01-13-2023 09:09 AM
We have a remote site which is behind the NAT device. We turned of NAT-Traversal with no crypto isakmp nat-traversal.
Can we enable NAT-T on tunnel base instead of enabling this globally?
01-13-2023 09:14 AM
@gongya it's globally enabled on the ASA by default. You can disable NAT-T for a peer, example:
crypto map CMAP 10 set nat-t-disable
Ensure you configure this command under the correct sequence number.
Or via ASDM - navigate to Configuration > Site-to-Site VPN > Advanced > Crypto Maps , select your crypto map, click Edit , click the Tunnel Policy (Crypto Map) - Advanced tab, and then uncheck the Enable NAT-T check box.
01-13-2023 09:21 AM
we have this "no crypto isakmp nat-traversal" configured. So this means we have NAT-T disabled globally. Can we enable NAT-T on a specific tunnel ?
thanks so much !!
01-13-2023 09:24 AM
enable or disable if the peer is not behind NAT then it have no effect.
so can I ask why you want to disable it ??
01-13-2023 09:33 AM
At the beginning we disabled for some reasons. Right now one remote site requests this, as their VPN device is behind the NAT device. So we need to enable it. Based on the information from Cisco, the existing VPN might be flap when you enable it globally. So we are just wondering whether we can just enable for that specific VPN.
thanks !!
01-13-2023 09:31 AM
01-13-2023 09:40 AM
Anyway to enable NAT-T on a specific VPN with this "no crypto isakmp nat-traversal" configured?
thanks !!
01-13-2023 09:43 AM
@gongya the ASA documentation I've read doesnt explictly state you can enable per peer, only disable. Without testing I am not sure you can explictly enable per peer - the ASA expects nat-t to be enabled globally and disable per peer.
So what you could do is explictly disable nat-t for all other peers (as per the example provided above) and then enable globally to achieve the desired outcome.
01-13-2023 09:45 AM
I agree with Mr @Rob Ingram , and hence I will run lab to check how can we config two isakmp profile or policy for IKEv1.
I will update you.
01-13-2023 09:49 AM
@MHM Cisco World wrote:
I agree with Mr @Rob Ingram , and hence I will run lab to check how can we config two isakmp profile or policy for IKEv1.
I will update you.
@MHM Cisco World isakmp profile? ... @gongya is using an ASA.
01-14-2023 08:26 PM
thanks so much !!
01-13-2023 09:40 AM
if so then
config two isakmp profile,
one with enable NAT-T
other with disable NAT-T
01-13-2023 09:44 AM
Can you give an example ? thanks !!
01-13-2023 09:59 AM
@gongya perhaps try this...
Disable for the peers you wish it to be explictly disabled for. Obviously change the name and sequence numbers to fit your environment.
crypto map CMAP 10 set nat-t-disable
crypto map CMAP 11 set nat-t-disable
Enable globally
crypto isakmp nat-traversal
01-13-2023 10:01 AM - edited 01-13-2023 10:02 AM
as Mr @Rob Ingram mention below,
you can use ONE crypto map with TWO Seq
seq 1 enable NAT-T <<- set peer that need NAT-T
seq 2 disable NAT-T <<- set peer that need no NAT-T
then apply this crypto map to OUT interface
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide