<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000311#M122782</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/692609599"&gt;@D.Callahan&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To expand on what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt; mentioned; you can either set this up as is and utilize NAT to get around the conflicting subnets, or you take the easier route and change one side. It's easiest in a lot of environments to just forgo the overlapping subnets if possible so you don't have to worry about setting specific DNS entries or the like up to direct traffic from one network to the next.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you need to deal with the overlapping subnets, and it looks like you just need access to a single node, that would be done via NAT to remove the conflict. There used to be a good KB about this that appears to have been removed, but &lt;A href="https://faatech.be/palo-alto-networks-ipsec-site-to-site-with-overlapping-subnets-networks/" target="_self"&gt;THIS&lt;/A&gt; describes the process perfectly fine with a quick search. That should help get you in the right direction.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jan 2025 22:53:02 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2025-01-07T22:53:02Z</dc:date>
    <item>
      <title>Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000302#M122776</link>
      <description>&lt;P&gt;Quick question on setting a site to site vpn, using tunnel mode. If I have a site "A" peer going and connecting with a site "B" peer for a VPN, can both sites have the same IP address subnet, or will that conflict?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Scenario:&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Site A: 192.168.20.5/24 (Local LAN)&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Site B: 192.168.20.88/24 (Local LAN)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would a NAT be required within the Palo Alto Firewall if I did not change one of sites subnets?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 21:07:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000302#M122776</guid>
      <dc:creator>D.Callahan</dc:creator>
      <dc:date>2025-01-07T21:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000306#M122779</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/692609599"&gt;@D.Callahan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, you will need to create a unique subnet that doesn't overlap with any of your managed subnets, make sure you point routing to those new subnets via the tunnel, and create the appropriate NAT policies.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 21:49:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000306#M122779</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-01-07T21:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000311#M122782</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/692609599"&gt;@D.Callahan&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;To expand on what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt; mentioned; you can either set this up as is and utilize NAT to get around the conflicting subnets, or you take the easier route and change one side. It's easiest in a lot of environments to just forgo the overlapping subnets if possible so you don't have to worry about setting specific DNS entries or the like up to direct traffic from one network to the next.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you need to deal with the overlapping subnets, and it looks like you just need access to a single node, that would be done via NAT to remove the conflict. There used to be a good KB about this that appears to have been removed, but &lt;A href="https://faatech.be/palo-alto-networks-ipsec-site-to-site-with-overlapping-subnets-networks/" target="_self"&gt;THIS&lt;/A&gt; describes the process perfectly fine with a quick search. That should help get you in the right direction.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 22:53:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000311#M122782</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-01-07T22:53:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000673#M122794</link>
      <description>&lt;P&gt;All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/220841"&gt;@JayGolf&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt; Thank you for the insight on this subject matter. For the one side NAT, if I choose to add more remote sites in the future then would I have to create a one-site NAT to each of the remote tunnels?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again, this was very helpful.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 14:21:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1000673#M122794</guid>
      <dc:creator>D.Callahan</dc:creator>
      <dc:date>2025-01-08T14:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1001986#M122816</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/692609599"&gt;@D.Callahan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No prob! As far as adding additional remote sites in the future, I would recommend to ensure CIDRs are free to use and not overlapping. This way you don't have to rely on setting up NAT and you can perform full routing. I would definitely reserve some space within your network for remote sites.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 17:39:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1001986#M122816</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2025-01-09T17:39:27Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1002132#M122817</link>
      <description>&lt;P&gt;Sounds good, thanks JayGolf.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2025 21:07:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn/m-p/1002132#M122817</guid>
      <dc:creator>D.Callahan</dc:creator>
      <dc:date>2025-01-09T21:07:19Z</dc:date>
    </item>
  </channel>
</rss>

