<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Traversal over IPSEC Tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/499#M388</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pre-Nat rule matching will use a route look up to match the NAT rule prior to applying NAT. I'm guessing 10.10.2.10 would go our the internet zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 28 Aug 2014 20:28:45 GMT</pubDate>
    <dc:creator>dburns</dc:creator>
    <dc:date>2014-08-28T20:28:45Z</dc:date>
    <item>
      <title>NAT Traversal over IPSEC Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/497#M386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Guys and Gals,&lt;BR /&gt;I have been working to set up NAT-T across an IPSec tunnel between two PA-200's in my lab and am not having success.&amp;nbsp; I have followed documentation and suggestions I could find on this site, but I am unable to get NAT-T working and was wondering if anyone out there could help.&amp;nbsp; In testing I first setup the tunnel with NAT-T configured.&amp;nbsp; On initial configuration, the tunnels came up, but I could not reach the remote firewalls by their assigned NAT IP address across the tunnel.&amp;nbsp; I removed NAT from the equation to make sure my IPSEC tunnel was working.&amp;nbsp; Once I did this, I could get to the remote firewalls across the tunnel using their real IP addresses.&amp;nbsp; So I didn't have to flip back and forth I left the real IP configuration and re-added my NAT configuration, but am still not able to reach the remote side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my topology.&amp;nbsp; The firewall interfaces are Layer 3 interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_04_26 PM.png" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/15196_Screenshot - 8_28_2014 , 3_04_26 PM.png" style="height: 424px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cable Modem they connect to has a 4-port switch on the back.&amp;nbsp; The Peer addresses are on the same subnet and are in zone Internet.&amp;nbsp; I have created tunnel.1 and put it in zone IPSEC, and I have a zone named LAN serving DHCP addresses to clients.&amp;nbsp; I want to be able to hit the management interface of the remote firewall over the IPSEC tunnel using the NAT IP address in the topology diagram.&amp;nbsp; To do this I have configured a source NAT and static NAT on both sides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT statement Firewall 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_10_42 PM.png" class="jive-image image-3" src="https://live.paloaltonetworks.com/legacyfs/online/15198_Screenshot - 8_28_2014 , 3_10_42 PM.png" style="height: 138px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security Policy Firewall 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_13_24 PM.png" class="jive-image image-4" src="https://live.paloaltonetworks.com/legacyfs/online/15199_Screenshot - 8_28_2014 , 3_13_24 PM.png" style="height: 126px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing Table Firewall 1:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_14_51 PM.png" class="jive-image image-5" src="https://live.paloaltonetworks.com/legacyfs/online/15200_Screenshot - 8_28_2014 , 3_14_51 PM.png" style="height: 172px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT Statements Firewall 2:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_16_48 PM.png" class="jive-image image-6" src="https://live.paloaltonetworks.com/legacyfs/online/15201_Screenshot - 8_28_2014 , 3_16_48 PM.png" style="height: 144px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security Policy Firewall 2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_17_46 PM.png" class="jive-image image-7" src="https://live.paloaltonetworks.com/legacyfs/online/15202_Screenshot - 8_28_2014 , 3_17_46 PM.png" style="height: 119px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing Table Firewall 2:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_18_54 PM.png" class="jive-image image-8" src="https://live.paloaltonetworks.com/legacyfs/online/15203_Screenshot - 8_28_2014 , 3_18_54 PM.png" style="height: 353px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suspect the issue lies within the monitor log.&amp;nbsp; With ICMP pings going across the tunnel I see this in the traffic log:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="Screenshot - 8_28_2014 , 3_24_50 PM.png" class="jive-image image-9" src="https://live.paloaltonetworks.com/legacyfs/online/15204_Screenshot - 8_28_2014 , 3_24_50 PM.png" style="height: 167px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;This tells me the Remote firewall is applying the NAT policy, and it is coming across the tunnel correctly, but I'm not sure why the destination zone is the Internet zone and not the LAN zone.&amp;nbsp; As an aside, if you look at my security policies, you'll see a disabled rule named "tunnel traffic for NAT"&amp;nbsp; this security policy rule allowed zone IPSEC to Internet, but having this rule in place just changed the rule name in the traffic logs.&amp;nbsp; Traffic between a local machine and the remote firewall would not pass.&amp;nbsp; Any clarity on why the firewall is putting the destination zone as Internet, and how I can get the firewall to correctly forward this to the LAN instead would be greatly appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 19:38:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/497#M386</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2014-08-28T19:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Traversal over IPSEC Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/498#M387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, while I was writing this all out for the forum, I changed my STATIC NAT statement from source zone LAN - destination zone IPSEC to source zone LAN - destination zone Internet on both firewalls, everything began working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic Log:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="15205" alt="Screenshot - 8_28_2014 , 3_50_37 PM.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15205_Screenshot - 8_28_2014 , 3_50_37 PM.png" style="height: 127px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Session ID Info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="15206" alt="Screenshot - 8_28_2014 , 3_58_51 PM.png" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15206_Screenshot - 8_28_2014 , 3_58_51 PM.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I guess my question now is why did I need to change the static NAT destination zone from IPSEC to Internet, and once I did that why did the "to zone" in the traffic logs change from Internet to LAN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 20:01:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/498#M387</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2014-08-28T20:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Traversal over IPSEC Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/499#M388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pre-Nat rule matching will use a route look up to match the NAT rule prior to applying NAT. I'm guessing 10.10.2.10 would go our the internet zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 20:28:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/499#M388</guid>
      <dc:creator>dburns</dc:creator>
      <dc:date>2014-08-28T20:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Traversal over IPSEC Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/500#M389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The network 10.10.2.0/24 was marked to go across the tunnel.1 interface for my IPSEC tunnel as a destination network in the routing table.&amp;nbsp; I was expecting even if the NAT was misconfigured, the destination zone would be the IPSEC zone since the traffic came across the tunnel.&amp;nbsp; Instead, until I changed the NAT statement, the firewall was trying to send the traffic destined from zone IPSEC to 10.10.1.10 to the Internet zone instead of NAT-ing the packet to the LAN zone.&amp;nbsp; But, because routes are configured with destination subnets in the routing table, there was not entry in its routing table for 10.10.1.0/24 and the firewall defaulted to its default route during it's pre-nat lookup. I was assuming the firewall would know that traffic destined for 10.10.1.10 (local static nat entry) would nat from zone IPSEC to zone LAN, when in actuality, it looks like the firewall had to send it out it's default route (pre-NAT route lookup), examine NAT policy, and then redirect the packet to the LAN zone.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I just need to read up more on how the flow goes for NAT rules, or is there a better way to configure this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Aug 2014 21:34:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/500#M389</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2014-08-28T21:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Traversal over IPSEC Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/501#M390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1628"&gt;Packet Flow in PAN-OS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See this document. You'll notice prior to the NAT policy look up there's a forwarding lookup. The information applied from this forward look up is what is used to match the nat rule (important to note it is not used to match the security rule).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dominic&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Aug 2014 14:50:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-traversal-over-ipsec-tunnel/m-p/501#M390</guid>
      <dc:creator>dburns</dc:creator>
      <dc:date>2014-08-29T14:50:39Z</dc:date>
    </item>
  </channel>
</rss>

