<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA ESP issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001251#M940571</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your VPN client,ATT connection properties, transport tab,  where you have checked off if you do &lt;B&gt;Enable Transparent Tunneling&lt;/B&gt; choose &lt;B&gt;Ipsec over UDP (NAT/PAT)&lt;/B&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Mar 2008 16:47:55 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-03-21T16:47:55Z</dc:date>
    <item>
      <title>ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001248#M940568</link>
      <description>&lt;P&gt;We have a new ASA, there are no firewall rules associated to the inside interface.  Our finance department has to run the AT&amp;amp;T net client to connect with Medicare, this now fails.  On the ASA I get an error that says 3|Mar 20 2008|10:41:39|305006|12.64.175.2||regular translation creation failed for protocol 50 src inside:10.0.50.30 dst outside:12.64.175.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT-T is on the firewall and I also tried the inspect ipsec pass through to no avail.  Any other suggestions?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:20:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001248#M940568</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2019-03-11T12:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001249#M940569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;on the remote VPN server either enable NAT-T or on create a 1-1 static on the firewall opening ESP and UDP-500 on the firewall&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 15:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001249#M940569</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-03-21T15:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001250#M940570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have control of the remote end, it's medicare.  Is there anything else I can do on my end to make this work short of doing static NAT's?  It used to work on my netscreen firewall somehow only since switching to the ASA has it broke.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 15:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001250#M940570</guid>
      <dc:creator>boshardy1</dc:creator>
      <dc:date>2008-03-21T15:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001251#M940571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your VPN client,ATT connection properties, transport tab,  where you have checked off if you do &lt;B&gt;Enable Transparent Tunneling&lt;/B&gt; choose &lt;B&gt;Ipsec over UDP (NAT/PAT)&lt;/B&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 16:47:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001251#M940571</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-03-21T16:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001252#M940572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jorge..this would still not work..by default enable transparent tunneling is enabled..here the problem is since the remote server doesn't want to enable NAT-TRansparency therefore the ESP packet would never be encapsulated over udp 4500 and there ESP would not be able to PAT...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;only way to get this working is 1-1 static or NAT traversal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 17:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001252#M940572</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-03-21T17:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001253#M940573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;completely agree, you are right.. wander what happened to my cup of coffey..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 17:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001253#M940573</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-03-21T17:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001254#M940574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One of the things to keep in mind when switching from one firewall vendor, Juniper,&lt;/P&gt;&lt;P&gt;to another firewall vendor, Cisco, is that &lt;/P&gt;&lt;P&gt;different device can handle things &lt;/P&gt;&lt;P&gt;differently. Devices such as juniper or&lt;/P&gt;&lt;P&gt;netscreen has the ability to do "IPSec &lt;/P&gt;&lt;P&gt;pass-through" that devices such as Pix or&lt;/P&gt;&lt;P&gt;ASA can NOT.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That being said, if you replace the ASA&lt;/P&gt;&lt;P&gt;with a Cisco IOS router with the ability&lt;/P&gt;&lt;P&gt;to do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.1.1 500 interface F0/0 500&lt;/P&gt;&lt;P&gt;ip nat inside source static esp 192.168.1.1 interface F0/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 192.168.1.1 is the host beind the router.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will enable the client to connect via &lt;/P&gt;&lt;P&gt;ESP.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is very unfortunate that ASA can not do&lt;/P&gt;&lt;P&gt;this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 19:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001254#M940574</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-03-21T19:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001255#M940575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"IPSec pass-through" that devices such as Pix or&lt;/P&gt;&lt;P&gt;ASA can NOT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA can do IPSEC pass  through but you cannot port address translate an ESP packet, thats the reason NAT-Transparency came in picture which means if VPN server has it enabled it detects the client to be behind PAT device and the clients starts encapsulating ESP over UDP which can PATTED now...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope it answers !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 20:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001255#M940575</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2008-03-21T20:14:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001256#M940576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what I meant to say is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static udp 192.168.1.1 500 interface F0/0 500 &lt;/P&gt;&lt;P&gt;ip nat inside source static esp 192.168.1.1 interface F0/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can ASA do this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Mar 2008 20:17:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001256#M940576</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-03-21T20:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001257#M940577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA does support IPSec pass-through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1522169" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/inspect.html#wp1522169&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Mar 2008 01:31:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001257#M940577</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2008-03-23T01:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA ESP issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001258#M940578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh, and also, run 7.2 software, i think i remember something about some bugs with the ipsec inspect before this release.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Mar 2008 01:34:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-esp-issue/m-p/1001258#M940578</guid>
      <dc:creator>jan.nielsen</dc:creator>
      <dc:date>2008-03-23T01:34:46Z</dc:date>
    </item>
  </channel>
</rss>

