<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network address Translation (NAT) support for IPSec ESP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/network-address-translation-nat-support-for-ipsec-esp/m-p/41118#M30210</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have an IPSEC tunnel with a third party and they require that all traffic coming from me to be NATted as they will only accept data traffic coming from the IP of the NAT within the IPSEC tunnel.&lt;/P&gt;&lt;P&gt;I have been unsuccesfull in trying to figure out how exactly this NAT within an IPSEC tunnel can be applied on a Palo Alto 5020 and would appreciate any comments from other people who have possibly done this before.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Aug 2012 23:55:21 GMT</pubDate>
    <dc:creator>jrhine</dc:creator>
    <dc:date>2012-08-20T23:55:21Z</dc:date>
    <item>
      <title>Network address Translation (NAT) support for IPSec ESP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-address-translation-nat-support-for-ipsec-esp/m-p/41118#M30210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have an IPSEC tunnel with a third party and they require that all traffic coming from me to be NATted as they will only accept data traffic coming from the IP of the NAT within the IPSEC tunnel.&lt;/P&gt;&lt;P&gt;I have been unsuccesfull in trying to figure out how exactly this NAT within an IPSEC tunnel can be applied on a Palo Alto 5020 and would appreciate any comments from other people who have possibly done this before.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Aug 2012 23:55:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-address-translation-nat-support-for-ipsec-esp/m-p/41118#M30210</guid>
      <dc:creator>jrhine</dc:creator>
      <dc:date>2012-08-20T23:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Network address Translation (NAT) support for IPSec ESP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/network-address-translation-nat-support-for-ipsec-esp/m-p/41119#M30211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;This is not a terribly difficult task if you are familiar with how NATing generally works on the PAN firewall.&amp;nbsp; There is one main thing that you will need to make sure though - that the tunnel interface you specified for the tunnel is in a separate zone from the traffic that will be going across the tunnel.&amp;nbsp; As long as you have this done, you will build the NAT rule like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone: &amp;lt;your source traffic zone(s)&amp;gt;&lt;/P&gt;&lt;P&gt;Destination Zone: &amp;lt;your VPN tunnel interface zone&amp;gt;&lt;/P&gt;&lt;P&gt;Source Address: any (or restricted to a specific IP if you like)&lt;/P&gt;&lt;P&gt;Source Translation: You have a couple of options here depending on exactly what traffic you are sending across.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1. If it's coming from multiple hosts specify Dynamic IP and Port and then Translated Address.&amp;nbsp; In the area where you specify an address, either select/create an address object for the address that you are NATing to, or you can just type an address in the field as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2. If it's coming from a single host, you can do the first option, or you can specify it as Static IP and then in the Translated Address area, specify/create an address object for the address that you are NATing to or again, you can just type an address into the field.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is all you should have to do, the rule will look very much like your source NAT policy that translates your user traffic out to the internet except your destination zone will be the zone that your tunnel interface is in and you will not be specifying "Interface Address" as the Source Translated Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing to keep in mind, if your VPN tunnel is currently in the same zone as your trusted network, when you apply a different zone to it, you will need to make sure to add the appropriate firewall rules so that traffic can flow correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2012 22:04:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/network-address-translation-nat-support-for-ipsec-esp/m-p/41119#M30211</guid>
      <dc:creator>mike_lutgen</dc:creator>
      <dc:date>2012-08-25T22:04:33Z</dc:date>
    </item>
  </channel>
</rss>

