SIte to Site vpn w/ conditional Nat PIX

I am having some issues getting this to work.  I posted a question previously but still have not figured it out so hopefully I can explain it better here.  

We have a site to site vpn tunnel setup with a customer for two of our networks.
192.168.7.0
192.168.100.0

Here is the config in our pix for that tunnel and the corresponding acls:
__________________________________________________________________________

nat (inside) 0 access-list nonat
nat (inside) 1 0.0.0.0 0.0.0.0

access-list 103 extended permit ip 192.168.7.0 255.255.255.0 host 198.x.x.x
access-list 103 extended permit ip 192.168.100.0 255.255.255.0 host 198.x.x.x
 
access-list nonat extended permit ip 192.168.100.0 255.255.255.0 host 198.x.x.x
access-list nonat extended permit ip 192.168.7.0 255.255.255.0 host 198.x.x.x

crypto ipsec transform-set des esp-des esp-sha-hmac
crypto map tippmanngroup 1 match address 103
crypto map tippmanngroup 1 set pfs
crypto map tippmanngroup 1 set peer 199.x.x.x
crypto map tippmanngroup 1 set transform-set des

tunnel-group 199.x.x.x type ipsec-l2l
tunnel-group 199.x.x.x ipsec-attributes
 pre-shared-key *
_________________________________________________________________________

I have several other sites that I need to give the customer access to so they can use remote desktop to access these servers.  The ips are listed below.
192.168.40.21
192.168.40.22
192.168.40.24

192.168.6.21
192.168.6.22
192.168.6.24

192.168.50.21
192.168.50.22
192.168.50.24

The issue I have is I nat those to another ip because those networks are already in use on the customers' end.  I would like to nat each one of those ips above to one of our external ip addresses so that any traffic coming from one of the above ips is translated to one of our external ips.  It has to be an external address because of the customers network.  I would like to use the following ips as the external addresses:
66.x.x.1 to 192.168.40.21
66.x.x.2 to 192.168.40.22
66.x.x.3 to 192.168.40.24
66.x.x.4 to 192.168.6.21
etc., etc.


If you need more of the config then please ask.

Thanks,
joebass47Asked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Istvan KalmarHead of IT Security Division Commented:
HI,

I prefer that you use vpn client, it is more safer than nat!

If you want to use nat you configure that:

for examle 192.168.40.21
static (inside,outside) udp 66..x.x.1 3389 192.168.40.21 3389 netmask 255.255.255.255
access-list acl_out remark remote desktop
access-list acl_out extended permit tcp any host 66.x.x.1 eq 3389
access-group acl_out in interface outside

Best regards,
Istvan
0
joebass47Author Commented:
I need to open it up for the customers network using the existing vpn tunnel.  I  cant use a client as it is against customers policy.
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Alan Huseyin KayahanCommented:
VPN Client and NAT are not safety criterias to prefer one to another. NATed traffic enters the same encryption tunnel specified by transform-set as VPN client traffic
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Cisco

From novice to tech pro — start learning today.