Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Cisco ip nat and VPN clash

Posted on 2011-02-17
3
Medium Priority
?
779 Views
Last Modified: 2012-05-11
Hey All,

We have an issue on two sites which we have now isolated to the same thing.

Bother of these are are split into two geopraqhical sites and have cisco 800 series routers doing a IPSEC tunnel between them.

Each site has a Windows 2008 server and exchange, generally in a one forest multiple child domain setup.

The issue we have is that the NAT rules that translate, say port 25, from external to internal server interefere with that port going over the VPN. Traffic not on a nat rule works fine over the VPN, for example pings, alternate ports etc.

I can telnet from Server A to Server B on port 587 (alternate SMTP port) and have everything working fine. If I telnet from Server A to Server B on port 25, the the SYN packet arrives from Server A, and Server B replies with a SYN,ACK but that packet never reaches Server A. If we remove the nat rule translating port 25 externally to internally this packet now reaches back to source over the IPSEC VPN and everything works fine.

So I'm guessing my NAT rules are not written correctly.

Some configs for you all:

Crypto Map setups:

crypto isakmp policy 10
 encr aes 256
 authentication pre-share
 group 2
 lifetime 28800
crypto isakmp key XXXXXXXXX address NNN.NNN.242.165 no-xauth
!
!
crypto ipsec transform-set aes-sha-transform esp-aes 256 esp-sha-hmac
!
crypto map aesmap 10 ipsec-isakmp
 set peer NNN.NNN.242.165
 set transform-set aes-sha-transform
 set pfs group2
 match address acl_vpn

Interface Configs:

interface Vlan1
 ip address 172.17.5.1 255.255.255.0
 ip nat inside
 ip virtual-reassembly

interface Dialer0
 ip address negotiated
 no ip redirects
 no ip unreachables
 no ip proxy-arp
 ip nat outside
 ip virtual-reassembly
 encapsulation ppp
 dialer pool 1
 dialer-group 1
 no cdp enable
 ppp authentication chap callin
 ppp chap hostname AAAAAA
 ppp chap password 0 XXXXXX
 ppp pap sent-username AAAAAA password 0 XXXXXX
 crypto map aesmap

ACL Configs:

ip nat pool apool NNN.NNN.131.166 NNN.NNN.131.166 netmask 255.255.255.252
ip nat inside source static tcp 172.17.5.2 1723 interface Dialer0 1723
ip nat inside source static tcp 172.17.5.2 80 interface Dialer0 80
ip nat inside source static tcp 172.17.5.2 25 interface Dialer0 25
ip nat inside source static tcp 172.17.5.2 3389 interface Dialer0 3389
ip nat inside source static tcp 172.17.5.2 3101 interface Dialer0 3101
ip nat inside source static tcp 172.17.5.2 143 interface Dialer0 143
ip nat inside source static tcp 172.17.5.2 110 interface Dialer0 110
ip nat inside source static tcp 172.17.5.2 443 interface Dialer0 443
ip nat inside source route-map amap pool apool overload
!
ip access-list extended NAT
 permit ip any any
ip access-list extended acl_vpn
 permit ip 172.17.5.0 0.0.0.255 172.17.4.0 0.0.0.255

access-list 1 permit 172.17.5.0 0.0.0.255
access-list 102 deny   ip 172.17.5.0 0.0.0.255 172.17.4.0 0.0.0.255
access-list 102 permit ip 172.17.5.0 0.0.0.255 any
dialer-list 1 protocol ip permit
route-map amap permit 10
 match ip address 102

0
Comment
Question by:michaeljcarmody
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Accepted Solution

by:
rkrug8421 earned 1000 total points
ID: 34922973
You need to use a route-map with your "ip nat inside" command.  for example:


ip access-list extended server-ACL-NAT
 ! Deny traffic from the server to the VPN remote:
 deny ip host 172.17.5.2 172.17.4.0 0.0.0.255
 ! Permit everything else
 permit ip host 172.17.5.2 any

route-map server-RM-NAT permit 10
 match ip address server-ACL-NAT
!
route-map server-RM-NAT deny 20

! The route-map should limit NAT to traffic matched by the above ACL:
ip nat inside source static 172.17.5.2 interface Dialer0  route-map server-RM-NAT

Do this on both routers, assuming your users use a different outside IP address.

0
 
LVL 33

Expert Comment

by:digitap
ID: 35187523
This question has been classified as abandoned and is being closed as part of the Cleanup Program. See my comment at the end of the question for more details.
0

Featured Post

Q2 2017 - Latest Malware & Internet Attacks

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out our latest Quarterly Internet Security Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question