<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT rule for IPSEC VPN using NAT-T in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28367#M20734</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your destination NAT: Assuming 'Vendor-VPN' is the zone the tunnel terminates on, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT rule should be:&lt;/P&gt;&lt;P&gt;srczone: Vendor-VPN&lt;/P&gt;&lt;P&gt;dstzone: Vendor-VPN&amp;nbsp; dstaddr: NAT IP (172.1.1.1.); dst translation addr: Real IP (10.1.1.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security policy:&lt;/P&gt;&lt;P&gt;srczone: Vendor-VPN&lt;/P&gt;&lt;P&gt;dstzone: Trust&amp;nbsp; dstaddr: NAT IP (172.1.1.1.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like the bi-directional static NAT should have worked as well, not sure why it didn't. You can trace the NAT IP/nat rules/security rules matching the traffic from the traffic logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 11 Jun 2013 16:17:51 GMT</pubDate>
    <dc:creator>apasupulati</dc:creator>
    <dc:date>2013-06-11T16:17:51Z</dc:date>
    <item>
      <title>NAT rule for IPSEC VPN using NAT-T</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28365#M20732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm running PANOS 4.0.13 and I've enabled NAT-T via the command line.&amp;nbsp; I'm having trouble getting traffic to pass and I assume it must be my NAT policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I set a destination NAT as the vendor will be the initiator.&amp;nbsp; The NAT is defined like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: Vendor-VPN&lt;/P&gt;&lt;P&gt;dstzone: Untrust&amp;nbsp; dstaddr: NAT IP (172.1.1.1.) dst translation addr: Real IP (10.1.1.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After writing this, perhaps the dstzone should be Trust, but I don't see that as the proper designation from the Doc's I'm reading.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I also tried making a Bi-Directional static Source NAT like so, but it doesn't appear to be working:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;srczone: Trust&amp;nbsp; srcaddr: real IP (10.1.1.1)&amp;nbsp; src translation addr: nat IP (172.1.1.1.)&lt;/P&gt;&lt;P&gt;dstzone: Vendor-VPN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know your suggestions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 May 2013 15:27:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28365#M20732</guid>
      <dc:creator>iguarino</dc:creator>
      <dc:date>2013-05-01T15:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule for IPSEC VPN using NAT-T</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28366#M20733</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what do you see in traffic logs related to VPN ?&lt;/P&gt;&lt;P&gt;That will give information where you make a mistake in NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Jun 2013 02:29:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28366#M20733</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-09T02:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule for IPSEC VPN using NAT-T</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28367#M20734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For your destination NAT: Assuming 'Vendor-VPN' is the zone the tunnel terminates on, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT rule should be:&lt;/P&gt;&lt;P&gt;srczone: Vendor-VPN&lt;/P&gt;&lt;P&gt;dstzone: Vendor-VPN&amp;nbsp; dstaddr: NAT IP (172.1.1.1.); dst translation addr: Real IP (10.1.1.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security policy:&lt;/P&gt;&lt;P&gt;srczone: Vendor-VPN&lt;/P&gt;&lt;P&gt;dstzone: Trust&amp;nbsp; dstaddr: NAT IP (172.1.1.1.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like the bi-directional static NAT should have worked as well, not sure why it didn't. You can trace the NAT IP/nat rules/security rules matching the traffic from the traffic logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jun 2013 16:17:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-rule-for-ipsec-vpn-using-nat-t/m-p/28367#M20734</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2013-06-11T16:17:51Z</dc:date>
    </item>
  </channel>
</rss>

