Outisde untrusted interface 22.214.171.124
Inside trusted interface 10.10.1.1
Wifi guest network inside 10.10.5.0/24
Most Global Protect corporate users go to ourvpn.foo.com 126.96.36.199.
WiFi users normally PAT to the Internet using that same interface IP 188.8.131.52. So all source addresses to the Internet appear to be 184.108.40.206. Like most guest networks the users have no access (for the most part) to internal IP private addresses. Just Internet.
But let's say that WiFi user 10.10.5.99 wants to to user Global Protect like the outside users so he can access internal resources. Is there a NAT that would say if you see traffic from the WiFi network destined for the external interface address 220.127.116.11 at VPN port whatever - instead of PATting it, terminate that traffic and create the tunnel just as is it had originated from the outside untrusted network. Is that possible?
Solved! Go to Solution.
you'll need a NAT rule at the top of your NAT policy that actually does not do NAT for that specific destination address
trust to untrust, destination ip 18.104.22.168 no-NAT
make sure it is placed above your default outbound NAT
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!