<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC pass through and policy based NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-pass-through-and-policy-based-nat/m-p/1961073#M400995</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First you don't need AH. It's not used for VPNs any more. And you don't need to NAT ESP. If both IPSec-devices are NAT-Traversal enabled, then the whole ESP-communication is encapsulated in UDP/4500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Aug 2012 11:20:03 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2012-08-10T11:20:03Z</dc:date>
    <item>
      <title>IPSEC pass through and policy based NAT</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-pass-through-and-policy-based-nat/m-p/1961072#M400994</link>
      <description>&lt;P&gt;I intended to share one of my Public IP addresses between two services&lt;/P&gt;&lt;P&gt;1: A HTTPS service on my inside network accessed from the Internet&lt;/P&gt;&lt;P&gt;2 An IPSEC tunnel terminating on an internal device (other end is 4.2.2.2 on the Internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I realised ESP and AH would also be needed.&lt;/P&gt;&lt;P&gt;I read up on inspect ipsec-pass-thru however, my first impression is that I will have no choice but to use 1 public IP for the IPSEC pass-through and not be able share it with anything else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e.&lt;/P&gt;&lt;P&gt;(inside,outside) tcp 1.2.3.4 443 10.1.2.3 443 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;(inside,outside) udp 212.44.8.217 443 10.44.4.248 500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;(inside,outside) udp 212.44.8.217 443 10.44.4.248 4500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;And, this is where I am stuck. I realise I need to NAT ESP and AH between 4.2.2.2 and 10.1.2.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Help!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:40:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-pass-through-and-policy-based-nat/m-p/1961072#M400994</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2019-03-11T23:40:37Z</dc:date>
    </item>
    <item>
      <title>IPSEC pass through and policy based NAT</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-pass-through-and-policy-based-nat/m-p/1961073#M400995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First you don't need AH. It's not used for VPNs any more. And you don't need to NAT ESP. If both IPSec-devices are NAT-Traversal enabled, then the whole ESP-communication is encapsulated in UDP/4500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 11:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-pass-through-and-policy-based-nat/m-p/1961073#M400995</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-08-10T11:20:03Z</dc:date>
    </item>
  </channel>
</rss>

