[c-nsp] site-to-site vpn NAT/PAT interesting traffic config question

Andrew Escher andrew.escher at gmail.com
Thu Dec 15 12:43:43 EST 2011


I am in the process of migrating tunnels off an ASAs running 8.2 code
at a customers former data center. The tunnels will be moving to an
another ASA running 8.4.2 code. The vendor side equipment ranges from
ASAs to Junipers and I don’t have access to them. The majority of the
tunnels require either NAT or PAT due to private addresses. Just as a
precaution before I migrate all the tunnels I thought I would get a
second set of eyes on two of the config files that require the
interesting traffic to have a NAT or PAT. The IP have been changed to
protect the innocent. So the pointy end of the stick is ... Are the
config correct?
Phase 1 has already been defined on the ASA and is working fine for
the simpler tunnels.

First is just a static NAT

name 5.6.7.8 VendorName

object-group network VendorName-R
 network-object host 192.168.1.10

object-group network VendorName-NAT-R
 network-object host 10.1.0.2

object-group network VendorName-L
 network-object host 10.1.1.3

access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R
nat (inside,outside) 1 source static VendorName-L VendorName-NAT-R
destination static VendorName-R VendorName-R

crypto map vpnmap 10 match address VendorName-crypto
crypto map vpnmap 10 set peer VendorName
crypto map vpnmap 10 set ikev1 transform-set ESP-3DES-SHA

tunnel-group 5.6.7.8 type ipsec-l2l
tunnel-group 5.6.7.8 ipsec-attributes
 ikev1 pre-shared-key cryptosecretkey

route outside 192.168.1.10 255.255.255.255 8.8.8.8 1


Second config

name 5.6.7.8 VendorName

object-group network VendorName-R-1
 network-object subnet 192.168.1.0 255.255.255.0

object-group network VendorName-R-2
 network-object subnet 192.168.2.0 255.255.255.0

object-group network VendorName-R-3
 network-object host 192.168.1.20

object-group network VendorName-R-4
 network-object host 192.168.1.21

object-group network VendorName-NAT-R-1
 network-object host 10.1.0.2

object-group network VendorName-NAT-R-2
 network-object host 10.1.0.3

object-group network VendorName-NAT-R-3
 network-object host 10.1.0.4

object-group network VendorName-NAT-R-4
 network-object host 10.1.0.5

object-group network VendorName-L
 network-object host 10.1.1.3
 network-object host 10.1.1.6

access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R-1
access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R-2
access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R-3
access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R-4
nat (inside,outside) 1 source dynamic VendorName-L VendorName-NAT-R-1
destination static VendorName-R-1 VendorName-R-1
nat (inside,outside) 1 source dynamic VendorName-L VendorName-NAT-R-2
destination static VendorName-R-2 VendorName-R-2
nat (inside,outside) 1 source static VendorName-L VendorName-NAT-R-3
destination static VendorName-R-3 VendorName-R-3
nat (inside,outside) 1 source static VendorName-L VendorName-NAT-R-4
destination static VendorName-R-4 VendorName-R-4

crypto map vpnmap 290 match address VendorName-crypto
crypto map vpnmap 290 set peer VendorName
crypto map vpnmap 290 set ikev1 transform-set ESP-AES-128-SHA
ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA
ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5

tunnel-group 5.6.7.8 type ipsec-l2l
tunnel-group 5.6.7.8 ipsec-attributes
 ikev1 pre-shared-key cryptosecretkey

route outside 192.168.1.0 255.255.255.0 8.8.8.8 1
route outside 192.168.1.0 255.255.255.0 8.8.8.8 1



The acl on the second config as I understand can be shortened by the
following, is it recommended however?

object-group network VendorName-R
 network-object object VendorName-R-1
 network-object object VendorName-R-2
 network-object object VendorName-R-3
 network-object object VendorName-R-4

access-list VendorName-crypto extended permit ip object-group
VendorName-L object-group VendorName-NAT-R



I apologize if this is the wrong list and appreciate everyone's time
for take a look and responding.



More information about the cisco-nsp mailing list