[c-nsp] Correction: NAT not playing nice with VPN's

Brian Feeny signal at shreve.net
Sat Mar 12 13:53:31 EST 2005


The last config I posted had an error, the ACL I am using on the route 
map that overloads against S0 does in fact exclude traffic to the 
remote VPN, so thats not the problem, its something else going on.  
Correct config is below
-------------


I have a situation where I am NATing all traffic behind a WAN IP 
address using overload.

If the traffic however, is destined for a specific IP address, it needs 
to use a Pool instead, so that each inside host can have a unique IP 
address.  The reason I have route-maps is because this router has 
multiple WAN links, and I am doing NAT behind different WAN IP's and so 
I have to make sure if the traffic goes out a certain WAN link, it gets 
NATed behind that WAN links IP or Pool.

With overload on a single WAN, it all works.  With the below config, 
traffic to 170.97.79.74 uses poolS0 like its suppose to, but the dial 
Vpn's these users are trying to use to connect to 170.97.79.74 are 
failing.  I wanted to see if there is something I am doing wrong here.  
I could have tested more with debugs but the user needed everything 
back into production, so I overloaded everything behind the WAN IP
and that works.

Anyone see why dial Vpn's (esp, etc) would fail when using the pool as 
setup below?

So I set it up like so:

ip nat inside source route-map outS0 interface Serial0 overload
ip nat inside source route-map outS0-2 pool poolS0
ip nat pool poolS0 65.38.20.152 65.38.20.159 netmask 255.255.255.248

ip route 170.97.79.74 255.255.255.255 Serial0

route-map outS0 permit 10
  match ip address localLan
  match interface Serial0
!
route-map outS0-2 permit 10
  match ip address toHudVpn
  match interface Serial0
!
ip access-list extended toHudVpn
  permit ip 10.0.0.0 0.0.0.255 host 170.97.79.74
!
ip access-list extended localLan
  deny   ip host 10.0.0.2 any
  deny   ip 10.0.0.0 0.0.0.255 host 170.97.79.74
  permit ip 10.0.0.0 0.0.0.255 any

Brian



More information about the cisco-nsp mailing list