<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-Site vpn and NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26223#M19151</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1594"&gt;https://live.paloaltonetworks.com/docs/DOC-1594&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Jul 2013 01:39:47 GMT</pubDate>
    <dc:creator>ukhapre</dc:creator>
    <dc:date>2013-07-24T01:39:47Z</dc:date>
    <item>
      <title>Site-to-Site vpn and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26221#M19149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one vpn configuration question, I hope somebody can help...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am configuring vpn site-to-site in my site PaloAlto, other site is not important in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am making source and destination NAT for the traffic that is used for vpn. The purpose of this NAT is that we have lot of vpn tunnels and we have similar IP networks on local and remote site. I want to make correct vpn configuration. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. When I am configuring IPsec Tunnels and have to identify local and remote&amp;nbsp; ProxyID, what IP network I should add? pre nat or post nat&amp;nbsp; network ? &lt;/P&gt;&lt;P&gt;2. I have to configure a static rule for vpn traffic. What destination network should be in that way? is it pre nat or post nat network ? if I am adding pre nat network I faced problems that there are other static routes which is used in my local network (because some remote sites subnets are similar like my site subnets).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I write everything clearly and somebody can help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Arturas&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 10:57:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26221#M19149</guid>
      <dc:creator>aaputis</dc:creator>
      <dc:date>2013-07-22T10:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site vpn and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26222#M19150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please review the technote available at : &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1594"&gt;https://live.paloaltonetworks.com/docs/DOC-1594&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This whitepaper has some simple examples of NAT for overlapping subnets over IPSEC. Should help to get you started.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jul 2013 12:38:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26222#M19150</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2013-07-22T12:38:49Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site vpn and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26223#M19151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1594"&gt;https://live.paloaltonetworks.com/docs/DOC-1594&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 01:39:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26223#M19151</guid>
      <dc:creator>ukhapre</dc:creator>
      <dc:date>2013-07-24T01:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site vpn and NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26224#M19152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Q. &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;When I am configuring IPsec Tunnels and have to identify local and remote&amp;nbsp; ProxyID, what IP network I should add? pre nat or post nat&amp;nbsp; network ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;A. If you are going Palo Alto to Palo Alto, ProxyIDs are not required - but, I suspect that is not the case do to the nature of your question, so the answer is post NAT.&amp;nbsp; It will be what the other side expects to see as the source address of the traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q. &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;I have to configure a static rule for vpn traffic. What destination network should be in that way? is it pre nat or post nat network ? if I am adding pre nat network I faced problems that there are other static routes which is used in my local network (because some remote sites subnets are similar like my site subnets).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;A.&amp;nbsp; Again, this will be the post NAT address.&amp;nbsp; The traffic coming from one side to the other will have a source address of what ever you source NAT it to.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE:&amp;nbsp; Make sure that your ProxyIDs match on both sides of the tunnel.&amp;nbsp; If it is a Cisco ASA for example, the crypto map (ACL) will need to match the proxy IDs configured on your Palo Alto - only in reverse (local on your side is remote on the other and vise versa).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-chadd.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jul 2013 01:58:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-and-nat/m-p/26224#M19152</guid>
      <dc:creator>cchristiansen</dc:creator>
      <dc:date>2013-07-24T01:58:17Z</dc:date>
    </item>
  </channel>
</rss>

