<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC pass-thru in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-pass-thru/m-p/157026#M1062052</link>
    <description>&lt;P&gt;Does the newest IOS allow IPSEC to pass-thru??  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my situation.  I have have a 2514 with many internal addresses overloaded to one public address and Cisco VPN client doesn't work many to one translation.  What is my best bet??  &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 06:24:59 GMT</pubDate>
    <dc:creator>jcarson</dc:creator>
    <dc:date>2020-02-21T06:24:59Z</dc:date>
    <item>
      <title>IPSEC pass-thru</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-pass-thru/m-p/157026#M1062052</link>
      <description>&lt;P&gt;Does the newest IOS allow IPSEC to pass-thru??  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my situation.  I have have a 2514 with many internal addresses overloaded to one public address and Cisco VPN client doesn't work many to one translation.  What is my best bet??  &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-pass-thru/m-p/157026#M1062052</guid>
      <dc:creator>jcarson</dc:creator>
      <dc:date>2020-02-21T06:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC pass-thru</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-pass-thru/m-p/157027#M1062053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, 12.2(13)T should support this now.  See &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t13/ftnatesp.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122newft/122t/122t13/ftnatesp.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That command reference is horrible though, I think what it's trying to tell you is that you don't need to do anything on the router other than configure NAT overload, the router should do the rest for you automatically.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Dec 2002 05:18:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-pass-thru/m-p/157027#M1062053</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2002-12-09T05:18:40Z</dc:date>
    </item>
  </channel>
</rss>

