NAT without braking current IPSec

Showing results for 
Show  only  | Search instead for 
Did you mean: 

NAT without braking current IPSec

L1 Bithead

Hi All, 


Need some help regarding my dilemma.

IPsec tunnel between Site A and Site B.

Static route for this tunnel is setup to forward traffic to only on subnet (10.100.x.x).

I am working on updating patches on server that is under Site A.

I need a solution to allow traffic from internet site to the server IP that is on Site A.


is there a NAT policy that i can deploy which will not break the connection with IPsec but will allow traffic from outside to the server's IP?

Thank you for your help.


Community Team Member

Hi @mike.07 ,


Are you looking for a NAT rule to allow public access to the public IP of the server? 


LIVEcommunity team member
Stay Secure,
Don't forget to Like items if a post is helpful to you!

Please help out other users and “Accept as Solution” if a post helps solve your problem !

Read more about how and why to accept solutions.

L1 Bithead

Hi @mike.07, it would be useful if you could provide a little more info on your setup - or a diagram please.

Finding it hard to visualise what you are trying to do.



L0 Member


What about a route from the internal server to the updates server and NAT to specific destination instead of internet nat 

that could work , 

although as DavePalo said, it is hard to visualize, can you share some screen shot if possible or a diagram 

Hope that helped 

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!