<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site VPN Double NAT Issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63520#M38209</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a branch office connected via site to site vpn, plao alto firewalls at both locations.&lt;/P&gt;&lt;P&gt;Due to buiding works the office has been relocated to a shared building and we're having to use a third party's network connection. We've been provided with a public IP address which is then NAT to a 192.x.x.x address which they then route to our fw.&amp;nbsp;&lt;SPAN&gt;We would like to reinstate the site to site vpn. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The fw at the new location has the external interface set on the private 192.x.x.x range.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Phase 1 negotioation from our main site is failing as it detects the private address as an invalid peer as we have the public address configured as the remote peer on the IKE Gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is there a way around this?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2015 10:57:05 GMT</pubDate>
    <dc:creator>Glicks</dc:creator>
    <dc:date>2015-08-24T10:57:05Z</dc:date>
    <item>
      <title>Site to Site VPN Double NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63520#M38209</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a branch office connected via site to site vpn, plao alto firewalls at both locations.&lt;/P&gt;&lt;P&gt;Due to buiding works the office has been relocated to a shared building and we're having to use a third party's network connection. We've been provided with a public IP address which is then NAT to a 192.x.x.x address which they then route to our fw.&amp;nbsp;&lt;SPAN&gt;We would like to reinstate the site to site vpn. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The fw at the new location has the external interface set on the private 192.x.x.x range.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Phase 1 negotioation from our main site is failing as it detects the private address as an invalid peer as we have the public address configured as the remote peer on the IKE Gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Is there a way around this?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 10:57:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63520#M38209</guid>
      <dc:creator>Glicks</dc:creator>
      <dc:date>2015-08-24T10:57:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Double NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63522#M38210</link>
      <description>&lt;P&gt;Yes. You can use different IP address for transport and for phase 1 identification. Put the public IP address on &amp;nbsp;IKE gateway as "&lt;SPAN&gt;Peer IP Address" and private IP address under "Peer Identification -&amp;gt; IP address".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 11:07:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63522#M38210</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-08-24T11:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN Double NAT Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63528#M38215</link>
      <description>&lt;P&gt;Firstly turn on the NAT travesal Network&amp;gt; IKE gateway&amp;gt; Advance options&amp;gt; Enble NAT traversal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use Local identificaiton and remote identification on both firewall. In these fields you can select IP address configured on the interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA1(Public) PA2 (private)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall which have public IP address PA1 set the peer ip address under the IKE gateway as Public IP address of the other firewall. Initiate the tunnel negotiation from PA2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use these command:&lt;/P&gt;&lt;P&gt;test vpn ike-sa&lt;/P&gt;&lt;P&gt;test vpn ipsec-sa&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let us know if it helps or not.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2015 12:26:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-double-nat-issue/m-p/63528#M38215</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-08-24T12:26:54Z</dc:date>
    </item>
  </channel>
</rss>

