?
Solved

ASA 5505 9.1.3 Site to Site VPN Connection Profile Nat Exempt

Posted on 2014-03-27
8
Medium Priority
?
5,779 Views
Last Modified: 2014-04-02
Hi all,

On a Cisco ASA 5505 running 9.1.3.  Under one of my connection profiles for a site to site VPN there is an option for Exempt ASA side host/network from address translation (Inside interface).  That option is checked.

In the NAT rules there are several Section 1 and/or Manual NAT rules basically allowing the inside interface of the ASA to talk to different subnets on opposite side of the VPN in question.  If I do a sh NAT DETAIL Command I can see the rules as follows:

Manual NAT Policies (Section 1)
1 (inside) to (outside) source static inside inside   destination static OR_VOIP OR_VOIP
    translate_hits = 45, untranslate_hits = 54
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 172.16.0.0/22, Translated: 172.16.0.0/22
2 (inside) to (outside) source static inside inside   destination static OR_Dot4 OR_Dot4
    translate_hits = 18, untranslate_hits = 18
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.4.0/24, Translated: 192.168.4.0/24
3 (inside) to (outside) source static inside inside   destination static TT_LAN TT_LAN
    translate_hits = 87, untranslate_hits = 87
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.121.0/24, Translated: 192.168.121.0/24
4 (inside) to (outside) source static inside inside   destination static OR_Dot0 OR_Dot0
    translate_hits = 90, untranslate_hits = 91
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.0.0/24, Translated: 192.168.0.0/24

Being that the  "Exempt ASA side host/network from address translation" box is checked under the VPN connection profile do I still need these NAT rules?

Having a hard time finding out exactly what that check box does.   Thanks.
0
Comment
Question by:ckangas7
  • 4
  • 4
8 Comments
 
LVL 16

Expert Comment

by:Michael Ortega
ID: 39960588
add no-proxy-arp route-lookup to the end of your site to site tunnel NAT statements on both sides.

MO
0
 

Author Comment

by:ckangas7
ID: 39963232
Thank you for the answer, but it really doesn't answer my question.  What does "Exempt ASA side host/network from address translation" box do?

Why do I need to add the no proxy-arp route-lookup to my Nat rules?
0
 
LVL 16

Expert Comment

by:Michael Ortega
ID: 39963817
It turns off NAT which is what you'd typically do in a traditional site to site VPN tunnel. Both sites would have that exemption set. You don't typically want the private networks on either side of the tunnel to translate to the global/public IP of the ASA.

turning off proxy-arp will allow the LAN sides of your tunnel to communicate with the LAN side interface of the opposing ASA.

To answer to your question, the NAT rules created are the result of turning on the exemption.

MO
0
Exciting career futures for women in IT

Education has the power to transform lives and open the door to new career opportunities. By earning an IT degree from WGU, you can become a highly skilled IT professional. Get the credentials and certifications you need to become a leader in this rewarding field.  

 

Author Comment

by:ckangas7
ID: 39971415
So I think I am following you.  If I add the no proxy-arp to my NAT statements should the above translations shown with the 'Show NAT Detail' go away?  The way I read it now traffic is being translated, it is just not being translated to a public IP.  Checking NAT exemption with no proxy arp should allow traffic to flow freely across the VPN tunnel with routing being handled by the ASA or a router/switch on the other end.  Am I understanding correctly?
0
 
LVL 16

Expert Comment

by:Michael Ortega
ID: 39972007
Actually, the NAT detail you have above is showing that the traffic is not being translated. In the old ASA/PIX days we called this "no NAT". You're essentially telling the ASA to not translate the traffic. Source and destination traffic retain the untranslated version of their subnets. In a standard/traditional configuration this is the right way to do it. Assuming that everything else in your configuration regarding the Site to Site tunnels is correct there is no need to modify your NAT configuration. The "no-proxy-arp" option simply turns proxy arp off so that the LAN side interfaces of your ASA's can communicate to the opposing side of the tunnel.

MO
0
 

Author Comment

by:ckangas7
ID: 39973273
I get it.  One final question and I believe we are done : - ).  When I set up a site to site VPN tunnel via the wizard it automatically creates a NAT rule for me.  This NAT rule has the 'Disable Proxy ARP on egress interface' box checked as well as the 'Lookup route to locate egress interface' box checked.  This works fine and the sh nat detail shows the same results as above.  

However if I uncheck those two boxes and change the direction to both on the said NAT rule I get the following  warning.

Nat Warning
This configuration also works fine and the Show NAT detail is the same.

So the final question is which configuration is better and is the warning something I really need to worry about.
0
 
LVL 16

Accepted Solution

by:
Michael Ortega earned 2000 total points
ID: 39973422
You don't want proxy arp to be enabled across your NAT VPN, but your do want route-lookup. If you run "show nat" you should see at the end of your VPN NAT statements "no-proxy-arp route-lookup".

MO
0
 

Author Closing Comment

by:ckangas7
ID: 39973452
Very good.  Thank you much.  I get it now.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
Suggested Courses
Course of the Month14 days, 12 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question