NAT Over IPSec VPN in uOS 1.31






The NAT Over IPSec VPN feature in uOS 1.31 allows network administrators to use Network Address Translation (NAT) inside an IPSec VPN tunnel. This is crucial for:
This feature is now available for policy-based VPNs, while route-based VPNs have already supported NAT in previous versions.
1. Type of Types of NAT Over IPSec VPN
SNAT = Outbound SNAT
- SNAT can translate a subnet or a single IP to a single mapped IP
1:1 NAT = Outbound SNAT + Inbound DNAT
- This requires a single IP-to-single IP or subnet-to-subnet mapping with a 1:1 ratio
2. NAT Over IPSec VPN Scenarios
There are two main reasons to use NAT within an IPSec VPN tunnel:
Scenario 1: Concealing Internal Network Subnets
- Used when you do not want the remote site to see your real internal subnet
- Example:
- Actual internal IP: 192.168.10.0/24
- NAT-mapped IP for VPN peer: 192.168.118.0/24
Scenario 2: Avoiding Overlapping Subnets
- Used when both networks have the same subnet range
- Example:
- Site A Local Network:192.168.169.0/24
- Site B Local Network:192.168.169.0/24 (Overlapping)
Using NAT, Site A can map its subnet to 192.168.30.0/24 before sending over VPN.
3. How to Setup NAT Over IPSec VPN
Example: VPN from Branch A to Branch B with Hidden Subnets
- Branch A:192.168.10.0/24 → NAT to 192.168.118.0/24
Configuration Steps:
- Create Policy-Based VPN Rules for each branch
- Specify the NAT subnet in the Local Subnet field
- In Advanced Settings, enable SNAT
- Define the "Original" and "Mapped" subnets on Branch A
Original IP: 192.168.10.0/24 and Mapped IP: 192.168.118.10/32 with SNAT.
4. How to Setup Overlapping Subnets Using NAT Over IPSec VPN
Example: Site A & Site B Both Use 192.168.169.0/24 VPN Networks are overlapping
- Site A:192.168.169.0/24 → NAT to 192.168.20.0/24
- Site B:192.168.169.0/24 → NAT to 192.168.30.0/24
Configuration Steps:
- Create Policy-Based VPN Rules for each branch
- Specify the NAT subnet in the Local Subnet field
- In Advanced Settings, enable 1: 1 NAT
- Define the "Original" and "Mapped" subnets on both sites
Site A Original IP: 192.168.169.0/24 and Mapped IP: 192.168.20.0/24 with 1:1 NAT
Site B Original IP: 192.168.169.0/24 and Mapped IP: 192.168.30.0/24 with 1:1 NAT
Now, Site A and Site B communicate using their NAT IPs without conflicts.
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 152 Nebula Ideas
- 102 Nebula Status and Incidents
- 5.8K Security
- 305 USG FLEX H Series
- 283 Security Ideas
- 1.5K Switch
- 77 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 255 Service & License
- 396 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.7K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 77 Security Highlight