Solved

ASA 5505 9.1.3 Site to Site VPN Connection Profile Nat Exempt

Posted on 2014-03-27
8
4,491 Views
Last Modified: 2014-04-02
Hi all,

On a Cisco ASA 5505 running 9.1.3.  Under one of my connection profiles for a site to site VPN there is an option for Exempt ASA side host/network from address translation (Inside interface).  That option is checked.

In the NAT rules there are several Section 1 and/or Manual NAT rules basically allowing the inside interface of the ASA to talk to different subnets on opposite side of the VPN in question.  If I do a sh NAT DETAIL Command I can see the rules as follows:

Manual NAT Policies (Section 1)
1 (inside) to (outside) source static inside inside   destination static OR_VOIP OR_VOIP
    translate_hits = 45, untranslate_hits = 54
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 172.16.0.0/22, Translated: 172.16.0.0/22
2 (inside) to (outside) source static inside inside   destination static OR_Dot4 OR_Dot4
    translate_hits = 18, untranslate_hits = 18
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.4.0/24, Translated: 192.168.4.0/24
3 (inside) to (outside) source static inside inside   destination static TT_LAN TT_LAN
    translate_hits = 87, untranslate_hits = 87
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.121.0/24, Translated: 192.168.121.0/24
4 (inside) to (outside) source static inside inside   destination static OR_Dot0 OR_Dot0
    translate_hits = 90, untranslate_hits = 91
    Source - Origin: 192.168.108.0/24, Translated: 192.168.108.0/24
    Destination - Origin: 192.168.0.0/24, Translated: 192.168.0.0/24

Being that the  "Exempt ASA side host/network from address translation" box is checked under the VPN connection profile do I still need these NAT rules?

Having a hard time finding out exactly what that check box does.   Thanks.
0
Comment
Question by:ckangas7
  • 4
  • 4
8 Comments
 
LVL 16
ID: 39960588
add no-proxy-arp route-lookup to the end of your site to site tunnel NAT statements on both sides.

MO
0
 

Author Comment

by:ckangas7
ID: 39963232
Thank you for the answer, but it really doesn't answer my question.  What does "Exempt ASA side host/network from address translation" box do?

Why do I need to add the no proxy-arp route-lookup to my Nat rules?
0
 
LVL 16
ID: 39963817
It turns off NAT which is what you'd typically do in a traditional site to site VPN tunnel. Both sites would have that exemption set. You don't typically want the private networks on either side of the tunnel to translate to the global/public IP of the ASA.

turning off proxy-arp will allow the LAN sides of your tunnel to communicate with the LAN side interface of the opposing ASA.

To answer to your question, the NAT rules created are the result of turning on the exemption.

MO
0
 

Author Comment

by:ckangas7
ID: 39971415
So I think I am following you.  If I add the no proxy-arp to my NAT statements should the above translations shown with the 'Show NAT Detail' go away?  The way I read it now traffic is being translated, it is just not being translated to a public IP.  Checking NAT exemption with no proxy arp should allow traffic to flow freely across the VPN tunnel with routing being handled by the ASA or a router/switch on the other end.  Am I understanding correctly?
0
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

 
LVL 16
ID: 39972007
Actually, the NAT detail you have above is showing that the traffic is not being translated. In the old ASA/PIX days we called this "no NAT". You're essentially telling the ASA to not translate the traffic. Source and destination traffic retain the untranslated version of their subnets. In a standard/traditional configuration this is the right way to do it. Assuming that everything else in your configuration regarding the Site to Site tunnels is correct there is no need to modify your NAT configuration. The "no-proxy-arp" option simply turns proxy arp off so that the LAN side interfaces of your ASA's can communicate to the opposing side of the tunnel.

MO
0
 

Author Comment

by:ckangas7
ID: 39973273
I get it.  One final question and I believe we are done : - ).  When I set up a site to site VPN tunnel via the wizard it automatically creates a NAT rule for me.  This NAT rule has the 'Disable Proxy ARP on egress interface' box checked as well as the 'Lookup route to locate egress interface' box checked.  This works fine and the sh nat detail shows the same results as above.  

However if I uncheck those two boxes and change the direction to both on the said NAT rule I get the following  warning.

Nat Warning
This configuration also works fine and the Show NAT detail is the same.

So the final question is which configuration is better and is the warning something I really need to worry about.
0
 
LVL 16

Accepted Solution

by:
Michael Ortega (Internetwerx, Inc.) earned 500 total points
ID: 39973422
You don't want proxy arp to be enabled across your NAT VPN, but your do want route-lookup. If you run "show nat" you should see at the end of your VPN NAT statements "no-proxy-arp route-lookup".

MO
0
 

Author Closing Comment

by:ckangas7
ID: 39973452
Very good.  Thank you much.  I get it now.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Join & Write a Comment

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now