<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: port 4500 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-4500/m-p/1665016#M557663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It really depends on whether there is NAT or not between the 2 IPSec VPN sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, here is the IPSec VPN protocol:&lt;/P&gt;&lt;P&gt;- UDP/500 (Phase 1)&lt;/P&gt;&lt;P&gt;- ESP protocol (Phase 2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And since ESP protocol can't be NATed as it is not a TCP or UDP port, but a protocol, you can enable the VPN peer with NAT-T (NAT-Transparency) which by default run on UDP/4500. It encapsulates the ESP procotol into UDP/4500 so it can be NATed if it's required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, the IPSec VPN protocol is:&lt;/P&gt;&lt;P&gt;- UDP/500 (Phase 1)&lt;/P&gt;&lt;P&gt;- UDP/4500 (Phase 2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 17 Apr 2011 22:21:40 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-04-17T22:21:40Z</dc:date>
    <item>
      <title>port 4500</title>
      <link>https://community.cisco.com/t5/network-security/port-4500/m-p/1665015#M557652</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;if y need to enable VPN IPSec through the firewall. y just need to need to allow the port 4500?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-4500/m-p/1665015#M557652</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2019-03-11T20:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: port 4500</title>
      <link>https://community.cisco.com/t5/network-security/port-4500/m-p/1665016#M557663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It really depends on whether there is NAT or not between the 2 IPSec VPN sites.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default, here is the IPSec VPN protocol:&lt;/P&gt;&lt;P&gt;- UDP/500 (Phase 1)&lt;/P&gt;&lt;P&gt;- ESP protocol (Phase 2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And since ESP protocol can't be NATed as it is not a TCP or UDP port, but a protocol, you can enable the VPN peer with NAT-T (NAT-Transparency) which by default run on UDP/4500. It encapsulates the ESP procotol into UDP/4500 so it can be NATed if it's required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, the IPSec VPN protocol is:&lt;/P&gt;&lt;P&gt;- UDP/500 (Phase 1)&lt;/P&gt;&lt;P&gt;- UDP/4500 (Phase 2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Apr 2011 22:21:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-4500/m-p/1665016#M557663</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-04-17T22:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: port 4500</title>
      <link>https://community.cisco.com/t5/network-security/port-4500/m-p/1665017#M557675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks Halim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 18:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-4500/m-p/1665017#M557675</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-04-18T18:36:46Z</dc:date>
    </item>
  </channel>
</rss>

