PAT can now use the same address as the outside interface with the
'interface' keyword:

e.g., global (outside) 1 interface

----- Original Message -----
From: "Patrick Ramsey" 
To: 
Sent: Wednesday, October 24, 2001 7:34 AM
Subject: RE: PIX with PAT and VPN [7:23490]


> You definately want to use a different ip addres for PAT than what you
have
> set on the interface.  I'm surprised PAT is even working, unless cisco has
> made some changes to their code recently.
>
> -Patrick
>
> >>> "Theodore stout"  10/24/01 02:02AM >>>
> I got the same access-lists on both sides and they have been verified by
> other people.  I know this will not take me down.
>
> If you can e-mail me the config it would be great!  I would like to see
how
> it works in real life.  So far 2 ISPs have failed to give me a working
> config.  Everything is theoritical and promises but it doesn't work like
> Checkpoint.
>
>  What I am fearing is that it is the command "Global (outside) 1
interface),
> that is giving me the grief.  I think that I will need another IP address
> for PAT instead of using the same IP for the interface and PAT.  In your
> response, you said that the negociation is between (an) public IP address.
> Yes this is true, but what if it is the same as the interface?
>
> So far I have only seen this work with a pool a public IPs.Hansraj Patil
> wrote:
> >
> > I have seen this working. You have to use
> >
> > nat (inside) 0 access-list 101.
> >
> > The IPSec & IKE negotiation is between public IP address. So
> > the question of
> > port limitation
> > does not arise. The internal IP addresses are not involved in
> > IPSec
> > negotiation.
> > You use above statement to avoid routing problem between two
> > LAN segments.
> >
> > Just make sure access-list is mirror image on both peers.
> >
> >
> >
> > -----Original Message-----
> > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
> > Sent: Monday, October 22, 2001 1:41 AM
> > To: [EMAIL PROTECTED]
> > Subject: Re: PIX with PAT and VPN [7:23490]
> >
> >
> > I tried this and it did not work.   When IPSEC negociates a VPN
> > session
> > between the two PIX's, it will PAT an internal device from
> > Network A as
> > 206.112.71.5 and use 206.112.71.5:500 for the negociation.
> > Once another
> > device wishes to access a device behind 206.112.71.6, it will
> > have to use
> > 206.112.71.5:500 as well.  Cisco IPSEC will only allow one port
> > 500 per IP.
> > This means the original device will be moved from port 500 to a
> > different
> > port.  IPSEC only uses port 500 for the negociation and
> > therefore the
> > original connection fails.
> >
> > I did as you said but I added another command like this.
> >
> > Global (outside) 1 interface
> > nat (inside) 1 0.0.0.0 0.0.0.0 0 0.
> > Nat (inside) 0 access-list 101
> >
> > Access-list 101 is the traffic to be encrypted.  I have tried
> > not to use PAT
> > with encrypted data because of the IP:Port limitation problem.
> > However, it
> > still won't work.
> >
> > Any more suggestions?[EMAIL PROTECTED] wrote:
> > >
> > > With PIX you must have one legal address for the outside
> > > interface on BOTH
> > > PIXs.  That's actually enough to do what you want to do.  Say
> > > that your
> > > legal address on PIX1 is 206.112.71.5/30.  Go to PIX2 startup
> > > ipsec and
> > > input  "isakmp key 'your key' address 206.112.71.5".  Then
> > > input "crypto
> > > map 'your map-name' 'your sequence number' set peer
> > > 206.112.71.5"
> > > Say that your legal address on PIX2 is 206.112.71.6/30.  Go to
> > > PIX1 startup
> > > ipsec and input  "isakmp key 'your key' address 206.112.71.6"
> > > Then input
> > > "crypto map 'your map-name' 'your sequence number' set peer
> > > 206.112.71.6"
> > >
> > > Now on PIX1 input nat (inside) 1 0.0.0.0 0.0.0.0 0 0.    Then
> > > input global
> > > (outside) 1 206.112.71.5
> > > Now on PIX2 input nat (inside) 1 0.0.0.0 0.0.0.0 0 0.    Then
> > > input global
> > > (outside) 1 206.112.71.6
> > > Now just complete your isakmp and crypto-map settings and you
> > > will be doing
> > > one single VPN between peers and PAT to the Internet.  That's
> > > the best you
> > > can do on PIX with only a 30 bit legal subnet mask.
> > >
> > > John Squeo
> > > Technical Specialist
> > > Papa John's Corporation
> > > (502) 261-4035
> > >
> > >
> > >
> > >
> > > "Theodore
> > >                     stout"               To:
> > > [EMAIL PROTECTED]
> > >                      cc:
> > >                     tudy.com>            Subject:     PIX with
> > > PAT and VPN [7:23490]
> > >                     Sent
> > > by:
> > >
> > > nobody@groupst
> > >
> > > udy.com
> > >
> > >
> > >                     10/19/01
> > > 02:23
> > >
> > > AM
> > >                     Please
> > > respond
> > >                     to
> > > "Theodore
> > >
> > > stout"
> > >
> > >
> > >
> > >
> > >
> > >
> > > Hello everyone.
> > >
> > > I am trying to implement 2 Internet connectivity solutions
> > > while at the
> > > same
> > > time creating 2 VPN solutions between two sites.  What I would
> > > like to do
> > > it
> > > use a PIX 515 at both sites, tunnel IPSEC between the sites
> > and
> > > still have
> > > normal access to the Internet.
> > >
> > > What my problem is that I only have one IP address per-site.
> > > In all of the
> > > solutions provided by Cisco, I would need a pool of registered
> > > IP addresses
> > > for NAT.  PAT is not even possible.
> > >
> > > I know that this  VPN-PAT-FW1FW1-PAT-VPN solution is available
> > > with
> > > Checkpoint.  However, I would prefer a Cisco only solution.
> > >
> > > Any suggestions?
> > >
> > > Theodore Stout
> > > Security Engineer
> > > CCSE, CCNA, MCSE




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=24023&t=23490
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to