<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT problems in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664122#M1092444</link>
    <description>I'm looking at about 30 branch offices connecting to one HQ through VPN(using pat). The internet becomes very slow quickly and upon checking NAT the translations are getting to 131062 fast and capping there. What might be the problem?</description>
    <pubDate>Fri, 05 Aug 2022 08:05:49 GMT</pubDate>
    <dc:creator>DVRK</dc:creator>
    <dc:date>2022-08-05T08:05:49Z</dc:date>
    <item>
      <title>NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664122#M1092444</link>
      <description>I'm looking at about 30 branch offices connecting to one HQ through VPN(using pat). The internet becomes very slow quickly and upon checking NAT the translations are getting to 131062 fast and capping there. What might be the problem?</description>
      <pubDate>Fri, 05 Aug 2022 08:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664122#M1092444</guid>
      <dc:creator>DVRK</dc:creator>
      <dc:date>2022-08-05T08:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664352#M1092448</link>
      <description>&lt;P&gt;30 Site connect to HQ via VPN and you dont use Direct Internet Access that sure make HQ slow,&amp;nbsp;&lt;BR /&gt;all site when need to connect to Internet it send traffic to HQ. that bad idea.&lt;BR /&gt;I think the VPN is route-based, so you need to config Direct Internet Access in Branch Site (if they have FW or Zone FW) in Site edge.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 11:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664352#M1092448</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-08-05T11:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664364#M1092449</link>
      <description>&lt;P&gt;I am assuming you are tunneling all traffic through the HQ.&amp;nbsp; So, what device is the VPN being terminated on at the HQ and is this also the internet gateway?&amp;nbsp; How fast is your internet connection at the HQ office, and at the branch sites?&lt;/P&gt;
&lt;P&gt;If you have not scaled your hardware and internet connection to accommodate for this amount of traffic then the connection will be slow.&lt;/P&gt;
&lt;P&gt;If you have scaled your hardware and internet connection properly, then there might be a few users that are either streaming videos or downloading off the internet.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Aug 2022 12:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4664364#M1092449</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-05T12:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665766#M1092496</link>
      <description>&lt;P&gt;Thank you for the response. All&amp;nbsp; the branches have to connect through the HQ for internet.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 14:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665766#M1092496</guid>
      <dc:creator>DVRK</dc:creator>
      <dc:date>2022-08-08T14:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665770#M1092497</link>
      <description>&lt;P&gt;Yes all traffic is channeled through HQ and the device is Cisco router 4321. I guess the hardware have to be scaled to handle the traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 14:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665770#M1092497</guid>
      <dc:creator>DVRK</dc:creator>
      <dc:date>2022-08-08T14:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665867#M1092512</link>
      <description>&lt;P&gt;Do you have the HSEC license for you 4321 router?&amp;nbsp; Without the HSEC license you will be limited to 85 Mbps VPN traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 18:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665867#M1092512</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-08T18:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665870#M1092513</link>
      <description>&lt;P&gt;bro, 30 branch sites I would say it is time to design SD-WAN.&amp;nbsp; You can use inexpensive WAN links for SD-WAN and have smarter redundancy.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 18:07:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665870#M1092513</guid>
      <dc:creator>IP_Cartel</dc:creator>
      <dc:date>2022-08-08T18:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665960#M1092516</link>
      <description>&lt;P&gt;Ideally a new design would be the solution, but this would also mean a whole different price tag.&amp;nbsp; The HSEC license would better the situation as of right now, but for the long run a new design would be best.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Aug 2022 19:39:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4665960#M1092516</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-08-08T19:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problems</title>
      <link>https://community.cisco.com/t5/network-security/nat-problems/m-p/4666110#M1092524</link>
      <description>&lt;P&gt;&lt;A href="https://ciscocentral.blogspot.com/p/700-760-cisco-security-architecture-for.html" target="_self"&gt;Network Address Translation (NAT)&lt;/A&gt; therefore was introduced to overcome these addressing problems that occurred with the rapid expansion of the Internet.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Sep 2022 09:17:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problems/m-p/4666110#M1092524</guid>
      <dc:creator>alirafaleiro</dc:creator>
      <dc:date>2022-09-08T09:17:38Z</dc:date>
    </item>
  </channel>
</rss>

