cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1017
Views
0
Helpful
4
Replies

VPN client pool NAT

Riju Kalarickal
Level 1
Level 1

OS - 8.3

vpn client pool - 10.10.10.0\24

Remote network across L2L - 20.20.20.0/24

The remote network (20.20.20.0/24) accepts traffic only from 30.30.30.0/24

I cannot use 30.30.30.0/24 as my dhcp pool because it is too small and I have a much wider userbase.

How do I do the translation to accomplish this?

4 Replies 4

Vikas Saxena
Cisco Employee
Cisco Employee

Go through this and modify your configuration as needed.

https://supportforums.cisco.com/docs/DOC-11640

I have already seen this. There is no translation required in the example shown whereas I need NAT translation.

I want vpn client pool (10.10.10.0/24) to translate to accepted IP by remote ASA (30.30.30.30/32) and no-nat tunnel to Remote ASA L2L(20.20.20.0/24)

I am stuck here. any idea how to achieve this?

Hi,

The commands would be as below:


object net POOL

network 10.10.10.0 255.255.255.0

object net REM_L2L

network 20.20.20.0 255.255.255.0

object host NAT_IP

host 30.30.30.30

nat (outside,outside) source dynamic POOL NAT_IP destination static REM_L2L REM_L2L

this should NAT your VPN clients to 30.30.30.30 when accessing the remote L2L. I am assuming you have all the U-turning commands already in place based on the above document. Please note that the crypto ACL in this case would be:

Local ASA:

from 30.30.30.30 to 20.20.20.20/24

On remote end:

from 20.20.20.0/24 to 30.30.30.30.

On the split tunnel ACL for VPN client (if there is one), ensure to add the network 20.20.20.0/24.

Let me know how it goes!!

Cheers,

prapanch

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: