Solved

ASA 5505 9.1.3 Site to Site VPN Connection Profile Nat Exempt

Posted on 2014-03-27
8
4,631 Views
Last Modified: 2014-04-02
Hi all,

On a Cisco ASA 5505 running 9.1.3.  Under one of my connection profiles for a site to site VPN there is an option for Exempt ASA side host/network from address translation (Inside interface).  That option is checked.

In the NAT rules there are several Section 1 and/or Manual NAT rules basically allowing the inside interface of the ASA to talk to different subnets on opposite side of the VPN in question.  If I do a sh NAT DETAIL Command I can see the rules as follows:

Manual NAT Policies (Section 1)
1 (inside) to (outside) source static inside inside   destination static OR_VOIP OR_VOIP
    translate_hits = 45, untranslate_hits = 54
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 172.16.0.0/22, Translated: 172.16.0.0/22
2 (inside) to (outside) source static inside inside   destination static OR_Dot4 OR_Dot4
    translate_hits = 18, untranslate_hits = 18
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.4.0/24, Translated: 192.168.4.0/24
3 (inside) to (outside) source static inside inside   destination static TT_LAN TT_LAN
    translate_hits = 87, untranslate_hits = 87
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.121.0/24, Translated: 192.168.121.0/24
4 (inside) to (outside) source static inside inside   destination static OR_Dot0 OR_Dot0
    translate_hits = 90, untranslate_hits = 91
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.0.0/24, Translated: 192.168.0.0/24

Being that the  "Exempt ASA side host/network from address translation" box is checked under the VPN connection profile do I still need these NAT rules?

Having a hard time finding out exactly what that check box does.   Thanks.
0
Comment
Question by:ckangas7
  • 4
  • 4
8 Comments
 
LVL 16
ID: 39960588
add no-proxy-arp route-lookup to the end of your site to site tunnel NAT statements on both sides.

MO
0
 

Author Comment

by:ckangas7
ID: 39963232
Thank you for the answer, but it really doesn't answer my question.  What does "Exempt ASA side host/network from address translation" box do?

Why do I need to add the no proxy-arp route-lookup to my Nat rules?
0
 
LVL 16
ID: 39963817
It turns off NAT which is what you'd typically do in a traditional site to site VPN tunnel. Both sites would have that exemption set. You don't typically want the private networks on either side of the tunnel to translate to the global/public IP of the ASA.

turning off proxy-arp will allow the LAN sides of your tunnel to communicate with the LAN side interface of the opposing ASA.

To answer to your question, the NAT rules created are the result of turning on the exemption.

MO
0
 

Author Comment

by:ckangas7
ID: 39971415
So I think I am following you.  If I add the no proxy-arp to my NAT statements should the above translations shown with the 'Show NAT Detail' go away?  The way I read it now traffic is being translated, it is just not being translated to a public IP.  Checking NAT exemption with no proxy arp should allow traffic to flow freely across the VPN tunnel with routing being handled by the ASA or a router/switch on the other end.  Am I understanding correctly?
0
Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

 
LVL 16
ID: 39972007
Actually, the NAT detail you have above is showing that the traffic is not being translated. In the old ASA/PIX days we called this "no NAT". You're essentially telling the ASA to not translate the traffic. Source and destination traffic retain the untranslated version of their subnets. In a standard/traditional configuration this is the right way to do it. Assuming that everything else in your configuration regarding the Site to Site tunnels is correct there is no need to modify your NAT configuration. The "no-proxy-arp" option simply turns proxy arp off so that the LAN side interfaces of your ASA's can communicate to the opposing side of the tunnel.

MO
0
 

Author Comment

by:ckangas7
ID: 39973273
I get it.  One final question and I believe we are done : - ).  When I set up a site to site VPN tunnel via the wizard it automatically creates a NAT rule for me.  This NAT rule has the 'Disable Proxy ARP on egress interface' box checked as well as the 'Lookup route to locate egress interface' box checked.  This works fine and the sh nat detail shows the same results as above.  

However if I uncheck those two boxes and change the direction to both on the said NAT rule I get the following  warning.

Nat Warning
This configuration also works fine and the Show NAT detail is the same.

So the final question is which configuration is better and is the warning something I really need to worry about.
0
 
LVL 16

Accepted Solution

by:
Michael Ortega (Internetwerx, Inc.) earned 500 total points
ID: 39973422
You don't want proxy arp to be enabled across your NAT VPN, but your do want route-lookup. If you run "show nat" you should see at the end of your VPN NAT statements "no-proxy-arp route-lookup".

MO
0
 

Author Closing Comment

by:ckangas7
ID: 39973452
Very good.  Thank you much.  I get it now.
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Let’s list some of the technologies that enable smooth teleworking. 
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now