<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy NAT for AH/ESP and tcp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952868#M402064</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;is it possible to policy NAT for AH/ESP and tcp on the same single IP address (two different protocol types)?&lt;/P&gt;&lt;P&gt;Objective = pass an IPSEC VPN through (not terminate) an ASA 5500 and share that public with another circuit.&lt;/P&gt;&lt;P&gt;i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.2.3.4 25 172.20.1.1 8080 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!NAT anything arriving on my public 1.2.3.4 with dst port 25 to 172.20.1.1 port 8080 inside my LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) AH 1.2.3.4&amp;nbsp; 172.20.1.2 AH netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) ESP 1.2.3.4&amp;nbsp; 172.20.1.2 ESP netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 1.2.3.4&amp;nbsp; 500 172.20.1.2 500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 1.2.3.4 4500 172.20.1.2 4500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!Pass an IPSEC tunnel through firewall to termination point 172.20.1.2 = 1.2.3.4 can be used for two circuits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:31:15 GMT</pubDate>
    <dc:creator>geraghtyconor</dc:creator>
    <dc:date>2019-03-11T23:31:15Z</dc:date>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952868#M402064</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;is it possible to policy NAT for AH/ESP and tcp on the same single IP address (two different protocol types)?&lt;/P&gt;&lt;P&gt;Objective = pass an IPSEC VPN through (not terminate) an ASA 5500 and share that public with another circuit.&lt;/P&gt;&lt;P&gt;i.e.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.2.3.4 25 172.20.1.1 8080 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!NAT anything arriving on my public 1.2.3.4 with dst port 25 to 172.20.1.1 port 8080 inside my LAN&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) AH 1.2.3.4&amp;nbsp; 172.20.1.2 AH netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) ESP 1.2.3.4&amp;nbsp; 172.20.1.2 ESP netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 1.2.3.4&amp;nbsp; 500 172.20.1.2 500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 1.2.3.4 4500 172.20.1.2 4500 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!Pass an IPSEC tunnel through firewall to termination point 172.20.1.2 = 1.2.3.4 can be used for two circuits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:31:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952868#M402064</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2019-03-11T23:31:15Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952869#M402066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I.e. I want to use one of my Public facing IP addresses to accept two circuits for static NAT&lt;/P&gt;&lt;P&gt;1 To NAT an IPSEC circuit to a IPSEC termination device on my private LAN (AH, ESP, udp 500 and udp 4500)&lt;/P&gt;&lt;P&gt;2: To NAT a tcp circuit to a different device on my private network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or;&lt;/P&gt;&lt;P&gt;Can the ASA 5500 policy NAT the above on one IP address on my outside interface to two inside devices (tcp traffic to device A and IPSEC traffic to device B) ???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 14:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952869#M402066</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2012-07-16T14:57:36Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952870#M402068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I suggest you to use Access-list based policy nat to achive your 1st query. Please clarify me if your requirement is something else.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2012 16:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952870#M402068</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-16T16:08:22Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952871#M402070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I want to use 1 public IP address NATTed to 2 internal private IP addresses.&lt;/P&gt;&lt;P&gt;1: NAT an IPSEC circuit terminating on 172.20.1.2 and appears as 1.2.3.4 on the Internet&lt;/P&gt;&lt;P&gt;2: NAT a tcp circuit to 172.20.1.1 8080 for traffic arriving on 1.2.3.4 on port 25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!Like this??&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit AH host 172.20.1.2 host 1.2.3.4 &lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit ESP host 172.20.1.2 host 1.2.3.4&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit UDP host 172.20.1.2 eq 500&amp;nbsp; host 1.2.3.4 eq 500&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit UDP host 172.20.1.2 eq 4500 host 1.2.3.4 eq 4500&lt;/P&gt;&lt;P&gt;!And the other circuit&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit tcp host 172.20.1.1 eq 8080 host 1.2.3.4 eq 25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.2.3.4 access-list policyNAT-share&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 07:18:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952871#M402070</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2012-07-17T07:18:15Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952872#M402072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can have the ACL like that i suggest you can go for PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list policyNAT-share&lt;/P&gt;&lt;P&gt;global (outside) 1 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so all the traffic matches the acl rule will get translated accordingly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;like the above and it should work then. Please try that let me know if that works or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rating if the given info helps you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 07:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952872#M402072</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-17T07:48:13Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952873#M402074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;!I have used global (outside) 1 and 2 already. This is what I was thinking.&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit AH host 172.20.1.2 host 1.2.3.4&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit ESP host 172.20.1.2 host 1.2.3.4&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit UDP host 172.20.1.2 eq 500&amp;nbsp; host 1.2.3.4 eq 500&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit UDP host 172.20.1.2 eq 4500 host 1.2.3.4 eq 4500&lt;/P&gt;&lt;P&gt;!And the other circuit&lt;/P&gt;&lt;P&gt;access-list policyNAT-share extended permit tcp host 172.20.1.1 eq 8080 host 1.2.3.4 eq 25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside) 3 access-list policyNAT-share&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 3 1.2.3.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!??????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 10:12:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952873#M402074</guid>
      <dc:creator>geraghtyconor</dc:creator>
      <dc:date>2012-07-17T10:12:29Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952874#M402076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; yes... you can make any number subjected to your present configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do rating if the given info helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2012 11:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952874#M402076</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-17T11:11:57Z</dc:date>
    </item>
    <item>
      <title>Policy NAT for AH/ESP and tcp</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952875#M402078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks Gera for your rating. Assuming that works for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 03:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-for-ah-esp-and-tcp/m-p/1952875#M402078</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2012-07-20T03:21:45Z</dc:date>
    </item>
  </channel>
</rss>

