Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    PfSense to Cisco ASA VPN NAT Not Working

    NAT
    1
    2
    1.4k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • B
      brent_rtz
      last edited by

      Greetings,

      I searched the forums for a similar problem and haven't found one I understand.

      The gist:

      We have a client with a Cisco ASA and we have a pfSense router with firmware version 2.1.2. I have the Phase 1 tunnel setup and connected. The Phase 2 with NAT seems to be the problem.

      The client uses the same subnet we do internally (192.168.22.0) and requested that I NAT 192.168.125.41 > 192.168.22.41 – our internal server; the server I'm trying to communicate with on the Cisco ASA side is 192.168.3.2.

      So, Phase 1 works and the tunnel is up.

      Local IP: 192.168.22.41
      Remote IP 192.168.3.2

      Suggested NAT: 192.168.125.41 > 192.168.22.41

      The client says that they can see packets leave their side, but they're not returned.

      IPsec: SPD

      Source Destination Direction Protocol Tunnel endpoints
      192.168.3.2 192.168.125.41 ESP X.X.X.X -> X.X.X.X
      192.168.22.41 192.168.3.2 ESP X.X.X.X -> X.X.X.X
      192.168.22.0/24 192.168.3.2 ESP X.X.X.X -> X.X.X.X

      I greatly appreciate any assistance with this problem.

      I can't seem to attach screenshots without the post failing.

      1 Reply Last reply Reply Quote 0
      • B
        brent_rtz
        last edited by

        For some reason the IP address I used initially wouldn't connect to the remote side. I changed the IP and we now have a working tunnel, except that the remote side cannot ping nor communicate with mine via NAT. I can ping and talk to their side, but not them to mine.

        I have IPsec firewall rules that allow everything just to eliminate that part.

        IPv4 TCP/UDP * * * * * none    
        IPv4 ICMP * * * * * none

        I have an IPsec NAT:

        IPsec X.X.X.X 192.168.125.193 192.168.22.193

        For Phase 2 I have:

        Local Network: LAN Subnet
        NAT/BINAT: Address 192.168.125.193
        Remote Network: 192.168.3.14

        The remote side has a subnet on their LAN the same as our 192.168.22.0/24 so we need to NAT 192.168.125.0.

        Is there something really obvious I'm missing? I feel dumb and frustrated.

        1 Reply Last reply Reply Quote 0
        • First post
          Last post
        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.