<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: returning packet going back the way they came in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561743#M113804</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes got that if I can nat on both side - if I can't I want to do it all on one side. with a linux box I can do it all on the linux box.&lt;/P&gt;
&lt;P&gt;is it not possible with PA&lt;/P&gt;
&lt;P&gt;not even with vsys&lt;/P&gt;</description>
    <pubDate>Sun, 15 Oct 2023 20:16:07 GMT</pubDate>
    <dc:creator>Alex_Samad</dc:creator>
    <dc:date>2023-10-15T20:16:07Z</dc:date>
    <item>
      <title>returning packet going back the way they came</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561718#M113799</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have need to connect to a new site - they have over lapping IP address ranges.&lt;/P&gt;
&lt;P&gt;I have agreed to re number - all good. want to setup a IPSEC tunnel and I would like to SNAT all traffic from this new site&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so lets that I am using 192.168.10-20.0/24 and the space is 192.168.240-250.0/24&lt;/P&gt;
&lt;P&gt;So its going to take a while to get it all renumbered&lt;/P&gt;
&lt;P&gt;for this lets say I have&lt;/P&gt;
&lt;P&gt;192.168.10.0 - vlan 10&lt;/P&gt;
&lt;P&gt;192.168.11.0 - vlan 11&lt;/P&gt;
&lt;P&gt;192.168.12.0 - vlan 12&lt;/P&gt;
&lt;P&gt;192.168.13.0 - vlan 13&lt;/P&gt;
&lt;P&gt;192.168.14.0 - vlan 14&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and I have added a second address range onto vlan14&lt;/P&gt;
&lt;P&gt;192.168.244.0 vlan14&lt;/P&gt;
&lt;P&gt;on the ipsec tunnel we are using 10.0.0.0/30 .1 their end and .2 my end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;lets say they have a device on their end 192.168.12.50 thats trying to connect to my device 192.244.50 - lets say ssh&lt;/P&gt;
&lt;P&gt;packet coming in on the ipsec tunnel comes in s address of 192.168.12.50 and I snat that to 10.0.0.1&lt;/P&gt;
&lt;P&gt;.1 is the default gateway and the PA is .1&lt;/P&gt;
&lt;P&gt;so return packet goes 192.244.50 return to 10.0.0.1 , the pa un snat it back to 192.168.12.50, now I want this packet to go back over the ipsec tunnel - can I use PBF will that work&lt;/P&gt;
&lt;P&gt;remember I also want packets from 192.244.50 to 192.168.12.50 to not go out of the ipsec tunnel but out vlan 12 &lt;BR /&gt;&lt;BR /&gt;On linux I can do this I can tag packet flows and route according to their tag - quick read of PBF seems to sugget is might help I set up PBF from the ipsec tunnel to 192.244.50 and tall it to use the same route back !!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or I can setup a new vsys hide all of the stuff there and do the snat there and then route between vsys...&lt;BR /&gt;how easy is it to convert a single setup on a 5220 to a multi vsys setup !!! and how do I route between vsys - haven't found that easy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is doing a vsys the only way to do a vrf / private routing table ??&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Oct 2023 04:15:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561718#M113799</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2023-10-15T04:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: returning packet going back the way they came</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561741#M113803</link>
      <description>&lt;P&gt;With overlapping subnets at both sides you need NAT policies on both side and different subnet in routing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example&lt;/P&gt;
&lt;P&gt;Site 1 - 192.168.0.0/16&lt;/P&gt;
&lt;P&gt;Site 2 - 192.168.0.0/16&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To access resources from site 1 to site 2 you need to use fake IP let's say 10.2.0.0/16&lt;/P&gt;
&lt;P&gt;So you route 10.2.0.0/16 into tunnel towards site 2.&lt;/P&gt;
&lt;P&gt;Firewall on site 2 side applies DNAT 10.2.0.0/16 &amp;gt; 192.168.0.0/16&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To access resouces form site 2 to site 1 you use different fake IP let's say 10.1.0.0/16&lt;/P&gt;
&lt;P&gt;So you route 10.1.0.0/16 into tunnel from site 2 towards site 1.&lt;/P&gt;
&lt;P&gt;Firewall on site 1 side applies DNAT 10.1.0.0/16 &amp;gt; 192.168.0.0/16&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Pay attention that unless you add static route for 10.1.0.0/16 and 10.2.0.0/16 towards inside zones they are routed to WAN so NAT rules must have WAN zone as destination for them to match.&lt;/P&gt;</description>
      <pubDate>Sun, 15 Oct 2023 16:40:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561741#M113803</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-10-15T16:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: returning packet going back the way they came</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561743#M113804</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes got that if I can nat on both side - if I can't I want to do it all on one side. with a linux box I can do it all on the linux box.&lt;/P&gt;
&lt;P&gt;is it not possible with PA&lt;/P&gt;
&lt;P&gt;not even with vsys&lt;/P&gt;</description>
      <pubDate>Sun, 15 Oct 2023 20:16:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/returning-packet-going-back-the-way-they-came/m-p/561743#M113804</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2023-10-15T20:16:07Z</dc:date>
    </item>
  </channel>
</rss>

