Hi,
I have seen the following option on the Cisco ASA and Fortigate. NAT-T I always leave this option unselected.
When would you use this option as I thought between site to site IPSEC you don't NAT and create a policy or ACL to define the interesting traffic. You don't want it to NAT to a public IP correct?
I'm guessing lets say you have a LAN subnet of 192.168.1.0 /24 it will NAT this to another private IP as it goes other the tunnel?
Why would you ever want to do this is it if both the LAN's are on the same subnet? also does this option have to be enabled at each side for the tunnel to come up?