02-20-2016 03:09 PM
Hi all,
I need to connect site-to-site VPN to a Cisco Meraki device, with my side is a Cisco ASA-X Firewall.
I was told by my client that the only way to establish to connect to their Meraki device is if i turn on "NAT-T NAT traversal" on my Cisco ASA-X
However, the only way i find to enable NAT traversal is to put crypto isakmp nat-traversal 3600 as a global command.
What i am worried is that since my current other site-to-site VPN tunnels on my ASA does not have NAT traversal, by enabling NAT traversal globally at my ASA, is this going to impact their tunnels?
Cheers,
Hunt
02-21-2016 01:18 PM
you can disable NAT-T on a per VPN basis. use the following as an example of how to.
crypto map outside_map 5 set nat-t-disable
--
Please remember to select a correct answer and rate helpful posts
02-21-2016 07:40 PM
Hello,
This is not going to impact your other tunnels at all!!!
This NAT-T functionality will allow the ASA to detect devices behind a NAT and will use UDP port 4500 instead of UDP 500.
The current peers that are not behind a nat device will just work as usual with UDP port 500.
If you would like to know more about how NAT-T works you can check this documentation:
https://supportforums.cisco.com/document/64281/how-does-nat-t-work-ipsec
Regards, please rate!
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide