Hello,
we need to enstablish multiple IPSEC VPN on PIX.
The problem I have is related to ACLs and NAT.
I guess I have to create an ACL for any VPN tunnel, but then how do I prevent NAT on those traffic?
for example:
If I have 2 VPN associated to ACL 110 and 120 respectively:
access-list 110 permit ip 10.0.4.0 255.255.255.0 192.168.50.0 255.255.255.0
access-list 120 permit ip 192.168.170.0 255.255.255.0 192.168.175.0 255.255.255.0
how do I prevent NAT for those ACLs?
I see that I can only have one of this sentence:
nat (inside) 0 access-list 110
I cannot have both:
nat (inside) 0 access-list 110
nat (inside) 0 access-list 120
Furthermore I have the NAT rule for the internal private addresses: nat (inside) 1 10.0.0.0 255.0.0.0 0 0
Why I cannot have NAT 0 to both ACLs?
And how can I solve this?
It doesn't work with a single rule of nat, because I get this error "No translation group found for....."
does anybody have a solution for this?
thanks
Silvia
we need to enstablish multiple IPSEC VPN on PIX.
The problem I have is related to ACLs and NAT.
I guess I have to create an ACL for any VPN tunnel, but then how do I prevent NAT on those traffic?
for example:
If I have 2 VPN associated to ACL 110 and 120 respectively:
access-list 110 permit ip 10.0.4.0 255.255.255.0 192.168.50.0 255.255.255.0
access-list 120 permit ip 192.168.170.0 255.255.255.0 192.168.175.0 255.255.255.0
how do I prevent NAT for those ACLs?
I see that I can only have one of this sentence:
nat (inside) 0 access-list 110
I cannot have both:
nat (inside) 0 access-list 110
nat (inside) 0 access-list 120
Furthermore I have the NAT rule for the internal private addresses: nat (inside) 1 10.0.0.0 255.0.0.0 0 0
Why I cannot have NAT 0 to both ACLs?
And how can I solve this?
It doesn't work with a single rule of nat, because I get this error "No translation group found for....."
does anybody have a solution for this?
thanks
Silvia