Ok so as I understand this doc, we only have to no-shutdown our free LAN ifaces on the routers, link the routers with a brand new cable, set the interfaces to a new subnet, create a crypto map to apply it to the new interfaces and then apply this block of code to each interface ( don't mind the example subnet example )
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...