<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need to set NAT Traversal with 1:1 NAT? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4583966#M1088861</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1294251"&gt;@kay.kang&lt;/a&gt; NAT-T needs to be enabled on both ends, it should be enabled as default. Both devices will attempt to discover if NAT is used and if so, NAT-T will ensure the packets are encapsulated using UDP/4500 instead of ESP.&lt;/P&gt;</description>
    <pubDate>Fri, 01 Apr 2022 15:47:47 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2022-04-01T15:47:47Z</dc:date>
    <item>
      <title>Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4583942#M1088860</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to use 1:1 Static NAT on NAT enabled device.&lt;/P&gt;&lt;P&gt;There is a firewall behind the NAT enabled device, which will have IPSec setup.&lt;/P&gt;&lt;P&gt;Do I need to set up NAT-T(Traversal) on the firewall in this case using 1:1 Static NAT??&lt;/P&gt;&lt;P&gt;As far as I understand, NAT-T needs to be set when use PAT(Dynamic Port Address Translation).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 15:24:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4583942#M1088860</guid>
      <dc:creator>kay.kang</dc:creator>
      <dc:date>2022-04-01T15:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4583966#M1088861</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1294251"&gt;@kay.kang&lt;/a&gt; NAT-T needs to be enabled on both ends, it should be enabled as default. Both devices will attempt to discover if NAT is used and if so, NAT-T will ensure the packets are encapsulated using UDP/4500 instead of ESP.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 15:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4583966#M1088861</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-04-01T15:47:47Z</dc:date>
    </item>
    <item>
      <title>Re: Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584033#M1088864</link>
      <description>&lt;P&gt;Asa1-nat-internet-asa2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you config peer in asa2 as nat ip of asa1 then you must config static 1:1 PAT&amp;nbsp;&lt;/P&gt;&lt;P&gt;"This PAT open port for esp and 4500"&lt;BR /&gt;NAT-T Must enable&lt;BR /&gt;simply NAT-T match the identity of ASA1 with the IP source header in IPSec packet.&lt;BR /&gt;if not match the IPSec failed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2022 22:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584033#M1088864</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-01T22:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584136#M1088868</link>
      <description>&lt;P&gt;Hi Rob,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;do you mean NAT-T should also be enabled with the case of using 1:1 Static NAT, which will map the dedicate IP address to the firewall’s private IP address from NAT pool.&lt;/P&gt;&lt;P&gt;I understand NAT-T should be enabled with the case of using PAT, which will translate port number because ESP doesn’t have transport layer encapsulation.&lt;/P&gt;&lt;P&gt;Do we have to care about port translation if we use 1:1 Static NAT using NAT pool?&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2022 00:14:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584136#M1088868</guid>
      <dc:creator>kay.kang</dc:creator>
      <dc:date>2022-04-02T00:14:19Z</dc:date>
    </item>
    <item>
      <title>Re: Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584140#M1088869</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not talking about Static PAT.&lt;/P&gt;&lt;P&gt;I also know NAT-T should be enabled with the case of using PAT because ESP packet doesn’t have transport layer encapsulation.&lt;/P&gt;&lt;P&gt;As reason why want to use 1:1 Static NAT, I don’t want to set static port map.&lt;/P&gt;&lt;P&gt;My question was about the case of using 1:1 Static NAT.&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2022 00:19:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584140#M1088869</guid>
      <dc:creator>kay.kang</dc:creator>
      <dc:date>2022-04-02T00:19:29Z</dc:date>
    </item>
    <item>
      <title>Re: Need to set NAT Traversal with 1:1 NAT?</title>
      <link>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584192#M1088870</link>
      <description>&lt;P&gt;even if you use static NAT you&lt;BR /&gt;&lt;STRONG&gt;need NAT-T&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;ASA1-NAT-Internet-ASA2&lt;BR /&gt;&lt;BR /&gt;ASA2 receive the IPSec packet with the IP address &lt;STRONG&gt;"mapped not real"&lt;/STRONG&gt; as source of these packets&lt;BR /&gt;ASA2 then validate the ID of ASA1 which is &lt;STRONG&gt;"real"&lt;/STRONG&gt; IP address&lt;BR /&gt;it will check IPSec Header IP and ID with your config&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;if the NAT-T is disable this check is failed&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;if the NAT-T is enable this check is success&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Apr 2022 15:33:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-to-set-nat-traversal-with-1-1-nat/m-p/4584192#M1088870</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-04-03T15:33:50Z</dc:date>
    </item>
  </channel>
</rss>

