MicJameson1 but where does this other IP address reside, on the inside interface or the outside? If it's on the inside, then yes it makes sense. If the source is not from the "inside" interface it won't match that NAT rule.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide