Skip to main content

Connect devices behind NAT IP

What is NAT IP (Network Address Translation)? NAT (Network Address Translation) IP is an IP address translation mechanism that sits on a router or firewall. It converts private IP addresses inside an internal network into public IP addresses when communicating over the Internet, and vice versa.

Behind NAT IP feature for VPN Site-to-Site In some cases, a customer's VPN device does not have a public IP address assigned directly — it uses only a private IP inside the internal network (for example, placed behind a modem or ISP router). The Behind NAT IP feature of the VPN Site-to-Site service allows a device behind NAT to still initiate and maintain a VPN tunnel connection to the Internet.

How to connect a device behind NAT IP Step 1: In the menu, select Network, then select the VPN Site-to-Site tab. This page manages VPN Connections. Select Create VPN connection.

file

Select Initialize VPN Gateway. After the VPN Gateway is available, select it.

file

Step 2: Enter the configuration details:

file

The VPN Connection parameters consist of four main sections:

  • General Information (general connection details)
  • Remote VPN Information (encryption settings and customer-side information)
  • Dead Peer Detection (number of automatic retries when a connectivity issue occurs)
  • Advanced Information (advanced settings for connecting devices behind NAT)

Section 1: General information file

FieldDescription
VPN nameName of the VPN Connection.
DescriptionDescription of the VPN Connection.
Pre-shared keyThe shared security key between the two devices. You can generate a new key by selecting Refresh Key and copy it by selecting Copy.
Local IP publicPublic IP assigned by the FPT Cloud system.
Local private networksNetwork range of resources on FPT Cloud.

Section 2: Remote VPN Information file

  • Customer gateway name is the configuration at the other end of the connection — select the correct Customer Gateway you want to connect to in this step.
FieldDescription
Customer gateway
Customer gatewayThe configuration at the other end of the connection. Select the correct Customer Gateway you want to connect to in this step. If you do not have a Customer Gateway yet, click here/ for the setup guide.
ProvidersList of VPN connection providers to FCI.
IKE Policy
Authorization algorithmAlgorithm used to authenticate data during VPN connection establishment. Values: sha1, sha256, sha384, sha512, aes-xcbc. Use sha256 for a good balance of security and performance.
Encryption algorithmEncrypts the key negotiation process. Values: aes-128, aes-192, aes-256, aes-128-gcm-8, aes-128-gcm-12, aes-128-gcm-16, aes-192-gcm-8, aes-192-gcm-12, aes-192-gcm-16, aes-256-gcm-8, aes-256-gcm-12, aes-256-gcm-16. FCI recommends aes-256 for the best balance of security and performance. If you use ikev1, do not select gcm algorithms as they will cause issues with the VPN connection.
IKE versionSupported IKE versions. Values: ikev1, ikev2. FCI recommends ikev2 for most firewall devices. If you use older Cisco devices that only support ikev1, select ikev1.
Lifetime unitsUnit of measurement for the IKE connection lifetime. Default: second.
Lifetime valueSpecific lifetime value for Phase 1.
DH GroupDiffie-Hellman algorithm group used to generate the initial key exchange. Values: group_1, group_2, group_5, group_14, group_15, group_16, group_17, group_18, group_19, group_20, group_21.
Phase 1 negotiation modeHow the two devices establish a secure connection in Phase 1 of IKE. Values: main, aggressive (default: main).
IPSec Policy
Authorization algorithmAlgorithm used to authenticate data during VPN connection establishment. Values: sha1, sha256, sha384, sha512, aes-xcbc. Use sha256 for a good balance of security and performance.
Encapsulation modeMode in which data is encrypted and encapsulated before transmission. Default: tunnel.
Encryption algorithmEncrypts the actual data transmitted over the VPN. Values: aes-128, aes-192, aes-256. Use aes-256 for the best balance of security and performance.
Lifetime unitsDefault: second.
Lifetime valueThe duration an IPSec session is allowed to remain active before it must be re-established.
Perfect forward secrecyOption to ensure session key security (PFS — typically paired with a DH Group). Values: off, group_1, group_2, group_5, group_14, group_15, group_16, group_17, group_18, group_19, group_20, group_21. Use group_14 for a good balance of security.
Transform protocolProtocol used to define how encryption and authentication work in IPSec. Values: esp, ah.

About Providers

  • FCI currently supports pre-configured settings for the following providers: AWS, Fortigate, Palo Alto. FCI recommends using these settings for the best connection results.
Configuration parameterAWSFortigatePalo Alto
IKE Info
IKE versionikev2ikev2ikev2
Encryption algorithmaes-256aes-256aes-256
Authorization algorithmsha256sha256sha256
DH Groupgroup14group14 - group19group14 – group20
Lifetime value28800s28800s28800s
Phase 1 negotiation modemainmainmain
IPSec Info
Encryption algorithmaes-256aes-256aes-256
Authorization algorithmsha256sha256sha256
Perfect forward secrecygroup14group14 (or group19)group19
Lifetime value3600s3600s3600s
Encapsulation modetunneltunneltunnel
Transform protocolespespesp
  • For providers not in the list above, manually enter the IKE and IPSec information that matches your connection configuration.

Section 3: Dead Peer Detection file

FieldDescription
Delay (s)Time (in seconds) between each DPD probe sent to check the connection. Default: 30s.
Max failuresMaximum number of failed checks before the peer is considered dead and the connection is reset. Default: 10.

Section 4: Advanced Information file

FieldDescription
Peer IDThe identifier (original IP address) of the customer's VPN device during VPN establishment (IKE negotiation). By default, the system uses the Customer Gateway IP. If you are using a NAT IP, verify the original IP address (before NAT) and enter it in this Peer ID field.

After filling in all the VPN Connection details, select Create VPN Connection to proceed or Cancel to discard.