Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 

How to configure the VPN tunnel on the VPN concentrator so that remote network cannot access any resources on local network

Core issue

To configure the VPN tunnel so as to block the remote network to access the local network after tunnel establishment, but the local network should have full access to the remote network.

Resolution

Complete these steps in order to achieve this task:

Local network: 192.168.10.0/24
Remote network: 192.168.20.0/24

  • NAT the entire Local Network to a single IP address for VPN tunnel. In this example 192.168.10.0/24 is seen by the remote network as a single IP address, for example, 192.168.30.1 mask 255.255.255.255.

  • Choose Configuration > Policy Management > Traffic Management > NAT > LAN-to-LAN Rules. Click Add, and in NAT Type, choose PAT.

  • Define the PAT rules:

    Source Network (Local Network): 192.168.10.0 Wildcard Mask: 0.0.0.255

    Translated Network (Fake IP): 192.168.30.1 Wildcard Mask: 0.0.0.0

    Remote Network (Remote Network): 192.168.20.0 Wildcard Mask:0.0.0.255


  • Click Add.

      Now the source of the tunnel is 192.168.30.1 and the destination is: 192.168.20.0/24

  • Choose Configuration > Tunneling and Security > IPSec > LAN-to-LAN.

  • Add a new LAN-to-LAN connection.

  • Enable it and in Connection Type, choose Originate only. Under Peer, type in the public IP address of the remote device.

    Local Network: IP Address: 192.168.30.1 Wildcard Mask: 0.0.0.0

    Remote Network: IP Address : 192.168.20.0 Wildcard Mask: 0.0.0.255

  • Make sure the remote network, in this example, 192.168.20.0/24, knows how to respond to the fake network PAT: 192.168.30.1.
Version history
Revision #:
1 of 1
Last update:
‎06-22-2009 04:45 PM
Updated by:
 
Labels (1)