<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49761#M36651</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a Cisco ASA at a remote site and PAN 3020 at my HQ site.&amp;nbsp; The current site-to-site tunnel is working well and remote users can access resources in my network.&amp;nbsp; Now comes the tricky part.&amp;nbsp; In a perfect world, I could put another smaller PAN unit there for AV, App Control, etc. but until then I need some way to control it since those users are not conforming my security policy.&amp;nbsp; Does anyone know of a way on an ASA to tunnel all traffic to a PAN firewall?&amp;nbsp; This way, rules on my 3020 would work for the remote VPN and I can prevent those users from using certain apps across the Internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Apr 2013 18:28:48 GMT</pubDate>
    <dc:creator>nthen</dc:creator>
    <dc:date>2013-04-09T18:28:48Z</dc:date>
    <item>
      <title>Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49761#M36651</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a Cisco ASA at a remote site and PAN 3020 at my HQ site.&amp;nbsp; The current site-to-site tunnel is working well and remote users can access resources in my network.&amp;nbsp; Now comes the tricky part.&amp;nbsp; In a perfect world, I could put another smaller PAN unit there for AV, App Control, etc. but until then I need some way to control it since those users are not conforming my security policy.&amp;nbsp; Does anyone know of a way on an ASA to tunnel all traffic to a PAN firewall?&amp;nbsp; This way, rules on my 3020 would work for the remote VPN and I can prevent those users from using certain apps across the Internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 18:28:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49761#M36651</guid>
      <dc:creator>nthen</dc:creator>
      <dc:date>2013-04-09T18:28:48Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49762#M36652</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the Cisco ASA, for the "interesting traffic" ACL that defines what to tunnel to the remote site, you'd simply open up that "interesting traffic" ACL to include all traffic sourced by your internal LAN(s) destined for anywhere. This would cause all the traffic leaving the ASA's "inside" network to be tunneled over to your 3020. Also make sure you build a NoNAT exception on your ASA, so the ASA doesn't NAT any LAN traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can then do NAT out to the Internet on your PA 3020.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you'd like help with the config on the ASA, you can PM me or post some config here if you're comfortable doing that. At a previous job I managed literally hundreds of IPsec tunnels with ASAs in three different parts of the country.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 18:36:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49762#M36652</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-09T18:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49763#M36653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So in theory I would do something like this (I left out other non important parts of the config)...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;object-group network HQ-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;object-group network RemoteSite-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;crypto map HQ 50 match address remote_vpn&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;HQ &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;50 set peer 1.2.3.4&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;HQ &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;50 set transform-set HQ&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;HQ &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;50 set security-association lifetime seconds 3600&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;&lt;SPAN style="font-size: 10pt;"&gt;crypto map &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;HQ &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;interface outside&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;access-list nonat extended permit ip object-group RemoteSite-Encrypt object-group HQ-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;access-list remote_vpn extended permit ip object-group RemoteSite-Encrypt object-group HQ-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I am not 100% sure on this NAT portion though...&lt;BR /&gt;&lt;SPAN style="color: #008000; font-family: courier new,courier; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;global (outside) 1 interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;nat (inside) 0 access-list nonat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #008000;"&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3c613e; font-family: Courier New; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 18:45:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49763#M36653</guid>
      <dc:creator>nthen</dc:creator>
      <dc:date>2013-04-09T18:45:38Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49764#M36654</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That '&lt;SPAN style="color: #008000; font-family: 'courier new', courier; font-size: 11.818181991577148px; background-color: #ffffff;"&gt;nat (inside) 0 access-list nonat&lt;/SPAN&gt;' is the NoNAT I was thinking of... basically your internal LAN source won't be NAT'd at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This part of your config:&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier; color: #008000;"&gt;nat (inside) 0 access-list nonat&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier; color: #008000;"&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-family: 'courier new', courier; color: #008000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;...basically says "don't NAT traffic if it matches this specific access list (named nonat in your example). NAT everything from 192.168.1.0/24, and use the interface named 'outisde'&amp;nbsp; to NAT behind." The "nat (inside) 0" line is a special config line - "nat 0" statements are really what you DON'T want to NAT (hence the access list name, nonat)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could just flat out turn off NAT on the ASA honestly... you could "no out" your global NAT and your "nat (inside)" statements instead of trying to NoNAT everything&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 18:52:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49764#M36654</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-09T18:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49765#M36655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that example you've got I think in your two ACLs you've got the directions backward. In the ACLs you're basically pointing out what traffic will flow over the IPsec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If for example your headquarters subnet is 192.168.0.0/24 (your remote site is 192.168.1.0/24 in your example above), you want to say "everything flowing from 192.168.0.0/24 to anywhere will flow over the IPsec tunnel"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you'd need this, in your example from above:&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;object-group network HQ-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object 192.168.0.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;object-group network RemoteSite-Encrypt&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; network-object 0.0.0.0 0.0.0.0 &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;And your ACLs would look like this:&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;access-list nonat extended permit ip object-group &lt;SPAN style="color: #008000; font-family: 'courier new', courier; background-color: #ffffff;"&gt;HQ-Encrypt&lt;/SPAN&gt; object-group &lt;SPAN style="color: #008000; font-family: 'courier new', courier; background-color: #ffffff;"&gt; RemoteSite-Encrypt&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="font-style: inherit; font-size: 10pt; font-family: 'courier new', courier; color: #008000;"&gt;access-list remote_vpn extended permit ip object-group HQ-Encrypt object-group &lt;SPAN style="color: #008000; font-family: 'courier new', courier; background-color: #ffffff;"&gt; RemoteSite-Encrypt&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-size: 11.818181991577148px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;SPAN style="color: #008000; font-style: inherit; font-size: 10pt; background-color: #ffffff; font-family: 'courier new', courier;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 19:11:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49765#M36655</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-09T19:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49766#M36656</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The way I have the ACLs now are working, but I'll PM you the config which may be easier if I am showing something wrong.&amp;nbsp; Right now my remote site has a server so that would still need to be NAT'd but everything else would not need to be.&amp;nbsp; This is recent acquisition for my company so it is still in transition.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 19:40:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49766#M36656</guid>
      <dc:creator>nthen</dc:creator>
      <dc:date>2013-04-09T19:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49767#M36657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey if what you have configured is working then that's all good... it's hard to "eyeball" a config and point things out without having an ASA around.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad I could help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 21:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49767#M36657</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-09T21:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49768#M36658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I appreciate the advice on the tunnel all mode.&amp;nbsp; I think I have my ACL right to only NAT their server to our private addresses and send everything else.&amp;nbsp; From the PAN then I should be able to NAT and have all my policies apply.&amp;nbsp; Does this ACL make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #339966;"&gt;access-list nonat permit ip 192.168.1.10 255.255.255.255 172.16.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #339966;"&gt;access-list nonat permit ip 192.168.1.10 255.255.255.255 10.50.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #339966;"&gt;access-list nonat deny ip 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier; color: #339966;"&gt;access-list nonat permit ip 192.168.1.0 255.255.255.0 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 12:35:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49768#M36658</guid>
      <dc:creator>nthen</dc:creator>
      <dc:date>2013-04-10T12:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: Creating a Cisco ASA - Palo Alto VPN tunnel for ALL traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49769#M36659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That does look correct to me... the logical flow of the ACL looks like it would do what you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like this is what you're trying to achieve:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;nonat traffic from your specific server to your two remote sites&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;don't nonat anything else from that specific server on the 192.168.1 subnet&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;nonat all traffic from 192.168.1.0/24 to anwhere&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks good to me!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Apr 2013 14:09:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/creating-a-cisco-asa-palo-alto-vpn-tunnel-for-all-traffic/m-p/49769#M36659</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-04-10T14:09:57Z</dc:date>
    </item>
  </channel>
</rss>

