The virtual timer for UDP "connections" such as IKE/ISAKMP is 40 seconds. If there was no NAT configured when this IKE traffic started constantly passing through the firewall, no NAT will be applied to this existing "connection" even if you change the NAT rules and install policy. What NAT to perform is determined at the start of the "connection" when it is initially accepted, and cannot ever be changed for the life of that connection. Your options are:
1) If you can get the IKE traffic to "shut up" for more than 40 seconds its "connection" will be expired and the new NAT config will be applied when it starts back up again.
2) Delete the IKE/ISAKMP "connection" from the state table with the fw sam command, or from the "Active" mode of the SmartView Tracker.
3) Assign a different internal IP address to the system initiating the outbound IKE/ISAKMP. This will count as a new connection and any NAT changes should be immediately applied.
I don't think changing the outside NAT address will solve the problem for an existing "connection" like this. Also the IPSec VPN blade should not keep this traffic from being NATted by the firewall, unless you are trying to hide or port-forward this IKE/ISAKMP traffic through the firewall's actual NIC-assigned or cluster IP address.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com