Nat And Remote Access Vpn - Cisco ASA Series Configuration Manual

Firewall cli, asa services module, and the adaptive security virtual appliance
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 10
NAT Examples and Reference
Figure 10-12
Send packet out Inside interface.
NAT for VPN
The following topics explain NAT usage with the various types of VPN.

NAT and Remote Access VPN

The following figure shows both an inside server (10.1.1.6) and a VPN client (209.165.201.10) accessing
the Internet. Unless you configure split tunneling for the VPN client (where only specified traffic goes
through the VPN tunnel), then Internet-bound VPN traffic must also go through the ASA. When the VPN
traffic enters the ASA, the ASA decrypts the packet; the resulting packet includes the VPN client local
address (10.3.3.10) as the source. For both inside and VPN client local networks, you need a public IP
address provided by NAT to access the Internet. The below example uses interface PAT rules. To allow
the VPN traffic to exit the same interface it entered, you also need to enable intra-interface
communication (also known as "hairpin" networking).
Routed Mode Egress Interface Selection
Real: 10.1.1.78
Mapped: 209.165.201.08
Inside
No
NAT rule specifies route lookup?
NAT and Remote Access VPN, page 10-15
NAT and Site-to-Site VPN, page 10-17
NAT and VPN Management Access, page 10-19
Troubleshooting NAT and VPN, page 10-21
Eng
Packet
Dest. 209.165.201.08
Outside
to
209.165.201.08
10.1.1.78
Untranslation
Where to send 10.1.1.78?
NAT rule specifies interface?
Yes
Look up 10.1.1.78 in routing table.
Yes
Cisco ASA Series Firewall CLI Configuration Guide
NAT for VPN
No
10-15

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents