cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
721
Views
0
Helpful
4
Replies

ASA - VPN site to site with NAT

acleri
Level 1
Level 1

Hi,

we have 2 building connected with a bridge wireless that transport different vlans.

We need now to dismiss this bridge and we will connect this networks through ipsec vpn site to site.

We don't want to change the ip addresses so I'm wondering if it's possible to apply a nat before encrypt the traffic for each vlan?

Is it possible?

ac

1 Accepted Solution

Accepted Solutions

Yes, definitely can.

Couldn't find a sample configuration that NAT both ends, but here is example for your reference:

Site A LAN: 192.168.1.0/24 --> NAT to 192.168.20.0/24

Site B LAN: 192.168.1.0/24 --> NAT to 192.168.40.0/24

Site A ASA:

static (inside,outside) 192.168.20.0 192.168.1.0 netmask 255.255.255.0

Crypto ACL:

access-list cryptoAB permit ip 192.168.20.0 255.255.255.0 192.168.40.0 255.255.255.0

Site B ASA:

static (inside,outside) 192.168.40.0 192.168.1.0 netmask 255.255.255.0

Crypto ACL:

access-list cryptoAB permit ip 192.168.40.0 255.255.255.0 192.168.20.0 255.255.255.0

Hope that helps.

View solution in original post

4 Replies 4

Jennifer Halim
Cisco Employee
Cisco Employee

Yes, you can definitely configure NAT prior to encryption, and the crypto ACL should match the NATed subnet.

Hope that answers your question.

So I can configure the internal interface as a trunk to terminate all the vlan, define NAT for each vlan, and define the crypto acl on the natted address.

This is possible also with the small asa5505?

Where can I find some usefull configuration information?

Thank you.

Yes, definitely can.

Couldn't find a sample configuration that NAT both ends, but here is example for your reference:

Site A LAN: 192.168.1.0/24 --> NAT to 192.168.20.0/24

Site B LAN: 192.168.1.0/24 --> NAT to 192.168.40.0/24

Site A ASA:

static (inside,outside) 192.168.20.0 192.168.1.0 netmask 255.255.255.0

Crypto ACL:

access-list cryptoAB permit ip 192.168.20.0 255.255.255.0 192.168.40.0 255.255.255.0

Site B ASA:

static (inside,outside) 192.168.40.0 192.168.1.0 netmask 255.255.255.0

Crypto ACL:

access-list cryptoAB permit ip 192.168.40.0 255.255.255.0 192.168.20.0 255.255.255.0

Hope that helps.

OK, that's clear.

Thank you halijenn!!!

Regards.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: