cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
561
Views
4
Helpful
8
Replies

VPN to ASA with a Private IP

Fraser Reid
Level 1
Level 1

Hello All,

I have an ISP that has given me a bunch of public IP's but my gateway is a private address.(point to point to the ISP Router).

I have attached this line to an ASA 5510.

What I want to do is

1) have the ASA with a Private IP on the Outside interface Using 1 Public IP as a VPN Server.

2) 1 Public IP as a Web Server and

3) the 3rd Public IP for surfing from the Inside Interface.

I have tried so far to get my first aim to work without success. I can't even get the ASA 5510 to reply to pings to any of the Public IP Addresses from the Outside that I have configured.

Is this at all possible ?

I have already configured something similar with a ASA 5510 that has a Public IP on the Outside interface - this made the job easy.

Please help.

Thanks

8 Replies 8

This helps loads with the Ping but - can you also help with the Public - Private IP VPN bit too ?

Once you've got the public IP assigned to the outside interface. Setting up the additional access should be pretty easy. All you need is a static statement and an ACL for inbound access to your webserver and you can use the outside interface of the firewall for outbound PAT.

This document should help:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml

Thanks Eddie - I will try this and let you know again in the morning - I am working in Germany . getting late here :-)

Sorry eddie - this didn't solve my main problem - everything else is gone now though.....here a little drawing with a few exaple IP's in it - maybe this makes more sense of what I am trying to do

So, you've got 12.12.12.1 assigned to the outside interface of your ASA?

Now all you need to do is configure a static and ACL to permit inbound access to your webserver:

static(inside,outside) 12.12.12.2 192.168.1.x netmask 255.255.255.255

access-list outside_in permit tcp any host 12.12.12.2 eq 80

access-group in interface outside

To allow outbound access from your internal clients (will use the outside IP address of the ASA for PAT) you need the following:

nat (inside) 1 0.0.0.0 0.0.0.0

global (outside) 1 interface

I won't go into configuring a remote access VPN here, but this document should guide you:

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008060f25c.shtml#cli

Eddie,

Configured on the outside interface I have 10.250.250.5

So how do I assign the 12.12.12.1 to the same interface so that I can have the ASA accept IPSec connections to this IP ?

This is what I do not understand.

I think you're only options here would be to set up a static NAT translation on your ISP router (12.12.12.1 -> 10.250.250.5)

(Not sure if this will work with VPN's though)

OR

Reconfigure the ASA to have 12.12.12.1 assigned to the outside interface.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: