Solved

Cisco ASA Crypto Maps and NAT Rules for Site to Site VPN with Network Objects

Posted on 2014-04-25
3
798 Views
Last Modified: 2014-06-10
Hi all,

I have a site to site VPN with necessary Crypto Maps and Before NAT rules.  I have no control over my affiliates ASA but would like to make some changes on my end.

Have Crypto Maps and NAT rules for the following hosts on the other end.

10.0.0.3
10.0.3.105
10.0.3.107

These 3 hosts talk to many of the subnets and hosts on my end.  I would like to group those 3  hosts into a network object group and redo my NAT and Crypto Maps to reference the new group.  This would really cut down the length of my Crypto Map and Nat lists.

If I create the object group on my end, will my affiliate need to create the same group on his end as well as redo his NAT and Crypto Maps to match mine?  Or will we be OK being that there would still be NAT and Crypto Maps to mach each individual host on his end?

Running 8.4.1 on my ASA.
0
Comment
Question by:ckangas7
3 Comments
 
LVL 10

Assisted Solution

by:Schuyler Dorsey
Schuyler Dorsey earned 250 total points
Comment Utility
Grouping your items into objects and object groups does NOT affect the other end of the tunnel; i.e. they do not have to put theirs in object groups as well.
0
 
LVL 57

Accepted Solution

by:
Pete Long earned 250 total points
Comment Utility
Agreed, as long at the IP addresses don't change, you just need to alter the ACL that's declaring your 'Interesting traffic' (traffic to be encrypted)

Then you will need to change the nat rules accordingly. there will be no requirement to change the other end, just warn them that the tunnel will drop while you carry out the work.

PL
0
 

Author Comment

by:ckangas7
Comment Utility
Very good,

So I can put 10.0.0.3, 10.0.3.105, 10.0.3.107 into one network  group object and modify my NAT and Crypro maps to use the new object.  Can then delete all the old individual rules.

Two final questions. My affiliate is running an older version IOS on their ASA (8.1 something).  Being they are using the older NAT structure, will that have any effect in my scenario?

Also, can I NAT, and Crypto protect network object group to network object group?  I would like to group some servers on my side and allow them to talk to the server group on their side.  So I would be doing many to many translations instead of one to many.  Being that all the traffic is going accross the tunnel and nothing is really being translated, I don't think that would be a problem.  Am I correct?
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Suggested Solutions

This is about downgrading PIX Version 8.0(4) & ASDM 6.1(5) to PIX 7.2(4) and ASDM 5.2(4) but with only 64MB RAM and 16MB flash. Background: You have a Cisco Pix 515E which was running on PIX 7.2(4) and its supporting ASDM 5.2(4) without any i…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now