SIte to Site vpn w/ conditional Nat PIX

I am having some issues getting this to work.  I posted a question previously but still have not figured it out so hopefully I can explain it better here.  

We have a site to site vpn tunnel setup with a customer for two of our networks.

Here is the config in our pix for that tunnel and the corresponding acls:

nat (inside) 0 access-list nonat
nat (inside) 1

access-list 103 extended permit ip host 198.x.x.x
access-list 103 extended permit ip host 198.x.x.x
access-list nonat extended permit ip host 198.x.x.x
access-list nonat extended permit ip host 198.x.x.x

crypto ipsec transform-set des esp-des esp-sha-hmac
crypto map tippmanngroup 1 match address 103
crypto map tippmanngroup 1 set pfs
crypto map tippmanngroup 1 set peer 199.x.x.x
crypto map tippmanngroup 1 set transform-set des

tunnel-group 199.x.x.x type ipsec-l2l
tunnel-group 199.x.x.x ipsec-attributes
 pre-shared-key *

I have several other sites that I need to give the customer access to so they can use remote desktop to access these servers.  The ips are listed below.

The issue I have is I nat those to another ip because those networks are already in use on the customers' end.  I would like to nat each one of those ips above to one of our external ip addresses so that any traffic coming from one of the above ips is translated to one of our external ips.  It has to be an external address because of the customers network.  I would like to use the following ips as the external addresses:
66.x.x.1 to
66.x.x.2 to
66.x.x.3 to
66.x.x.4 to
etc., etc.

If you need more of the config then please ask.

Who is Participating?
joebass47Connect With a Mentor Author Commented:
I need to open it up for the customers network using the existing vpn tunnel.  I  cant use a client as it is against customers policy.
Istvan KalmarHead of IT Security Division Commented:

I prefer that you use vpn client, it is more safer than nat!

If you want to use nat you configure that:

for examle
static (inside,outside) udp 66..x.x.1 3389 3389 netmask
access-list acl_out remark remote desktop
access-list acl_out extended permit tcp any host 66.x.x.1 eq 3389
access-group acl_out in interface outside

Best regards,
Alan Huseyin KayahanCommented:
VPN Client and NAT are not safety criterias to prefer one to another. NATed traffic enters the same encryption tunnel specified by transform-set as VPN client traffic
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.