We help IT Professionals succeed at work.

SIte to Site vpn w/ conditional Nat PIX

joebass47
joebass47 asked
on
Medium Priority
740 Views
Last Modified: 2012-05-07
I am having some issues getting this to work.  I posted a question previously but still have not figured it out so hopefully I can explain it better here.  

We have a site to site vpn tunnel setup with a customer for two of our networks.
192.168.7.0
192.168.100.0

Here is the config in our pix for that tunnel and the corresponding acls:
__________________________________________________________________________

nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0

access-list 103 extended permit ip 192.168.7.0 255.255.255.0 host 198.x.x.x
access-list 103 extended permit ip 192.168.100.0 255.255.255.0 host 198.x.x.x
 
access-list nonat extended permit ip 192.168.100.0 255.255.255.0 host 198.x.x.x
access-list nonat extended permit ip 192.168.7.0 255.255.255.0 host 198.x.x.x

crypto ipsec transform-set des esp-des esp-sha-hmac
crypto map tippmanngroup 1 match address 103
crypto map tippmanngroup 1 set pfs
crypto map tippmanngroup 1 set peer 199.x.x.x
crypto map tippmanngroup 1 set transform-set des

tunnel-group 199.x.x.x type ipsec-l2l
tunnel-group 199.x.x.x ipsec-attributes
 pre-shared-key *
_________________________________________________________________________

I have several other sites that I need to give the customer access to so they can use remote desktop to access these servers.  The ips are listed below.
192.168.40.21
192.168.40.22
192.168.40.24

192.168.6.21
192.168.6.22
192.168.6.24

192.168.50.21
192.168.50.22
192.168.50.24

The issue I have is I nat those to another ip because those networks are already in use on the customers' end.  I would like to nat each one of those ips above to one of our external ip addresses so that any traffic coming from one of the above ips is translated to one of our external ips.  It has to be an external address because of the customers network.  I would like to use the following ips as the external addresses:
66.x.x.1 to 192.168.40.21
66.x.x.2 to 192.168.40.22
66.x.x.3 to 192.168.40.24
66.x.x.4 to 192.168.6.21
etc., etc.


If you need more of the config then please ask.

Thanks,
Comment
Watch Question

Istvan KalmarHead of IT Security Division
CERTIFIED EXPERT
Top Expert 2010

Commented:
HI,

I prefer that you use vpn client, it is more safer than nat!

If you want to use nat you configure that:

for examle 192.168.40.21
static (inside,outside) udp 66..x.x.1 3389 192.168.40.21 3389 netmask 255.255.255.255
access-list acl_out remark remote desktop
access-list acl_out extended permit tcp any host 66.x.x.1 eq 3389
access-group acl_out in interface outside

Best regards,
Istvan
Unlock this solution and get a sample of our free trial.
(No credit card required)
UNLOCK SOLUTION
CERTIFIED EXPERT
Top Expert 2007

Commented:
VPN Client and NAT are not safety criterias to prefer one to another. NATed traffic enters the same encryption tunnel specified by transform-set as VPN client traffic
Unlock the solution to this question.
Thanks for using Experts Exchange.

Please provide your email to receive a sample view!

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.