okay I have written an ACL that permits internal hosts access to the outside. I also have a DMZ which VPN traffic should be routed to, and which should not be natted. I understand that I can create and ACL for the traffic to be natted and apply it to the inside interface, and then create a second ACL to be used with the no nat command, and that this doesnt need to be bound to an interface.
Do I still need to put the VPN peers in the first ACL so they are permited thought the interface
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...