06-01-2010 09:26 AM
We have one remote ipsec tunnel group, the clients' address pool use 172.18.33.0/24 which setup from "ip local pool" command. The remote cliens have to use full ipsec tunnel.
Due to ip overlap or route issue, we would like NAT this local pool from 172.18.33.0 to 192.168.3.0 subnet when vpn users access certain subnet or servers through ASA's outside interface. From what I understan the nat command mapping address from one interface to another interface. The vpn local pool doesn't behind any ASA physical interface. My question is can ASA setup policy NAT for vpn local pool. If yes, how to setup this NAT.
Thanks
Haiying
Solved! Go to Solution.
06-01-2010 04:55 PM
Haiying,
access-list NAT_VPNClients permit ip 172.18.33.0 255.255.255.0 10.1.1.0 255.255.255.0
static (outside,outside) 192.168.33.0 access-list NAT_VPNClients
The above configuration will NAT 172.18.33.0/24 to 192.168.33.0/24 when going to 10.1.1.0/24 (assuming 10.1.1.0/24 is your servers subnet).
To allow the ASA to redirect traffic backout the same interface in which it receive it you also need the command:
same-security-traffic permit intra-interface
Federico.
06-01-2010 12:40 PM
Hi,
So the VPN clients will receive an IP from 172.18.33.0/24 but you want to NAT it to 192.168.3.0/24 correct?
Just a question...
Why don't just remove the pool and re-add it with the new range that you want to use?
Federico.
06-01-2010 01:55 PM
Federico
Thanks for your reply!
Yes, we want 172.18.33.0 nat to 192.168.3.0 when vpn clients access certain servers through asa outside interface. I am not sure if policy NAT can do this for vpn local pool.
Due to complicated routing and other reason, we can't remove 172.18.33.0 ip range from vpn local pool.
Haiying
06-01-2010 04:55 PM
Haiying,
access-list NAT_VPNClients permit ip 172.18.33.0 255.255.255.0 10.1.1.0 255.255.255.0
static (outside,outside) 192.168.33.0 access-list NAT_VPNClients
The above configuration will NAT 172.18.33.0/24 to 192.168.33.0/24 when going to 10.1.1.0/24 (assuming 10.1.1.0/24 is your servers subnet).
To allow the ASA to redirect traffic backout the same interface in which it receive it you also need the command:
same-security-traffic permit intra-interface
Federico.
06-02-2010 08:26 AM
Federico;
I just did test with these static command. It works perfect as we want.
Thanks very much for your help!
Haiying
06-02-2010 08:34 AM
Haiying,
I'm very glad to hear that is working.
If you find the threat helpful please rate it and mark it as answered for future searches.
Cheers,
Federico.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: