07-23-2012 02:01 PM
Hey there,
For some reason i cannot get this to work on the router. errrr.....
I am trying to config a static nat (many to one), that will take in effect only when traffic needs to go over our vpn tunnel to the remote location.
expample:
local Internal network 192.168.0.0
remote network: 10.10.10.0 and 10.10.15.0
when traffic goes over the vpn tunnel - to the remote site, i need to translate my internal network (192.168.0.0) to a static ip address of 172.16.32.65
any ideas???
also on my crypto map ACL, what should be specified for interesting traffic?? my local network or the wanted static ip address?
Let me know your thought in the matter.
Regards,
R.
Solved! Go to Solution.
07-23-2012 03:16 PM
The NAT you are describing is named PAT or overloading, at least in Ciscos words ...
What you need:
1) A NAT-ACL where you describe your traffic that should be natted.
2) A nat-pool with your address 172.16.32.65
3) A NAT-statement for inside dynamic NAT based on the ACL to the pool
Here are some examples:
Your crypto ACL then referes to the NATted IP as NAT happens before encryption.
07-23-2012 03:16 PM
The NAT you are describing is named PAT or overloading, at least in Ciscos words ...
What you need:
1) A NAT-ACL where you describe your traffic that should be natted.
2) A nat-pool with your address 172.16.32.65
3) A NAT-statement for inside dynamic NAT based on the ACL to the pool
Here are some examples:
Your crypto ACL then referes to the NATted IP as NAT happens before encryption.
07-23-2012 04:12 PM
Beautifull, that did the trick.
Thanks you for the tips
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide