<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554538#M112681</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/285057"&gt;@JTDMHSUPPORT&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Depends on what you're trying to accomplish and whether or not the peer will actually see that NAT addresses or not.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Aug 2023 16:32:53 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2023-08-21T16:32:53Z</dc:date>
    <item>
      <title>Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554342#M112657</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I need to do some source/destination NATs on my PA440 for anew ipsec tunnel. I have never had to configure a NAT until now. I have been watching some videos and I understand the basic concept of NAT and why it is needed. My question is, all of the videos I have watched are referencing the outside zone. For my ipsec tunnels, I am using a zone called l2vpn. Would the only difference for my NAT rules be that I reference my l2vpn zone instead of the outside zone?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 18:48:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554342#M112657</guid>
      <dc:creator>JTDMHSUPPORT</dc:creator>
      <dc:date>2023-08-18T18:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554364#M112659</link>
      <description>&lt;P&gt;If you NAT outgoing traffic then source zone is INSIDE and destination zone is OUTSIDE.&lt;/P&gt;
&lt;P&gt;If you NAT incoming traffic then source zone is OUTSIDE and destination zone is OUTSIDE.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you NAT traffic where sessions are initiated from your side towards tunnel then source zone is INSIDE and destination zone is L2VPN.&lt;/P&gt;
&lt;P&gt;If you NAT traffic where sessions are initiated from other side of the tunnel towards you then source zone is L2VPN and destination zone is INSIDE (in most cases unless you change destination IP. In this case you might need destination zone to be OUTSIDE if pre-nat IP is not in your routing table).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Aug 2023 05:34:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554364#M112659</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-08-19T05:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554529#M112680</link>
      <description>&lt;P&gt;Will I also need Proxy IDs for the NAT ip addresses?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 15:36:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554529#M112680</guid>
      <dc:creator>JTDMHSUPPORT</dc:creator>
      <dc:date>2023-08-21T15:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554538#M112681</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/285057"&gt;@JTDMHSUPPORT&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Depends on what you're trying to accomplish and whether or not the peer will actually see that NAT addresses or not.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554538#M112681</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-08-21T16:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554541#M112682</link>
      <description>&lt;P&gt;Hi BP,&lt;/P&gt;
&lt;P&gt;My goal is an IPsec vpn tunnel with a vendor. They want me to nat some of the hosts on my side due to network overlap. I am new to Palo and do not do networking everyday so I am trying to muddle my way through this. Here is my thinking and why I posed the question about the proxy IDs- I have already built proxy IDs for the non natted traffic. Some of the hosts will be natted and some won't. My thought is, if I have proxy IDs created for my hosts for the source ip on my side, then i do not need an additional proxy id for the relevant NAT addresses of either side since the address will be translated before the traffic is sent to my host or sent from my host. But I am no expert on NAT, hence the reason I asked. Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 16:39:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554541#M112682</guid>
      <dc:creator>JTDMHSUPPORT</dc:creator>
      <dc:date>2023-08-21T16:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554547#M112685</link>
      <description>&lt;P&gt;BP,&lt;/P&gt;
&lt;P&gt;I just found this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When configuring an IPSec Tunnel Proxy-ID configuration to identify local and remote IP networks for traffic that is NATed, the Proxy-ID configuration for the IPSec Tunnel must be configured with the Post-NAT IP network information, because the Proxy-ID information defines the networks that will be allowed through the tunnel on both sides for the IPSec configuration.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I think that answers my question.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Aug 2023 17:22:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554547#M112685</guid>
      <dc:creator>JTDMHSUPPORT</dc:creator>
      <dc:date>2023-08-21T17:22:26Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554700#M112696</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/285057"&gt;@JTDMHSUPPORT&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Correct, for what you're doing you'd use the post NAT information for proxy IDs. The only time that you wouldn't would be if the tunnel isn't going to see the NAT address. As an example; if you were funneling traffic back to headquarters to route out to the internet or some other restricted resource, you would still use the pre NAT addresses because the tunnel itself wouldn't see the NAT at all.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Aug 2023 14:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/554700#M112696</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2023-08-22T14:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Help with NAT Configuration on PA-440 In Conjunction With IPSec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/555232#M112777</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You're correct in understanding the basics of NAT. While most videos refer to the "outside" zone, in your case with the "l2vpn" zone for IPSec tunnels, the principle remains the same. Instead of the "outside" zone, use the "l2vpn" zone in your NAT rules. Ensure your security policies align, allowing traffic between the relevant source and destination zones. This way, the NAT translations occur correctly before traffic goes through the IPSec tunnel. Always refer to your device's official documentation or support resources for guidance.&lt;/P&gt;
&lt;P&gt;Best of luck with your PA-440 NAT configuration for the IPSec tunnel!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this will help you!&lt;/P&gt;
&lt;P&gt;(&lt;SPAN data-sheets-value="{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:&amp;quot;Splunk Training&amp;quot;}" data-sheets-userformat="{&amp;quot;2&amp;quot;:14524,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:1}]},&amp;quot;6&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:1}]},&amp;quot;7&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:1}]},&amp;quot;8&amp;quot;:{&amp;quot;1&amp;quot;:[{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0,&amp;quot;5&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0}},{&amp;quot;1&amp;quot;:0,&amp;quot;2&amp;quot;:0,&amp;quot;3&amp;quot;:3},{&amp;quot;1&amp;quot;:1,&amp;quot;2&amp;quot;:0,&amp;quot;4&amp;quot;:1}]},&amp;quot;10&amp;quot;:2,&amp;quot;14&amp;quot;:{&amp;quot;1&amp;quot;:2,&amp;quot;2&amp;quot;:0},&amp;quot;15&amp;quot;:&amp;quot;Roboto&amp;quot;,&amp;quot;16&amp;quot;:12}"&gt;&lt;A href="https://www.igmguru.com/big-data/splunk-training/" target="_self"&gt;&lt;FONT color="#000000"&gt;Splunk Training&lt;/FONT&gt;&lt;/A&gt;)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 06:15:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat-configuration-on-pa-440-in-conjunction-with-ipsec/m-p/555232#M112777</guid>
      <dc:creator>miasmith500</dc:creator>
      <dc:date>2023-08-25T06:15:09Z</dc:date>
    </item>
  </channel>
</rss>

