02-25-2013 02:52 AM
Hi Folks,
I am trying to establish routing between two Site to Site vpn tunnels, both of which are terminating on the same outside interface of my Cisco ASA.
Please find attached Network Diagram for the same. All Firewalls used are Cisco ASA 5520.
Both VPN tunnels between Point A and Point B, Point B and Point C too are up. I have enabled Same security level intra interface permit command also.
How do i enable traffic originating from LAN Subnets behind Point A to reach LAN Subnets behind Point C without having to create a Seperate tunnel between Point A and Point C
Thanks a lot.
Solved! Go to Solution.
02-25-2013 11:21 PM
Hi,
Basically you would need to do NAT0 and VPN rules on each site to allow this traffic.
I think the configurations should look something like below. Naturally you will already probably have an existing NAT0 configuration and certainly the L2L VPN configuration
Site A
access-list NAT0 remark NAT0 rule for SiteA to SiteC traffic
access-list NAT0 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (inside) 0 access-list NAT0
access-list L2L-VPN-CRYPTO-SITEB remark Interesting traffic for SiteA to SiteC
access-list L2L-VPN-CRYPTO-SITEB permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
Where
Site B
access-list OUTSIDE-NAT0 remark NAT0 rule for SiteA to SiteC traffic
access-list OUTSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (outside) 0 access-list OUTSIDE-NAT0
access-list L2L-VPN-CRYPTO-SITEA remark Traffic for SiteA to SiteC through existing Tunnel between A-B
access-list L2L-VPN-CRYPTO-SITEA permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list L2L-VPN-CRYPTO-SITEC remark Traffic for SiteA to SiteC through existing Tunnel between B-C
access-list L2L-VPN-CRYPTO-SITEC permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
Where
Site C
access-list NAT0 remark NAT0 rule for SiteC to SiteA traffic
access-list NAT0 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
nat (inside) 0 access-list NAT0
access-list L2L-VPN-CRYPTO-SITEB remark Interesting traffic for SiteC to SiteA
access-list L2L-VPN-CRYPTO-SITEB permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
Where
To my understanding the above should handle the NAT0 and traffic selection for the L2L VPN connections. Naturally the ACL/Interface names can be different depending on your current setup.
Hopefully this helps
- Jouni
02-25-2013 03:19 AM
Hi,
Your attachment (for me atleast) keep showing up as being scanned for virus. I've seen this happen alot in the last couple of weeks. Seems also that the notification emails are not coming regularly.
But on to the actual subject
For the 2 spoke networks connect to the hub with L2L VPN to communicate you will have to
As I said, I cant see the picture so I am not sure if there is something else to consider.
- Jouni
02-25-2013 06:24 AM
What Problem in abouve topology you are facing
02-25-2013 10:50 PM
Hi JouniForss,
Thanks a lot for your detailed reply. Still have some doubts.
This is the Diagram. Now if my understanding is correct, then are you suggesting that i should add Subnets behind Firewall B and Firewall C in the interesting traffic ACL of Firewall A and should do the same for Interesting traffic for Firewall B And Firewall C also.
Any other commands that need to be added apart from this. I am not going to perform NAT.
02-25-2013 11:21 PM
Hi,
Basically you would need to do NAT0 and VPN rules on each site to allow this traffic.
I think the configurations should look something like below. Naturally you will already probably have an existing NAT0 configuration and certainly the L2L VPN configuration
Site A
access-list NAT0 remark NAT0 rule for SiteA to SiteC traffic
access-list NAT0 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (inside) 0 access-list NAT0
access-list L2L-VPN-CRYPTO-SITEB remark Interesting traffic for SiteA to SiteC
access-list L2L-VPN-CRYPTO-SITEB permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
Where
Site B
access-list OUTSIDE-NAT0 remark NAT0 rule for SiteA to SiteC traffic
access-list OUTSIDE-NAT0 permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
nat (outside) 0 access-list OUTSIDE-NAT0
access-list L2L-VPN-CRYPTO-SITEA remark Traffic for SiteA to SiteC through existing Tunnel between A-B
access-list L2L-VPN-CRYPTO-SITEA permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
access-list L2L-VPN-CRYPTO-SITEC remark Traffic for SiteA to SiteC through existing Tunnel between B-C
access-list L2L-VPN-CRYPTO-SITEC permit ip 192.168.1.0 255.255.255.0 192.168.3.0 255.255.255.0
Where
Site C
access-list NAT0 remark NAT0 rule for SiteC to SiteA traffic
access-list NAT0 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
nat (inside) 0 access-list NAT0
access-list L2L-VPN-CRYPTO-SITEB remark Interesting traffic for SiteC to SiteA
access-list L2L-VPN-CRYPTO-SITEB permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
Where
To my understanding the above should handle the NAT0 and traffic selection for the L2L VPN connections. Naturally the ACL/Interface names can be different depending on your current setup.
Hopefully this helps
- Jouni
06-18-2013 10:04 AM
Jouni,
Does Site B need another no-nat statement?
access-list OUTSIDE-NAT0 permit ip 192.168.3.0 255.255.255.0 192.168.1.0 255.255.255.0
08-28-2013 11:56 AM
We are trying to do the same thing. Our problem right now as we test is that one of the ASAs is 8.3 firmware, which is a little different. I did the configuration making allowances for the 8.3, but I cannot ping from Network A to a server in Network C. I am not sure if I missed something, but am still looking. Thought maybe something else had come to light and wanted to know if it worked for anyone else.
Thanks
Elvin Bashor
10-07-2014 09:56 AM
I tried adjusting the above configuration for an ASA running 9.1 and I couldn't get it working either.
Could someone be kind enough to post what the above config would look like under > 8.3 and the new NAT syntax?
Thanks
Greg
10-10-2014 09:57 AM
I was able to solve my own issue by rerunning the commands. For some reason they weren't taking. Here's a sample of the commands for SiteA:
nat (inside,outside) source static SiteA_Traffic SiteA_Traffic destination static SiteC_Traffic SiteC_Traffic no-proxy-arp route-lookup
access-list outside_cryptomap_4 extended permit ip object-group SiteA_Traffic object-group SiteC_Traffic
crypto map outside_map2 2 match address outside_cryptomap_4
crypto map outside_map2 2 set peer x.x.x.x
crypto map outside_map2 2 set ikev2 ipsec-proposal AES
I hope that helps someone.
05-01-2019 10:32 AM
Can you post the whole configs for all sites
I am trying to do this and cannot get it to work
01-04-2025 11:46 AM
Hi Greg, happy new year,
if so, could you share that config from the 3 sites.
regards,
Christian
01-14-2014 11:12 AM
I understand this is a very old post, but do you know if this worked for you? I am challenged with the exact same setup.
Thanks,
Juan Bravo
02-24-2014 09:45 PM
Hi Jouni,
Very nice explanation provided to user. Keep the good work going. I am converting this discussion to a document. Link for the same is mentioned below:
https://supportforums.cisco.com/docs/DOC-40454
Regards,
Anim Saxena
Community Manager
01-14-2014 08:28 PM
Thanks Jouni,
Actually i have been inactive on SupportForums for quite some time now. Yes the configs were spot on and boy did they work!!!
01-14-2014 08:31 PM
But as i realized a better option would be to go for a GRE over IPSEC Tunnel as that would give me additional options like QoS, VoIP and Multicast Traffic to be encapsulated within an IPSEC.
Of course its not related to my original post.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide