<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC- Match identity address with NAT-T in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773342#M8047</link>
    <description>&lt;P&gt;Hi RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the explanation. Got it. Is there any command to find the relevant Public IP for this private IP from the configuration.&lt;/P&gt;</description>
    <pubDate>Sat, 05 Jan 2019 01:57:24 GMT</pubDate>
    <dc:creator>Srinivasan Nagarajan</dc:creator>
    <dc:date>2019-01-05T01:57:24Z</dc:date>
    <item>
      <title>IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773188#M8043</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;When using NAT-T, we're using Private address in the "&lt;SPAN&gt;match identity address" command. If we replace this private IP with the Public IP (1.2.3.4), the tunnel doesn't come up.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Can someone please assist how NAT-T working in the&amp;nbsp;match identity address&amp;nbsp;statements. Thanks in advance&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configs&lt;/P&gt;&lt;P&gt;====&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hub-Router #&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;crypto keyring OUR_KEYRING&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; pre-shared-key address&amp;nbsp;1.2.3.4&amp;nbsp;key &amp;lt;key&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto isakmp profile PROFILE_NAME&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; vrf TEST&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; keyring OUR_KEYRING&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp; match identity address&amp;nbsp;10.0.0.1&amp;nbsp;255.255.255.255&amp;nbsp; &amp;nbsp; ------&amp;gt;&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;crypto map OUR_MAP&amp;nbsp; ipsec-isakmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; set peer&amp;nbsp;1.2.3.4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; set isakmp-profile PROFILE_NAME&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sri&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773188#M8043</guid>
      <dc:creator>Srinivasan Nagarajan</dc:creator>
      <dc:date>2020-02-21T16:37:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773218#M8044</link>
      <description>&lt;P&gt;Check this link&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/ikev2-with-nat-t-and-vrf-flexvpn/td-p/2491237" target="_blank"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/ikev2-with-nat-t-and-vrf-flexvpn/td-p/2491237&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-does-nat-t-work-with-ipsec/ta-p/3119442" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-does-nat-t-work-with-ipsec/ta-p/3119442&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;just on site note ikev2 give you flexibility to use fqdn and email option in key container.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 19:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773218#M8044</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-04T19:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773220#M8045</link>
      <description>&lt;P&gt;Check this link&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/ikev2-with-nat-t-and-vrf-flexvpn/td-p/2491237" target="_blank"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/ikev2-with-nat-t-and-vrf-flexvpn/td-p/2491237&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://community.cisco.com/t5/security-documents/how-does-nat-t-work-with-ipsec/ta-p/3119442" target="_blank"&gt;https://community.cisco.com/t5/security-documents/how-does-nat-t-work-with-ipsec/ta-p/3119442&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;just on site note ikev2 give you flexibility to use fqdn and email option in key container.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jan 2019 19:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773220#M8045</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-04T19:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773256#M8046</link>
      <description>Hi,&lt;BR /&gt;When the router is behind a nat device the original packet is natted and adds a new ip header (with the public IP address), which is subsequently removed on the receiving end device leaving the original private IP address. Therefore the identity of the remote router will always be the physical IP address of the device, as it would not know what the NATTED ip address would be.&lt;BR /&gt;&lt;BR /&gt;As suggested in the other comment if you use IKEv2, use either fqdn, email or even certificate then it does not matter about the IP address.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 04 Jan 2019 20:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773256#M8046</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-04T20:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773342#M8047</link>
      <description>&lt;P&gt;Hi RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the explanation. Got it. Is there any command to find the relevant Public IP for this private IP from the configuration.&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 01:57:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773342#M8047</guid>
      <dc:creator>Srinivasan Nagarajan</dc:creator>
      <dc:date>2019-01-05T01:57:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773408#M8048</link>
      <description>&lt;P&gt;If you on the router give a command&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;show ip nat translation&lt;/P&gt;&lt;P&gt;show ip nat statistic&amp;nbsp;&lt;/P&gt;&lt;P&gt;show ip nat translation | i x.x.x.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if on firewall&lt;/P&gt;&lt;P&gt;show conn adress x.x.x.x detail&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 09:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773408#M8048</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-05T09:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773491#M8049</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;From one of the VPN peer routers, you can use the command &lt;EM&gt;&lt;STRONG&gt;show crypto session detail&lt;/STRONG&gt;&lt;/EM&gt;. This will identify the peer IP address (the public IP address) and the Phase_1 ID (the real/private IP address).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R2#show crypto session detail&lt;BR /&gt;Crypto session current status&lt;BR /&gt;&lt;BR /&gt;Code: C - IKE Configuration mode, D - Dead Peer Detection&lt;BR /&gt;K - Keepalives, N - NAT-traversal, T - cTCP encapsulation&lt;BR /&gt;X - IKE Extended Authentication, F - IKE Fragmentation&lt;BR /&gt;R - IKE Auto Reconnect&lt;BR /&gt;&lt;BR /&gt;Interface: GigabitEthernet0/0&lt;BR /&gt;Profile: ISAKMP_PROFILE&lt;BR /&gt;Uptime: 00:00:07&lt;BR /&gt;Session status: UP-ACTIVE&lt;BR /&gt;Peer: &lt;EM&gt;&lt;STRONG&gt;1.1.1.11&lt;/STRONG&gt;&lt;/EM&gt; port 4500 fvrf: (none) ivrf: (none)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Phase1_id: &lt;EM&gt;&lt;STRONG&gt;192.168.100.2&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can actually set the identity of the peers using fqdn on ISAKMP, so you don't necessarily need to change to IKEv2. IKEv2 does allow other identities however.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you could identify the routers as per this example (instead of the address):-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;crypto isakmp profile ISAKMP_PROFILE&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; keyring KEYRING&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; self-identity fqdn &lt;STRONG&gt;R2.lab.net&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp; match identity host domain lab.net&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would just change the self identity e.g R2.lab.net for each router&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The output of &lt;EM&gt;&lt;STRONG&gt;show crypto session detail&lt;/STRONG&gt;&lt;/EM&gt; would now identify the router's Phase_1 ID as the fqdn specified in the isakmp profile rather than the IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R2#sh crypto session&amp;nbsp; detail&lt;BR /&gt;&lt;BR /&gt;Interface: GigabitEthernet0/0&lt;BR /&gt;Profile: ISAKMP_PROFILE&lt;BR /&gt;Uptime: 00:03:35&lt;BR /&gt;Session status: UP-ACTIVE&lt;BR /&gt;Peer: 1.1.1.11 port 4500 fvrf: (none) ivrf: (none)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Phase1_id: &lt;EM&gt;&lt;STRONG&gt;R4.lab.net&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Desc: (none)&lt;BR /&gt;&lt;BR /&gt;HTH &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Jan 2019 15:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773491#M8049</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-05T15:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC- Match identity address with NAT-T</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773625#M8050</link>
      <description>&lt;P&gt;Hi RJI,&lt;/P&gt;&lt;P&gt;&amp;nbsp; Got it. Thank you very much. You're a Rock star &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jan 2019 06:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-match-identity-address-with-nat-t/m-p/3773625#M8050</guid>
      <dc:creator>Srinivasan Nagarajan</dc:creator>
      <dc:date>2019-01-06T06:40:42Z</dc:date>
    </item>
  </channel>
</rss>

