On a Cisco C1921, IOS 15.2, how to have a staticaly bound local inside IP talk on both a WAN an VPN interface.

Posted on 2014-08-29
Last Modified: 2014-09-04

I have an inside static IP that I have setup to map to an outside IP address.  That seems to work. I also want the inside Ip to be able to talk over my VPN.  That part isn't working.  The vpn part was working before I defined the static NAT translation rule indicted below.

crypto map SDM_CMAP_1 1 ipsec-isakmp 
 description Tunnel to184.170.93.12
 set peer
 set security-association lifetime seconds 28800
 set transform-set Colo 
 match address 100
interface GigabitEthernet0/0
 description Lan
 ip address
 ip nat inside
 ip virtual-reassembly in
 duplex auto
 speed auto
interface GigabitEthernet0/1
 description WAN$ETH-WAN$
 ip address
 ip access-group MyFirewallIn in
 ip access-group MyFirewallOut out
 ip nat outside
 ip virtual-reassembly in
 duplex auto
 speed auto
 crypto map SDM_CMAP_1
ip forward-protocol nd

ip nat inside source route-map SDM_RMAP_1 interface GigabitEthernet0/1 overload
ip nat inside source static   <==============================
ip route
ip sla auto discovery
access-list 1 remark CCP_ACL Category=2
access-list 1 permit
access-list 100 remark CCP_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip
access-list 100 permit ip
access-list 101 remark CCP_ACL Category=2
access-list 101 deny   ip
access-list 101 remark IPSec Rule
access-list 101 deny   ip
access-list 101 permit ip any
route-map SDM_RMAP_1 permit 1
 match ip address 101

Open in new window

I'm not sure what other info is needed to figure this out.

Where do I need to look?
What have I got wrong?

You can see the inside and outside networks above.

The is at the remote and of the VPN tunnel.

If it makes any difference I'm using Cisco Configuration Professional to set this up.

However, I also have HyperTerminal for things CCP can't do.
And I've been learning IOS along the way.
Question by:Gary4
    1 Comment
    LVL 22

    Accepted Solution

    Hi Gary,

    You need to define the nat using a route-map, so you can exclude the internal/VPN IPs.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Join & Write a Comment

    Managing 24/7 IT Operations is a hands-on job and indeed a difficult one. Over the years I have found some simple tips and techniques to increase the efficiency of the overall operations. The core concept has always been on continuous improvement; a…
    Shadow IT is coming out of the shadows as more businesses are choosing cloud-based applications. It is now a multi-cloud world for most organizations. Simultaneously, most businesses have yet to consolidate with one cloud provider or define an offic…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
    In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor ( If you're interested in additional methods for monitoring bandwidt…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now